]>
Commit | Line | Data |
---|---|---|
b411b363 PR |
1 | /* |
2 | drbd.c | |
3 | ||
4 | This file is part of DRBD by Philipp Reisner and Lars Ellenberg. | |
5 | ||
6 | Copyright (C) 2001-2008, LINBIT Information Technologies GmbH. | |
7 | Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>. | |
8 | Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>. | |
9 | ||
10 | Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev | |
11 | from Logicworks, Inc. for making SDP replication support possible. | |
12 | ||
13 | drbd is free software; you can redistribute it and/or modify | |
14 | it under the terms of the GNU General Public License as published by | |
15 | the Free Software Foundation; either version 2, or (at your option) | |
16 | any later version. | |
17 | ||
18 | drbd is distributed in the hope that it will be useful, | |
19 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
21 | GNU General Public License for more details. | |
22 | ||
23 | You should have received a copy of the GNU General Public License | |
24 | along with drbd; see the file COPYING. If not, write to | |
25 | the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. | |
26 | ||
27 | */ | |
28 | ||
b411b363 | 29 | #include <linux/module.h> |
b411b363 PR |
30 | #include <linux/drbd.h> |
31 | #include <asm/uaccess.h> | |
32 | #include <asm/types.h> | |
33 | #include <net/sock.h> | |
34 | #include <linux/ctype.h> | |
2a48fc0a | 35 | #include <linux/mutex.h> |
b411b363 PR |
36 | #include <linux/fs.h> |
37 | #include <linux/file.h> | |
38 | #include <linux/proc_fs.h> | |
39 | #include <linux/init.h> | |
40 | #include <linux/mm.h> | |
41 | #include <linux/memcontrol.h> | |
42 | #include <linux/mm_inline.h> | |
43 | #include <linux/slab.h> | |
44 | #include <linux/random.h> | |
45 | #include <linux/reboot.h> | |
46 | #include <linux/notifier.h> | |
47 | #include <linux/kthread.h> | |
48 | ||
49 | #define __KERNEL_SYSCALLS__ | |
50 | #include <linux/unistd.h> | |
51 | #include <linux/vmalloc.h> | |
52 | ||
53 | #include <linux/drbd_limits.h> | |
54 | #include "drbd_int.h" | |
b411b363 PR |
55 | #include "drbd_req.h" /* only for _req_mod in tl_release and tl_clear */ |
56 | ||
57 | #include "drbd_vli.h" | |
58 | ||
2a48fc0a | 59 | static DEFINE_MUTEX(drbd_main_mutex); |
b411b363 PR |
60 | int drbdd_init(struct drbd_thread *); |
61 | int drbd_worker(struct drbd_thread *); | |
62 | int drbd_asender(struct drbd_thread *); | |
63 | ||
64 | int drbd_init(void); | |
65 | static int drbd_open(struct block_device *bdev, fmode_t mode); | |
66 | static int drbd_release(struct gendisk *gd, fmode_t mode); | |
99920dc5 | 67 | static int w_md_sync(struct drbd_work *w, int unused); |
b411b363 | 68 | static void md_sync_timer_fn(unsigned long data); |
99920dc5 AG |
69 | static int w_bitmap_io(struct drbd_work *w, int unused); |
70 | static int w_go_diskless(struct drbd_work *w, int unused); | |
b411b363 | 71 | |
b411b363 PR |
72 | MODULE_AUTHOR("Philipp Reisner <phil@linbit.com>, " |
73 | "Lars Ellenberg <lars@linbit.com>"); | |
74 | MODULE_DESCRIPTION("drbd - Distributed Replicated Block Device v" REL_VERSION); | |
75 | MODULE_VERSION(REL_VERSION); | |
76 | MODULE_LICENSE("GPL"); | |
81a5d60e | 77 | MODULE_PARM_DESC(minor_count, "Approximate number of drbd devices (" |
2b8a90b5 | 78 | __stringify(DRBD_MINOR_COUNT_MIN) "-" __stringify(DRBD_MINOR_COUNT_MAX) ")"); |
b411b363 PR |
79 | MODULE_ALIAS_BLOCKDEV_MAJOR(DRBD_MAJOR); |
80 | ||
81 | #include <linux/moduleparam.h> | |
82 | /* allow_open_on_secondary */ | |
83 | MODULE_PARM_DESC(allow_oos, "DONT USE!"); | |
84 | /* thanks to these macros, if compiled into the kernel (not-module), | |
85 | * this becomes the boot parameter drbd.minor_count */ | |
86 | module_param(minor_count, uint, 0444); | |
87 | module_param(disable_sendpage, bool, 0644); | |
88 | module_param(allow_oos, bool, 0); | |
b411b363 PR |
89 | module_param(proc_details, int, 0644); |
90 | ||
91 | #ifdef CONFIG_DRBD_FAULT_INJECTION | |
92 | int enable_faults; | |
93 | int fault_rate; | |
94 | static int fault_count; | |
95 | int fault_devs; | |
96 | /* bitmap of enabled faults */ | |
97 | module_param(enable_faults, int, 0664); | |
98 | /* fault rate % value - applies to all enabled faults */ | |
99 | module_param(fault_rate, int, 0664); | |
100 | /* count of faults inserted */ | |
101 | module_param(fault_count, int, 0664); | |
102 | /* bitmap of devices to insert faults on */ | |
103 | module_param(fault_devs, int, 0644); | |
104 | #endif | |
105 | ||
106 | /* module parameter, defined */ | |
2b8a90b5 | 107 | unsigned int minor_count = DRBD_MINOR_COUNT_DEF; |
90ab5ee9 RR |
108 | bool disable_sendpage; |
109 | bool allow_oos; | |
b411b363 PR |
110 | int proc_details; /* Detail level in proc drbd*/ |
111 | ||
112 | /* Module parameter for setting the user mode helper program | |
113 | * to run. Default is /sbin/drbdadm */ | |
114 | char usermode_helper[80] = "/sbin/drbdadm"; | |
115 | ||
116 | module_param_string(usermode_helper, usermode_helper, sizeof(usermode_helper), 0644); | |
117 | ||
118 | /* in 2.6.x, our device mapping and config info contains our virtual gendisks | |
119 | * as member "struct gendisk *vdisk;" | |
120 | */ | |
81a5d60e | 121 | struct idr minors; |
2111438b | 122 | struct list_head drbd_tconns; /* list of struct drbd_tconn */ |
b411b363 PR |
123 | |
124 | struct kmem_cache *drbd_request_cache; | |
6c852bec | 125 | struct kmem_cache *drbd_ee_cache; /* peer requests */ |
b411b363 PR |
126 | struct kmem_cache *drbd_bm_ext_cache; /* bitmap extents */ |
127 | struct kmem_cache *drbd_al_ext_cache; /* activity log extents */ | |
128 | mempool_t *drbd_request_mempool; | |
129 | mempool_t *drbd_ee_mempool; | |
4281808f | 130 | mempool_t *drbd_md_io_page_pool; |
9476f39d | 131 | struct bio_set *drbd_md_io_bio_set; |
b411b363 PR |
132 | |
133 | /* I do not use a standard mempool, because: | |
134 | 1) I want to hand out the pre-allocated objects first. | |
135 | 2) I want to be able to interrupt sleeping allocation with a signal. | |
136 | Note: This is a single linked list, the next pointer is the private | |
137 | member of struct page. | |
138 | */ | |
139 | struct page *drbd_pp_pool; | |
140 | spinlock_t drbd_pp_lock; | |
141 | int drbd_pp_vacant; | |
142 | wait_queue_head_t drbd_pp_wait; | |
143 | ||
144 | DEFINE_RATELIMIT_STATE(drbd_ratelimit_state, 5 * HZ, 5); | |
145 | ||
7d4e9d09 | 146 | static const struct block_device_operations drbd_ops = { |
b411b363 PR |
147 | .owner = THIS_MODULE, |
148 | .open = drbd_open, | |
149 | .release = drbd_release, | |
150 | }; | |
19f843aa | 151 | |
da4a75d2 LE |
152 | struct bio *bio_alloc_drbd(gfp_t gfp_mask) |
153 | { | |
154 | struct bio *bio; | |
19f843aa | 155 | |
da4a75d2 LE |
156 | if (!drbd_md_io_bio_set) |
157 | return bio_alloc(gfp_mask, 1); | |
19f843aa | 158 | |
da4a75d2 LE |
159 | bio = bio_alloc_bioset(gfp_mask, 1, drbd_md_io_bio_set); |
160 | if (!bio) | |
161 | return NULL; | |
da4a75d2 | 162 | return bio; |
19f843aa LE |
163 | } |
164 | ||
b411b363 PR |
165 | #ifdef __CHECKER__ |
166 | /* When checking with sparse, and this is an inline function, sparse will | |
167 | give tons of false positives. When this is a real functions sparse works. | |
b411b363 | 168 | */ |
b411b363 | 169 | int _get_ldev_if_state(struct drbd_conf *mdev, enum drbd_disk_state mins) |
b411b363 | 170 | { |
b411b363 | 171 | int io_allowed; |
b411b363 | 172 | |
b411b363 PR |
173 | atomic_inc(&mdev->local_cnt); |
174 | io_allowed = (mdev->state.disk >= mins); | |
175 | if (!io_allowed) { | |
176 | if (atomic_dec_and_test(&mdev->local_cnt)) | |
177 | wake_up(&mdev->misc_wait); | |
b411b363 | 178 | } |
b411b363 PR |
179 | return io_allowed; |
180 | } | |
b411b363 | 181 | |
b411b363 | 182 | #endif |
265be2d0 | 183 | |
b411b363 | 184 | /** |
b6dd1a89 LE |
185 | * tl_release() - mark as BARRIER_ACKED all requests in the corresponding transfer log epoch |
186 | * @tconn: DRBD connection. | |
b411b363 PR |
187 | * @barrier_nr: Expected identifier of the DRBD write barrier packet. |
188 | * @set_size: Expected number of requests before that barrier. | |
189 | * | |
190 | * In case the passed barrier_nr or set_size does not match the oldest | |
b6dd1a89 LE |
191 | * epoch of not yet barrier-acked requests, this function will cause a |
192 | * termination of the connection. | |
b411b363 | 193 | */ |
2f5cdd0b PR |
194 | void tl_release(struct drbd_tconn *tconn, unsigned int barrier_nr, |
195 | unsigned int set_size) | |
b411b363 | 196 | { |
b411b363 | 197 | struct drbd_request *r; |
b6dd1a89 LE |
198 | struct drbd_request *req = NULL; |
199 | int expect_epoch = 0; | |
200 | int expect_size = 0; | |
b411b363 | 201 | |
2f5cdd0b | 202 | spin_lock_irq(&tconn->req_lock); |
b411b363 | 203 | |
98683650 | 204 | /* find oldest not yet barrier-acked write request, |
b6dd1a89 LE |
205 | * count writes in its epoch. */ |
206 | list_for_each_entry(r, &tconn->transfer_log, tl_requests) { | |
a0d856df | 207 | const unsigned s = r->rq_state; |
b6dd1a89 LE |
208 | if (!req) { |
209 | if (!(s & RQ_WRITE)) | |
210 | continue; | |
211 | if (!(s & RQ_NET_MASK)) | |
212 | continue; | |
213 | if (s & RQ_NET_DONE) | |
214 | continue; | |
215 | req = r; | |
216 | expect_epoch = req->epoch; | |
217 | expect_size ++; | |
218 | } else { | |
219 | if (r->epoch != expect_epoch) | |
220 | break; | |
221 | if (!(s & RQ_WRITE)) | |
222 | continue; | |
223 | /* if (s & RQ_DONE): not expected */ | |
224 | /* if (!(s & RQ_NET_MASK)): not expected */ | |
225 | expect_size++; | |
43a5182c | 226 | } |
b411b363 | 227 | } |
67098930 | 228 | |
b411b363 | 229 | /* first some paranoia code */ |
b6dd1a89 | 230 | if (req == NULL) { |
2f5cdd0b PR |
231 | conn_err(tconn, "BAD! BarrierAck #%u received, but no epoch in tl!?\n", |
232 | barrier_nr); | |
b411b363 | 233 | goto bail; |
b411b363 | 234 | } |
b6dd1a89 | 235 | if (expect_epoch != barrier_nr) { |
2f5cdd0b | 236 | conn_err(tconn, "BAD! BarrierAck #%u received, expected #%u!\n", |
b6dd1a89 | 237 | barrier_nr, expect_epoch); |
b411b363 | 238 | goto bail; |
5a22db89 LE |
239 | } |
240 | ||
b6dd1a89 | 241 | if (expect_size != set_size) { |
2f5cdd0b | 242 | conn_err(tconn, "BAD! BarrierAck #%u received with n_writes=%u, expected n_writes=%u!\n", |
b6dd1a89 | 243 | barrier_nr, set_size, expect_size); |
b411b363 | 244 | goto bail; |
b411b363 PR |
245 | } |
246 | ||
98683650 PR |
247 | /* Clean up list of requests processed during current epoch. */ |
248 | /* this extra list walk restart is paranoia, | |
249 | * to catch requests being barrier-acked "unexpectedly". | |
250 | * It usually should find the same req again, or some READ preceding it. */ | |
251 | list_for_each_entry(req, &tconn->transfer_log, tl_requests) | |
252 | if (req->epoch == expect_epoch) | |
253 | break; | |
254 | list_for_each_entry_safe_from(req, r, &tconn->transfer_log, tl_requests) { | |
b6dd1a89 LE |
255 | if (req->epoch != expect_epoch) |
256 | break; | |
257 | _req_mod(req, BARRIER_ACKED); | |
19f843aa | 258 | } |
2f5cdd0b | 259 | spin_unlock_irq(&tconn->req_lock); |
19f843aa | 260 | |
b411b363 | 261 | return; |
b411b363 | 262 | |
b411b363 | 263 | bail: |
2f5cdd0b PR |
264 | spin_unlock_irq(&tconn->req_lock); |
265 | conn_request_state(tconn, NS(conn, C_PROTOCOL_ERROR), CS_HARD); | |
b411b363 | 266 | } |
b411b363 | 267 | |
b411b363 | 268 | |
b411b363 | 269 | /** |
11b58e73 | 270 | * _tl_restart() - Walks the transfer log, and applies an action to all requests |
b411b363 | 271 | * @mdev: DRBD device. |
11b58e73 | 272 | * @what: The action/event to perform with all request objects |
b411b363 | 273 | * |
8554df1c AG |
274 | * @what might be one of CONNECTION_LOST_WHILE_PENDING, RESEND, FAIL_FROZEN_DISK_IO, |
275 | * RESTART_FROZEN_DISK_IO. | |
b411b363 | 276 | */ |
b6dd1a89 | 277 | /* must hold resource->req_lock */ |
2f5cdd0b | 278 | void _tl_restart(struct drbd_tconn *tconn, enum drbd_req_event what) |
b411b363 | 279 | { |
b6dd1a89 | 280 | struct drbd_request *req, *r; |
b411b363 | 281 | |
b6dd1a89 LE |
282 | list_for_each_entry_safe(req, r, &tconn->transfer_log, tl_requests) |
283 | _req_mod(req, what); | |
284 | } | |
738a84b2 | 285 | |
b6dd1a89 LE |
286 | void tl_restart(struct drbd_tconn *tconn, enum drbd_req_event what) |
287 | { | |
288 | spin_lock_irq(&tconn->req_lock); | |
289 | _tl_restart(tconn, what); | |
290 | spin_unlock_irq(&tconn->req_lock); | |
cdfda633 | 291 | } |
b411b363 | 292 | |
b411b363 PR |
293 | /** |
294 | * tl_clear() - Clears all requests and &struct drbd_tl_epoch objects out of the TL | |
295 | * @mdev: DRBD device. | |
296 | * | |
297 | * This is called after the connection to the peer was lost. The storage covered | |
298 | * by the requests on the transfer gets marked as our of sync. Called from the | |
299 | * receiver thread and the worker thread. | |
300 | */ | |
2f5cdd0b | 301 | void tl_clear(struct drbd_tconn *tconn) |
b411b363 | 302 | { |
b6dd1a89 | 303 | tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING); |
b411b363 | 304 | } |
197296ff | 305 | |
cdfda633 | 306 | /** |
71fc7eed | 307 | * tl_abort_disk_io() - Abort disk I/O for all requests for a certain mdev in the TL |
cdfda633 | 308 | * @mdev: DRBD device. |
cdfda633 | 309 | */ |
71fc7eed | 310 | void tl_abort_disk_io(struct drbd_conf *mdev) |
cdfda633 PR |
311 | { |
312 | struct drbd_tconn *tconn = mdev->tconn; | |
b6dd1a89 | 313 | struct drbd_request *req, *r; |
02851e9f | 314 | |
cdfda633 | 315 | spin_lock_irq(&tconn->req_lock); |
b6dd1a89 | 316 | list_for_each_entry_safe(req, r, &tconn->transfer_log, tl_requests) { |
97ddb687 LE |
317 | if (!(req->rq_state & RQ_LOCAL_PENDING)) |
318 | continue; | |
b6dd1a89 LE |
319 | if (req->w.mdev != mdev) |
320 | continue; | |
321 | _req_mod(req, ABORT_DISK_IO); | |
b411b363 | 322 | } |
cdfda633 | 323 | spin_unlock_irq(&tconn->req_lock); |
b411b363 PR |
324 | } |
325 | ||
b411b363 PR |
326 | static int drbd_thread_setup(void *arg) |
327 | { | |
328 | struct drbd_thread *thi = (struct drbd_thread *) arg; | |
392c8801 | 329 | struct drbd_tconn *tconn = thi->tconn; |
b411b363 PR |
330 | unsigned long flags; |
331 | int retval; | |
332 | ||
f1b3a6ec | 333 | snprintf(current->comm, sizeof(current->comm), "drbd_%c_%s", |
392c8801 | 334 | thi->name[0], thi->tconn->name); |
f1b3a6ec | 335 | |
b411b363 PR |
336 | restart: |
337 | retval = thi->function(thi); | |
338 | ||
339 | spin_lock_irqsave(&thi->t_lock, flags); | |
340 | ||
e77a0a5c | 341 | /* if the receiver has been "EXITING", the last thing it did |
b411b363 PR |
342 | * was set the conn state to "StandAlone", |
343 | * if now a re-connect request comes in, conn state goes C_UNCONNECTED, | |
344 | * and receiver thread will be "started". | |
e77a0a5c | 345 | * drbd_thread_start needs to set "RESTARTING" in that case. |
b411b363 | 346 | * t_state check and assignment needs to be within the same spinlock, |
e77a0a5c AG |
347 | * so either thread_start sees EXITING, and can remap to RESTARTING, |
348 | * or thread_start see NONE, and can proceed as normal. | |
b411b363 PR |
349 | */ |
350 | ||
e77a0a5c | 351 | if (thi->t_state == RESTARTING) { |
392c8801 | 352 | conn_info(tconn, "Restarting %s thread\n", thi->name); |
e77a0a5c | 353 | thi->t_state = RUNNING; |
b411b363 PR |
354 | spin_unlock_irqrestore(&thi->t_lock, flags); |
355 | goto restart; | |
356 | } | |
357 | ||
358 | thi->task = NULL; | |
e77a0a5c | 359 | thi->t_state = NONE; |
b411b363 | 360 | smp_mb(); |
992d6e91 | 361 | complete_all(&thi->stop); |
b411b363 PR |
362 | spin_unlock_irqrestore(&thi->t_lock, flags); |
363 | ||
392c8801 | 364 | conn_info(tconn, "Terminating %s\n", current->comm); |
b411b363 PR |
365 | |
366 | /* Release mod reference taken when thread was started */ | |
9dc9fbb3 PR |
367 | |
368 | kref_put(&tconn->kref, &conn_destroy); | |
b411b363 PR |
369 | module_put(THIS_MODULE); |
370 | return retval; | |
371 | } | |
372 | ||
392c8801 | 373 | static void drbd_thread_init(struct drbd_tconn *tconn, struct drbd_thread *thi, |
bed879ae | 374 | int (*func) (struct drbd_thread *), char *name) |
b411b363 PR |
375 | { |
376 | spin_lock_init(&thi->t_lock); | |
377 | thi->task = NULL; | |
e77a0a5c | 378 | thi->t_state = NONE; |
b411b363 | 379 | thi->function = func; |
392c8801 | 380 | thi->tconn = tconn; |
bed879ae | 381 | strncpy(thi->name, name, ARRAY_SIZE(thi->name)); |
b411b363 PR |
382 | } |
383 | ||
384 | int drbd_thread_start(struct drbd_thread *thi) | |
385 | { | |
392c8801 | 386 | struct drbd_tconn *tconn = thi->tconn; |
b411b363 PR |
387 | struct task_struct *nt; |
388 | unsigned long flags; | |
389 | ||
b411b363 PR |
390 | /* is used from state engine doing drbd_thread_stop_nowait, |
391 | * while holding the req lock irqsave */ | |
392 | spin_lock_irqsave(&thi->t_lock, flags); | |
393 | ||
394 | switch (thi->t_state) { | |
e77a0a5c | 395 | case NONE: |
392c8801 | 396 | conn_info(tconn, "Starting %s thread (from %s [%d])\n", |
bed879ae | 397 | thi->name, current->comm, current->pid); |
b411b363 PR |
398 | |
399 | /* Get ref on module for thread - this is released when thread exits */ | |
400 | if (!try_module_get(THIS_MODULE)) { | |
392c8801 | 401 | conn_err(tconn, "Failed to get module reference in drbd_thread_start\n"); |
b411b363 | 402 | spin_unlock_irqrestore(&thi->t_lock, flags); |
81e84650 | 403 | return false; |
b411b363 PR |
404 | } |
405 | ||
9dc9fbb3 PR |
406 | kref_get(&thi->tconn->kref); |
407 | ||
b411b363 | 408 | init_completion(&thi->stop); |
b411b363 | 409 | thi->reset_cpu_mask = 1; |
e77a0a5c | 410 | thi->t_state = RUNNING; |
b411b363 PR |
411 | spin_unlock_irqrestore(&thi->t_lock, flags); |
412 | flush_signals(current); /* otherw. may get -ERESTARTNOINTR */ | |
413 | ||
414 | nt = kthread_create(drbd_thread_setup, (void *) thi, | |
392c8801 | 415 | "drbd_%c_%s", thi->name[0], thi->tconn->name); |
b411b363 PR |
416 | |
417 | if (IS_ERR(nt)) { | |
392c8801 | 418 | conn_err(tconn, "Couldn't start thread\n"); |
b411b363 | 419 | |
9dc9fbb3 | 420 | kref_put(&tconn->kref, &conn_destroy); |
b411b363 | 421 | module_put(THIS_MODULE); |
81e84650 | 422 | return false; |
b411b363 PR |
423 | } |
424 | spin_lock_irqsave(&thi->t_lock, flags); | |
425 | thi->task = nt; | |
e77a0a5c | 426 | thi->t_state = RUNNING; |
b411b363 PR |
427 | spin_unlock_irqrestore(&thi->t_lock, flags); |
428 | wake_up_process(nt); | |
429 | break; | |
e77a0a5c AG |
430 | case EXITING: |
431 | thi->t_state = RESTARTING; | |
392c8801 | 432 | conn_info(tconn, "Restarting %s thread (from %s [%d])\n", |
bed879ae | 433 | thi->name, current->comm, current->pid); |
b411b363 | 434 | /* fall through */ |
e77a0a5c AG |
435 | case RUNNING: |
436 | case RESTARTING: | |
b411b363 PR |
437 | default: |
438 | spin_unlock_irqrestore(&thi->t_lock, flags); | |
439 | break; | |
440 | } | |
441 | ||
81e84650 | 442 | return true; |
b411b363 PR |
443 | } |
444 | ||
445 | ||
446 | void _drbd_thread_stop(struct drbd_thread *thi, int restart, int wait) | |
447 | { | |
448 | unsigned long flags; | |
449 | ||
e77a0a5c | 450 | enum drbd_thread_state ns = restart ? RESTARTING : EXITING; |
b411b363 PR |
451 | |
452 | /* may be called from state engine, holding the req lock irqsave */ | |
453 | spin_lock_irqsave(&thi->t_lock, flags); | |
454 | ||
e77a0a5c | 455 | if (thi->t_state == NONE) { |
b411b363 PR |
456 | spin_unlock_irqrestore(&thi->t_lock, flags); |
457 | if (restart) | |
458 | drbd_thread_start(thi); | |
459 | return; | |
460 | } | |
461 | ||
462 | if (thi->t_state != ns) { | |
463 | if (thi->task == NULL) { | |
464 | spin_unlock_irqrestore(&thi->t_lock, flags); | |
465 | return; | |
466 | } | |
467 | ||
468 | thi->t_state = ns; | |
469 | smp_mb(); | |
470 | init_completion(&thi->stop); | |
471 | if (thi->task != current) | |
472 | force_sig(DRBD_SIGKILL, thi->task); | |
b411b363 PR |
473 | } |
474 | ||
475 | spin_unlock_irqrestore(&thi->t_lock, flags); | |
476 | ||
477 | if (wait) | |
478 | wait_for_completion(&thi->stop); | |
479 | } | |
480 | ||
392c8801 | 481 | static struct drbd_thread *drbd_task_to_thread(struct drbd_tconn *tconn, struct task_struct *task) |
bed879ae | 482 | { |
bed879ae PR |
483 | struct drbd_thread *thi = |
484 | task == tconn->receiver.task ? &tconn->receiver : | |
485 | task == tconn->asender.task ? &tconn->asender : | |
486 | task == tconn->worker.task ? &tconn->worker : NULL; | |
487 | ||
488 | return thi; | |
489 | } | |
490 | ||
392c8801 | 491 | char *drbd_task_to_thread_name(struct drbd_tconn *tconn, struct task_struct *task) |
bed879ae | 492 | { |
392c8801 | 493 | struct drbd_thread *thi = drbd_task_to_thread(tconn, task); |
bed879ae PR |
494 | return thi ? thi->name : task->comm; |
495 | } | |
496 | ||
80883197 | 497 | int conn_lowest_minor(struct drbd_tconn *tconn) |
80822284 | 498 | { |
e90285e0 | 499 | struct drbd_conf *mdev; |
695d08fa | 500 | int vnr = 0, m; |
774b3055 | 501 | |
695d08fa | 502 | rcu_read_lock(); |
e90285e0 | 503 | mdev = idr_get_next(&tconn->volumes, &vnr); |
695d08fa PR |
504 | m = mdev ? mdev_to_minor(mdev) : -1; |
505 | rcu_read_unlock(); | |
506 | ||
507 | return m; | |
80822284 | 508 | } |
774b3055 | 509 | |
b411b363 PR |
510 | #ifdef CONFIG_SMP |
511 | /** | |
512 | * drbd_calc_cpu_mask() - Generate CPU masks, spread over all CPUs | |
513 | * @mdev: DRBD device. | |
514 | * | |
515 | * Forces all threads of a device onto the same CPU. This is beneficial for | |
516 | * DRBD's performance. May be overwritten by user's configuration. | |
517 | */ | |
80822284 | 518 | void drbd_calc_cpu_mask(struct drbd_tconn *tconn) |
b411b363 PR |
519 | { |
520 | int ord, cpu; | |
521 | ||
522 | /* user override. */ | |
80822284 | 523 | if (cpumask_weight(tconn->cpu_mask)) |
b411b363 PR |
524 | return; |
525 | ||
80822284 | 526 | ord = conn_lowest_minor(tconn) % cpumask_weight(cpu_online_mask); |
b411b363 PR |
527 | for_each_online_cpu(cpu) { |
528 | if (ord-- == 0) { | |
80822284 | 529 | cpumask_set_cpu(cpu, tconn->cpu_mask); |
b411b363 PR |
530 | return; |
531 | } | |
532 | } | |
533 | /* should not be reached */ | |
80822284 | 534 | cpumask_setall(tconn->cpu_mask); |
b411b363 PR |
535 | } |
536 | ||
537 | /** | |
538 | * drbd_thread_current_set_cpu() - modifies the cpu mask of the _current_ thread | |
539 | * @mdev: DRBD device. | |
bc31fe33 | 540 | * @thi: drbd_thread object |
b411b363 PR |
541 | * |
542 | * call in the "main loop" of _all_ threads, no need for any mutex, current won't die | |
543 | * prematurely. | |
544 | */ | |
80822284 | 545 | void drbd_thread_current_set_cpu(struct drbd_thread *thi) |
b411b363 PR |
546 | { |
547 | struct task_struct *p = current; | |
bed879ae | 548 | |
b411b363 PR |
549 | if (!thi->reset_cpu_mask) |
550 | return; | |
551 | thi->reset_cpu_mask = 0; | |
392c8801 | 552 | set_cpus_allowed_ptr(p, thi->tconn->cpu_mask); |
b411b363 PR |
553 | } |
554 | #endif | |
555 | ||
52b061a4 AG |
556 | /** |
557 | * drbd_header_size - size of a packet header | |
558 | * | |
559 | * The header size is a multiple of 8, so any payload following the header is | |
560 | * word aligned on 64-bit architectures. (The bitmap send and receive code | |
561 | * relies on this.) | |
562 | */ | |
563 | unsigned int drbd_header_size(struct drbd_tconn *tconn) | |
b411b363 | 564 | { |
0c8e36d9 AG |
565 | if (tconn->agreed_pro_version >= 100) { |
566 | BUILD_BUG_ON(!IS_ALIGNED(sizeof(struct p_header100), 8)); | |
567 | return sizeof(struct p_header100); | |
568 | } else { | |
569 | BUILD_BUG_ON(sizeof(struct p_header80) != | |
570 | sizeof(struct p_header95)); | |
571 | BUILD_BUG_ON(!IS_ALIGNED(sizeof(struct p_header80), 8)); | |
572 | return sizeof(struct p_header80); | |
573 | } | |
52b061a4 | 574 | } |
b411b363 | 575 | |
e658983a | 576 | static unsigned int prepare_header80(struct p_header80 *h, enum drbd_packet cmd, int size) |
fd340c12 PR |
577 | { |
578 | h->magic = cpu_to_be32(DRBD_MAGIC); | |
579 | h->command = cpu_to_be16(cmd); | |
580 | h->length = cpu_to_be16(size); | |
e658983a | 581 | return sizeof(struct p_header80); |
fd340c12 | 582 | } |
b411b363 | 583 | |
e658983a | 584 | static unsigned int prepare_header95(struct p_header95 *h, enum drbd_packet cmd, int size) |
fd340c12 PR |
585 | { |
586 | h->magic = cpu_to_be16(DRBD_MAGIC_BIG); | |
b411b363 | 587 | h->command = cpu_to_be16(cmd); |
b55d84ba | 588 | h->length = cpu_to_be32(size); |
e658983a | 589 | return sizeof(struct p_header95); |
fd340c12 | 590 | } |
b411b363 | 591 | |
0c8e36d9 AG |
592 | static unsigned int prepare_header100(struct p_header100 *h, enum drbd_packet cmd, |
593 | int size, int vnr) | |
594 | { | |
595 | h->magic = cpu_to_be32(DRBD_MAGIC_100); | |
596 | h->volume = cpu_to_be16(vnr); | |
597 | h->command = cpu_to_be16(cmd); | |
598 | h->length = cpu_to_be32(size); | |
599 | h->pad = 0; | |
600 | return sizeof(struct p_header100); | |
601 | } | |
b411b363 | 602 | |
0c8e36d9 AG |
603 | static unsigned int prepare_header(struct drbd_tconn *tconn, int vnr, |
604 | void *buffer, enum drbd_packet cmd, int size) | |
d38e787e | 605 | { |
0c8e36d9 AG |
606 | if (tconn->agreed_pro_version >= 100) |
607 | return prepare_header100(buffer, cmd, size, vnr); | |
608 | else if (tconn->agreed_pro_version >= 95 && | |
609 | size > DRBD_MAX_SIZE_H80_PACKET) | |
e658983a | 610 | return prepare_header95(buffer, cmd, size); |
d38e787e | 611 | else |
e658983a | 612 | return prepare_header80(buffer, cmd, size); |
b411b363 PR |
613 | } |
614 | ||
a7eb7bdf AG |
615 | static void *__conn_prepare_command(struct drbd_tconn *tconn, |
616 | struct drbd_socket *sock) | |
b411b363 | 617 | { |
a7eb7bdf AG |
618 | if (!sock->socket) |
619 | return NULL; | |
620 | return sock->sbuf + drbd_header_size(tconn); | |
621 | } | |
b411b363 | 622 | |
dba58587 AG |
623 | void *conn_prepare_command(struct drbd_tconn *tconn, struct drbd_socket *sock) |
624 | { | |
a7eb7bdf | 625 | void *p; |
b411b363 | 626 | |
dba58587 | 627 | mutex_lock(&sock->mutex); |
a7eb7bdf AG |
628 | p = __conn_prepare_command(tconn, sock); |
629 | if (!p) | |
dba58587 | 630 | mutex_unlock(&sock->mutex); |
b411b363 | 631 | |
a7eb7bdf | 632 | return p; |
b411b363 PR |
633 | } |
634 | ||
dba58587 | 635 | void *drbd_prepare_command(struct drbd_conf *mdev, struct drbd_socket *sock) |
b411b363 | 636 | { |
dba58587 AG |
637 | return conn_prepare_command(mdev->tconn, sock); |
638 | } | |
b411b363 | 639 | |
dba58587 AG |
640 | static int __send_command(struct drbd_tconn *tconn, int vnr, |
641 | struct drbd_socket *sock, enum drbd_packet cmd, | |
642 | unsigned int header_size, void *data, | |
643 | unsigned int size) | |
644 | { | |
645 | int msg_flags; | |
646 | int err; | |
b411b363 | 647 | |
dba58587 AG |
648 | /* |
649 | * Called with @data == NULL and the size of the data blocks in @size | |
650 | * for commands that send data blocks. For those commands, omit the | |
651 | * MSG_MORE flag: this will increase the likelihood that data blocks | |
652 | * which are page aligned on the sender will end up page aligned on the | |
653 | * receiver. | |
654 | */ | |
655 | msg_flags = data ? MSG_MORE : 0; | |
656 | ||
e658983a AG |
657 | header_size += prepare_header(tconn, vnr, sock->sbuf, cmd, |
658 | header_size + size); | |
dba58587 AG |
659 | err = drbd_send_all(tconn, sock->socket, sock->sbuf, header_size, |
660 | msg_flags); | |
661 | if (data && !err) | |
662 | err = drbd_send_all(tconn, sock->socket, data, size, 0); | |
663 | return err; | |
664 | } | |
665 | ||
a7eb7bdf AG |
666 | static int __conn_send_command(struct drbd_tconn *tconn, struct drbd_socket *sock, |
667 | enum drbd_packet cmd, unsigned int header_size, | |
668 | void *data, unsigned int size) | |
669 | { | |
670 | return __send_command(tconn, 0, sock, cmd, header_size, data, size); | |
671 | } | |
672 | ||
dba58587 AG |
673 | int conn_send_command(struct drbd_tconn *tconn, struct drbd_socket *sock, |
674 | enum drbd_packet cmd, unsigned int header_size, | |
675 | void *data, unsigned int size) | |
676 | { | |
677 | int err; | |
b411b363 | 678 | |
a7eb7bdf | 679 | err = __conn_send_command(tconn, sock, cmd, header_size, data, size); |
dba58587 AG |
680 | mutex_unlock(&sock->mutex); |
681 | return err; | |
682 | } | |
683 | ||
684 | int drbd_send_command(struct drbd_conf *mdev, struct drbd_socket *sock, | |
685 | enum drbd_packet cmd, unsigned int header_size, | |
686 | void *data, unsigned int size) | |
687 | { | |
688 | int err; | |
689 | ||
690 | err = __send_command(mdev->tconn, mdev->vnr, sock, cmd, header_size, | |
691 | data, size); | |
692 | mutex_unlock(&sock->mutex); | |
693 | return err; | |
694 | } | |
b411b363 | 695 | |
e307f352 AG |
696 | int drbd_send_ping(struct drbd_tconn *tconn) |
697 | { | |
9f5bdc33 AG |
698 | struct drbd_socket *sock; |
699 | ||
700 | sock = &tconn->meta; | |
701 | if (!conn_prepare_command(tconn, sock)) | |
702 | return -EIO; | |
e658983a | 703 | return conn_send_command(tconn, sock, P_PING, 0, NULL, 0); |
e307f352 | 704 | } |
b411b363 | 705 | |
e307f352 AG |
706 | int drbd_send_ping_ack(struct drbd_tconn *tconn) |
707 | { | |
9f5bdc33 AG |
708 | struct drbd_socket *sock; |
709 | ||
710 | sock = &tconn->meta; | |
711 | if (!conn_prepare_command(tconn, sock)) | |
712 | return -EIO; | |
e658983a | 713 | return conn_send_command(tconn, sock, P_PING_ACK, 0, NULL, 0); |
b411b363 PR |
714 | } |
715 | ||
f399002e | 716 | int drbd_send_sync_param(struct drbd_conf *mdev) |
b411b363 | 717 | { |
7c96715a | 718 | struct drbd_socket *sock; |
8e26f9cc | 719 | struct p_rs_param_95 *p; |
9f5bdc33 | 720 | int size; |
31890f4a | 721 | const int apv = mdev->tconn->agreed_pro_version; |
9f5bdc33 | 722 | enum drbd_packet cmd; |
44ed167d | 723 | struct net_conf *nc; |
daeda1cc | 724 | struct disk_conf *dc; |
9f5bdc33 AG |
725 | |
726 | sock = &mdev->tconn->data; | |
727 | p = drbd_prepare_command(mdev, sock); | |
728 | if (!p) | |
729 | return -EIO; | |
b411b363 | 730 | |
44ed167d PR |
731 | rcu_read_lock(); |
732 | nc = rcu_dereference(mdev->tconn->net_conf); | |
b411b363 PR |
733 | |
734 | size = apv <= 87 ? sizeof(struct p_rs_param) | |
735 | : apv == 88 ? sizeof(struct p_rs_param) | |
44ed167d | 736 | + strlen(nc->verify_alg) + 1 |
8e26f9cc PR |
737 | : apv <= 94 ? sizeof(struct p_rs_param_89) |
738 | : /* apv >= 95 */ sizeof(struct p_rs_param_95); | |
b411b363 | 739 | |
9f5bdc33 | 740 | cmd = apv >= 89 ? P_SYNC_PARAM89 : P_SYNC_PARAM; |
b411b363 | 741 | |
9f5bdc33 AG |
742 | /* initialize verify_alg and csums_alg */ |
743 | memset(p->verify_alg, 0, 2 * SHARED_SECRET_MAX); | |
b411b363 | 744 | |
9f5bdc33 | 745 | if (get_ldev(mdev)) { |
daeda1cc | 746 | dc = rcu_dereference(mdev->ldev->disk_conf); |
6394b935 | 747 | p->resync_rate = cpu_to_be32(dc->resync_rate); |
daeda1cc PR |
748 | p->c_plan_ahead = cpu_to_be32(dc->c_plan_ahead); |
749 | p->c_delay_target = cpu_to_be32(dc->c_delay_target); | |
750 | p->c_fill_target = cpu_to_be32(dc->c_fill_target); | |
751 | p->c_max_rate = cpu_to_be32(dc->c_max_rate); | |
9f5bdc33 AG |
752 | put_ldev(mdev); |
753 | } else { | |
6394b935 | 754 | p->resync_rate = cpu_to_be32(DRBD_RESYNC_RATE_DEF); |
9f5bdc33 AG |
755 | p->c_plan_ahead = cpu_to_be32(DRBD_C_PLAN_AHEAD_DEF); |
756 | p->c_delay_target = cpu_to_be32(DRBD_C_DELAY_TARGET_DEF); | |
757 | p->c_fill_target = cpu_to_be32(DRBD_C_FILL_TARGET_DEF); | |
758 | p->c_max_rate = cpu_to_be32(DRBD_C_MAX_RATE_DEF); | |
759 | } | |
b411b363 | 760 | |
9f5bdc33 | 761 | if (apv >= 88) |
44ed167d | 762 | strcpy(p->verify_alg, nc->verify_alg); |
9f5bdc33 | 763 | if (apv >= 89) |
44ed167d PR |
764 | strcpy(p->csums_alg, nc->csums_alg); |
765 | rcu_read_unlock(); | |
b411b363 | 766 | |
9f5bdc33 | 767 | return drbd_send_command(mdev, sock, cmd, size, NULL, 0); |
b411b363 PR |
768 | } |
769 | ||
d659f2aa | 770 | int __drbd_send_protocol(struct drbd_tconn *tconn, enum drbd_packet cmd) |
b411b363 | 771 | { |
9f5bdc33 | 772 | struct drbd_socket *sock; |
b411b363 | 773 | struct p_protocol *p; |
44ed167d | 774 | struct net_conf *nc; |
9f5bdc33 | 775 | int size, cf; |
b411b363 | 776 | |
9f5bdc33 | 777 | sock = &tconn->data; |
a7eb7bdf | 778 | p = __conn_prepare_command(tconn, sock); |
9f5bdc33 AG |
779 | if (!p) |
780 | return -EIO; | |
b411b363 | 781 | |
44ed167d PR |
782 | rcu_read_lock(); |
783 | nc = rcu_dereference(tconn->net_conf); | |
b411b363 | 784 | |
6dff2902 | 785 | if (nc->tentative && tconn->agreed_pro_version < 92) { |
44ed167d PR |
786 | rcu_read_unlock(); |
787 | mutex_unlock(&sock->mutex); | |
788 | conn_err(tconn, "--dry-run is not supported by peer"); | |
789 | return -EOPNOTSUPP; | |
790 | } | |
b411b363 | 791 | |
9f5bdc33 | 792 | size = sizeof(*p); |
dc8228d1 | 793 | if (tconn->agreed_pro_version >= 87) |
44ed167d | 794 | size += strlen(nc->integrity_alg) + 1; |
b411b363 | 795 | |
44ed167d PR |
796 | p->protocol = cpu_to_be32(nc->wire_protocol); |
797 | p->after_sb_0p = cpu_to_be32(nc->after_sb_0p); | |
798 | p->after_sb_1p = cpu_to_be32(nc->after_sb_1p); | |
799 | p->after_sb_2p = cpu_to_be32(nc->after_sb_2p); | |
800 | p->two_primaries = cpu_to_be32(nc->two_primaries); | |
cf14c2e9 | 801 | cf = 0; |
6139f60d AG |
802 | if (nc->discard_my_data) |
803 | cf |= CF_DISCARD_MY_DATA; | |
6dff2902 | 804 | if (nc->tentative) |
9f5bdc33 | 805 | cf |= CF_DRY_RUN; |
cf14c2e9 PR |
806 | p->conn_flags = cpu_to_be32(cf); |
807 | ||
dc8228d1 | 808 | if (tconn->agreed_pro_version >= 87) |
44ed167d PR |
809 | strcpy(p->integrity_alg, nc->integrity_alg); |
810 | rcu_read_unlock(); | |
b411b363 | 811 | |
d659f2aa | 812 | return __conn_send_command(tconn, sock, cmd, size, NULL, 0); |
a7eb7bdf AG |
813 | } |
814 | ||
815 | int drbd_send_protocol(struct drbd_tconn *tconn) | |
816 | { | |
817 | int err; | |
818 | ||
819 | mutex_lock(&tconn->data.mutex); | |
d659f2aa | 820 | err = __drbd_send_protocol(tconn, P_PROTOCOL); |
a7eb7bdf AG |
821 | mutex_unlock(&tconn->data.mutex); |
822 | ||
823 | return err; | |
b411b363 PR |
824 | } |
825 | ||
826 | int _drbd_send_uuids(struct drbd_conf *mdev, u64 uuid_flags) | |
827 | { | |
9f5bdc33 AG |
828 | struct drbd_socket *sock; |
829 | struct p_uuids *p; | |
b411b363 PR |
830 | int i; |
831 | ||
832 | if (!get_ldev_if_state(mdev, D_NEGOTIATING)) | |
2ae5f95b | 833 | return 0; |
b411b363 | 834 | |
9f5bdc33 AG |
835 | sock = &mdev->tconn->data; |
836 | p = drbd_prepare_command(mdev, sock); | |
837 | if (!p) { | |
838 | put_ldev(mdev); | |
839 | return -EIO; | |
840 | } | |
9f2247bb | 841 | spin_lock_irq(&mdev->ldev->md.uuid_lock); |
b411b363 | 842 | for (i = UI_CURRENT; i < UI_SIZE; i++) |
298307ed | 843 | p->uuid[i] = cpu_to_be64(mdev->ldev->md.uuid[i]); |
9f2247bb | 844 | spin_unlock_irq(&mdev->ldev->md.uuid_lock); |
b411b363 PR |
845 | |
846 | mdev->comm_bm_set = drbd_bm_total_weight(mdev); | |
9f5bdc33 | 847 | p->uuid[UI_SIZE] = cpu_to_be64(mdev->comm_bm_set); |
44ed167d | 848 | rcu_read_lock(); |
6139f60d | 849 | uuid_flags |= rcu_dereference(mdev->tconn->net_conf)->discard_my_data ? 1 : 0; |
44ed167d | 850 | rcu_read_unlock(); |
b411b363 PR |
851 | uuid_flags |= test_bit(CRASHED_PRIMARY, &mdev->flags) ? 2 : 0; |
852 | uuid_flags |= mdev->new_state_tmp.disk == D_INCONSISTENT ? 4 : 0; | |
9f5bdc33 | 853 | p->uuid[UI_FLAGS] = cpu_to_be64(uuid_flags); |
b411b363 PR |
854 | |
855 | put_ldev(mdev); | |
9f5bdc33 | 856 | return drbd_send_command(mdev, sock, P_UUIDS, sizeof(*p), NULL, 0); |
b411b363 PR |
857 | } |
858 | ||
859 | int drbd_send_uuids(struct drbd_conf *mdev) | |
860 | { | |
861 | return _drbd_send_uuids(mdev, 0); | |
862 | } | |
863 | ||
864 | int drbd_send_uuids_skip_initial_sync(struct drbd_conf *mdev) | |
865 | { | |
866 | return _drbd_send_uuids(mdev, 8); | |
867 | } | |
868 | ||
62b0da3a LE |
869 | void drbd_print_uuids(struct drbd_conf *mdev, const char *text) |
870 | { | |
871 | if (get_ldev_if_state(mdev, D_NEGOTIATING)) { | |
872 | u64 *uuid = mdev->ldev->md.uuid; | |
873 | dev_info(DEV, "%s %016llX:%016llX:%016llX:%016llX\n", | |
874 | text, | |
875 | (unsigned long long)uuid[UI_CURRENT], | |
876 | (unsigned long long)uuid[UI_BITMAP], | |
877 | (unsigned long long)uuid[UI_HISTORY_START], | |
878 | (unsigned long long)uuid[UI_HISTORY_END]); | |
879 | put_ldev(mdev); | |
880 | } else { | |
881 | dev_info(DEV, "%s effective data uuid: %016llX\n", | |
882 | text, | |
883 | (unsigned long long)mdev->ed_uuid); | |
884 | } | |
885 | } | |
886 | ||
9c1b7f72 | 887 | void drbd_gen_and_send_sync_uuid(struct drbd_conf *mdev) |
b411b363 | 888 | { |
9f5bdc33 AG |
889 | struct drbd_socket *sock; |
890 | struct p_rs_uuid *p; | |
5a22db89 LE |
891 | u64 uuid; |
892 | ||
893 | D_ASSERT(mdev->state.disk == D_UP_TO_DATE); | |
b411b363 | 894 | |
5ba3dac5 PR |
895 | uuid = mdev->ldev->md.uuid[UI_BITMAP]; |
896 | if (uuid && uuid != UUID_JUST_CREATED) | |
897 | uuid = uuid + UUID_NEW_BM_OFFSET; | |
898 | else | |
899 | get_random_bytes(&uuid, sizeof(u64)); | |
5a22db89 | 900 | drbd_uuid_set(mdev, UI_BITMAP, uuid); |
62b0da3a | 901 | drbd_print_uuids(mdev, "updated sync UUID"); |
5a22db89 | 902 | drbd_md_sync(mdev); |
b411b363 | 903 | |
9f5bdc33 AG |
904 | sock = &mdev->tconn->data; |
905 | p = drbd_prepare_command(mdev, sock); | |
906 | if (p) { | |
907 | p->uuid = cpu_to_be64(uuid); | |
908 | drbd_send_command(mdev, sock, P_SYNC_UUID, sizeof(*p), NULL, 0); | |
909 | } | |
b411b363 PR |
910 | } |
911 | ||
e89b591c | 912 | int drbd_send_sizes(struct drbd_conf *mdev, int trigger_reply, enum dds_flags flags) |
b411b363 | 913 | { |
9f5bdc33 AG |
914 | struct drbd_socket *sock; |
915 | struct p_sizes *p; | |
b411b363 | 916 | sector_t d_size, u_size; |
db141b2f LE |
917 | int q_order_type; |
918 | unsigned int max_bio_size; | |
b411b363 PR |
919 | |
920 | if (get_ldev_if_state(mdev, D_NEGOTIATING)) { | |
921 | D_ASSERT(mdev->ldev->backing_bdev); | |
922 | d_size = drbd_get_max_capacity(mdev->ldev); | |
daeda1cc PR |
923 | rcu_read_lock(); |
924 | u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size; | |
925 | rcu_read_unlock(); | |
b411b363 | 926 | q_order_type = drbd_queue_order_type(mdev); |
99432fcc | 927 | max_bio_size = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9; |
db141b2f | 928 | max_bio_size = min(max_bio_size, DRBD_MAX_BIO_SIZE); |
b411b363 PR |
929 | put_ldev(mdev); |
930 | } else { | |
931 | d_size = 0; | |
932 | u_size = 0; | |
933 | q_order_type = QUEUE_ORDERED_NONE; | |
99432fcc | 934 | max_bio_size = DRBD_MAX_BIO_SIZE; /* ... multiple BIOs per peer_request */ |
b411b363 PR |
935 | } |
936 | ||
9f5bdc33 AG |
937 | sock = &mdev->tconn->data; |
938 | p = drbd_prepare_command(mdev, sock); | |
939 | if (!p) | |
940 | return -EIO; | |
6809384c | 941 | |
2ffca4f3 | 942 | if (mdev->tconn->agreed_pro_version <= 94) |
98683650 | 943 | max_bio_size = min(max_bio_size, DRBD_MAX_SIZE_H80_PACKET); |
2ffca4f3 | 944 | else if (mdev->tconn->agreed_pro_version < 100) |
98683650 | 945 | max_bio_size = min(max_bio_size, DRBD_MAX_BIO_SIZE_P95); |
b411b363 | 946 | |
9f5bdc33 AG |
947 | p->d_size = cpu_to_be64(d_size); |
948 | p->u_size = cpu_to_be64(u_size); | |
949 | p->c_size = cpu_to_be64(trigger_reply ? 0 : drbd_get_capacity(mdev->this_bdev)); | |
950 | p->max_bio_size = cpu_to_be32(max_bio_size); | |
951 | p->queue_order_type = cpu_to_be16(q_order_type); | |
952 | p->dds_flags = cpu_to_be16(flags); | |
953 | return drbd_send_command(mdev, sock, P_SIZES, sizeof(*p), NULL, 0); | |
b411b363 PR |
954 | } |
955 | ||
956 | /** | |
f479ea06 | 957 | * drbd_send_current_state() - Sends the drbd state to the peer |
b411b363 PR |
958 | * @mdev: DRBD device. |
959 | */ | |
f479ea06 | 960 | int drbd_send_current_state(struct drbd_conf *mdev) |
b411b363 | 961 | { |
7c96715a | 962 | struct drbd_socket *sock; |
9f5bdc33 | 963 | struct p_state *p; |
b411b363 | 964 | |
7c96715a | 965 | sock = &mdev->tconn->data; |
9f5bdc33 AG |
966 | p = drbd_prepare_command(mdev, sock); |
967 | if (!p) | |
968 | return -EIO; | |
969 | p->state = cpu_to_be32(mdev->state.i); /* Within the send mutex */ | |
970 | return drbd_send_command(mdev, sock, P_STATE, sizeof(*p), NULL, 0); | |
b411b363 PR |
971 | } |
972 | ||
f479ea06 LE |
973 | /** |
974 | * drbd_send_state() - After a state change, sends the new state to the peer | |
43de7c85 PR |
975 | * @mdev: DRBD device. |
976 | * @state: the state to send, not necessarily the current state. | |
f479ea06 LE |
977 | * |
978 | * Each state change queues an "after_state_ch" work, which will eventually | |
979 | * send the resulting new state to the peer. If more state changes happen | |
980 | * between queuing and processing of the after_state_ch work, we still | |
981 | * want to send each intermediary state in the order it occurred. | |
982 | */ | |
983 | int drbd_send_state(struct drbd_conf *mdev, union drbd_state state) | |
984 | { | |
43de7c85 PR |
985 | struct drbd_socket *sock; |
986 | struct p_state *p; | |
f479ea06 | 987 | |
43de7c85 PR |
988 | sock = &mdev->tconn->data; |
989 | p = drbd_prepare_command(mdev, sock); | |
990 | if (!p) | |
991 | return -EIO; | |
992 | p->state = cpu_to_be32(state.i); /* Within the send mutex */ | |
993 | return drbd_send_command(mdev, sock, P_STATE, sizeof(*p), NULL, 0); | |
994 | } | |
f479ea06 | 995 | |
9f5bdc33 AG |
996 | int drbd_send_state_req(struct drbd_conf *mdev, union drbd_state mask, union drbd_state val) |
997 | { | |
998 | struct drbd_socket *sock; | |
999 | struct p_req_state *p; | |
f479ea06 | 1000 | |
9f5bdc33 AG |
1001 | sock = &mdev->tconn->data; |
1002 | p = drbd_prepare_command(mdev, sock); | |
1003 | if (!p) | |
1004 | return -EIO; | |
1005 | p->mask = cpu_to_be32(mask.i); | |
1006 | p->val = cpu_to_be32(val.i); | |
1007 | return drbd_send_command(mdev, sock, P_STATE_CHG_REQ, sizeof(*p), NULL, 0); | |
b411b363 | 1008 | } |
f479ea06 | 1009 | |
9f5bdc33 | 1010 | int conn_send_state_req(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val) |
b411b363 | 1011 | { |
9f5bdc33 AG |
1012 | enum drbd_packet cmd; |
1013 | struct drbd_socket *sock; | |
1014 | struct p_req_state *p; | |
f479ea06 | 1015 | |
9f5bdc33 AG |
1016 | cmd = tconn->agreed_pro_version < 100 ? P_STATE_CHG_REQ : P_CONN_ST_CHG_REQ; |
1017 | sock = &tconn->data; | |
1018 | p = conn_prepare_command(tconn, sock); | |
1019 | if (!p) | |
1020 | return -EIO; | |
1021 | p->mask = cpu_to_be32(mask.i); | |
1022 | p->val = cpu_to_be32(val.i); | |
1023 | return conn_send_command(tconn, sock, cmd, sizeof(*p), NULL, 0); | |
f479ea06 LE |
1024 | } |
1025 | ||
2f4e7abe | 1026 | void drbd_send_sr_reply(struct drbd_conf *mdev, enum drbd_state_rv retcode) |
b411b363 | 1027 | { |
9f5bdc33 AG |
1028 | struct drbd_socket *sock; |
1029 | struct p_req_state_reply *p; | |
b411b363 | 1030 | |
9f5bdc33 AG |
1031 | sock = &mdev->tconn->meta; |
1032 | p = drbd_prepare_command(mdev, sock); | |
1033 | if (p) { | |
1034 | p->retcode = cpu_to_be32(retcode); | |
1035 | drbd_send_command(mdev, sock, P_STATE_CHG_REPLY, sizeof(*p), NULL, 0); | |
1036 | } | |
b411b363 | 1037 | } |
b411b363 | 1038 | |
9f5bdc33 | 1039 | void conn_send_sr_reply(struct drbd_tconn *tconn, enum drbd_state_rv retcode) |
047cd4a6 | 1040 | { |
9f5bdc33 AG |
1041 | struct drbd_socket *sock; |
1042 | struct p_req_state_reply *p; | |
047cd4a6 | 1043 | enum drbd_packet cmd = tconn->agreed_pro_version < 100 ? P_STATE_CHG_REPLY : P_CONN_ST_CHG_REPLY; |
b411b363 | 1044 | |
9f5bdc33 AG |
1045 | sock = &tconn->meta; |
1046 | p = conn_prepare_command(tconn, sock); | |
1047 | if (p) { | |
1048 | p->retcode = cpu_to_be32(retcode); | |
1049 | conn_send_command(tconn, sock, cmd, sizeof(*p), NULL, 0); | |
1050 | } | |
b411b363 PR |
1051 | } |
1052 | ||
a02d1240 | 1053 | static void dcbp_set_code(struct p_compressed_bm *p, enum drbd_bitmap_code code) |
b411b363 | 1054 | { |
a02d1240 AG |
1055 | BUG_ON(code & ~0xf); |
1056 | p->encoding = (p->encoding & ~0xf) | code; | |
1057 | } | |
b411b363 | 1058 | |
a02d1240 AG |
1059 | static void dcbp_set_start(struct p_compressed_bm *p, int set) |
1060 | { | |
1061 | p->encoding = (p->encoding & ~0x80) | (set ? 0x80 : 0); | |
1062 | } | |
b411b363 | 1063 | |
a02d1240 AG |
1064 | static void dcbp_set_pad_bits(struct p_compressed_bm *p, int n) |
1065 | { | |
1066 | BUG_ON(n & ~0x7); | |
1067 | p->encoding = (p->encoding & (~0x7 << 4)) | (n << 4); | |
b411b363 PR |
1068 | } |
1069 | ||
1070 | int fill_bitmap_rle_bits(struct drbd_conf *mdev, | |
50d0b1ad AG |
1071 | struct p_compressed_bm *p, |
1072 | unsigned int size, | |
1073 | struct bm_xfer_ctx *c) | |
b411b363 PR |
1074 | { |
1075 | struct bitstream bs; | |
1076 | unsigned long plain_bits; | |
1077 | unsigned long tmp; | |
1078 | unsigned long rl; | |
1079 | unsigned len; | |
1080 | unsigned toggle; | |
44ed167d | 1081 | int bits, use_rle; |
b411b363 PR |
1082 | |
1083 | /* may we use this feature? */ | |
44ed167d PR |
1084 | rcu_read_lock(); |
1085 | use_rle = rcu_dereference(mdev->tconn->net_conf)->use_rle; | |
1086 | rcu_read_unlock(); | |
1087 | if (!use_rle || mdev->tconn->agreed_pro_version < 90) | |
1088 | return 0; | |
b411b363 PR |
1089 | |
1090 | if (c->bit_offset >= c->bm_bits) | |
1091 | return 0; /* nothing to do. */ | |
1092 | ||
1093 | /* use at most thus many bytes */ | |
50d0b1ad AG |
1094 | bitstream_init(&bs, p->code, size, 0); |
1095 | memset(p->code, 0, size); | |
b411b363 PR |
1096 | /* plain bits covered in this code string */ |
1097 | plain_bits = 0; | |
1098 | ||
1099 | /* p->encoding & 0x80 stores whether the first run length is set. | |
1100 | * bit offset is implicit. | |
1101 | * start with toggle == 2 to be able to tell the first iteration */ | |
1102 | toggle = 2; | |
1103 | ||
1104 | /* see how much plain bits we can stuff into one packet | |
1105 | * using RLE and VLI. */ | |
1106 | do { | |
1107 | tmp = (toggle == 0) ? _drbd_bm_find_next_zero(mdev, c->bit_offset) | |
1108 | : _drbd_bm_find_next(mdev, c->bit_offset); | |
1109 | if (tmp == -1UL) | |
1110 | tmp = c->bm_bits; | |
1111 | rl = tmp - c->bit_offset; | |
1112 | ||
1113 | if (toggle == 2) { /* first iteration */ | |
1114 | if (rl == 0) { | |
1115 | /* the first checked bit was set, | |
1116 | * store start value, */ | |
a02d1240 | 1117 | dcbp_set_start(p, 1); |
b411b363 PR |
1118 | /* but skip encoding of zero run length */ |
1119 | toggle = !toggle; | |
1120 | continue; | |
1121 | } | |
a02d1240 | 1122 | dcbp_set_start(p, 0); |
b411b363 PR |
1123 | } |
1124 | ||
1125 | /* paranoia: catch zero runlength. | |
1126 | * can only happen if bitmap is modified while we scan it. */ | |
1127 | if (rl == 0) { | |
1128 | dev_err(DEV, "unexpected zero runlength while encoding bitmap " | |
1129 | "t:%u bo:%lu\n", toggle, c->bit_offset); | |
1130 | return -1; | |
1131 | } | |
1132 | ||
1133 | bits = vli_encode_bits(&bs, rl); | |
1134 | if (bits == -ENOBUFS) /* buffer full */ | |
1135 | break; | |
1136 | if (bits <= 0) { | |
1137 | dev_err(DEV, "error while encoding bitmap: %d\n", bits); | |
1138 | return 0; | |
1139 | } | |
1140 | ||
1141 | toggle = !toggle; | |
1142 | plain_bits += rl; | |
1143 | c->bit_offset = tmp; | |
1144 | } while (c->bit_offset < c->bm_bits); | |
1145 | ||
1146 | len = bs.cur.b - p->code + !!bs.cur.bit; | |
1147 | ||
1148 | if (plain_bits < (len << 3)) { | |
1149 | /* incompressible with this method. | |
1150 | * we need to rewind both word and bit position. */ | |
1151 | c->bit_offset -= plain_bits; | |
1152 | bm_xfer_ctx_bit_to_word_offset(c); | |
1153 | c->bit_offset = c->word_offset * BITS_PER_LONG; | |
1154 | return 0; | |
1155 | } | |
1156 | ||
1157 | /* RLE + VLI was able to compress it just fine. | |
1158 | * update c->word_offset. */ | |
1159 | bm_xfer_ctx_bit_to_word_offset(c); | |
1160 | ||
1161 | /* store pad_bits */ | |
a02d1240 | 1162 | dcbp_set_pad_bits(p, (8 - bs.cur.bit) & 0x7); |
b411b363 PR |
1163 | |
1164 | return len; | |
1165 | } | |
1166 | ||
f70af118 AG |
1167 | /** |
1168 | * send_bitmap_rle_or_plain | |
1169 | * | |
1170 | * Return 0 when done, 1 when another iteration is needed, and a negative error | |
1171 | * code upon failure. | |
1172 | */ | |
1173 | static int | |
79ed9bd0 | 1174 | send_bitmap_rle_or_plain(struct drbd_conf *mdev, struct bm_xfer_ctx *c) |
b411b363 | 1175 | { |
9f5bdc33 | 1176 | struct drbd_socket *sock = &mdev->tconn->data; |
50d0b1ad | 1177 | unsigned int header_size = drbd_header_size(mdev->tconn); |
e658983a | 1178 | struct p_compressed_bm *p = sock->sbuf + header_size; |
a982dd57 | 1179 | int len, err; |
b411b363 | 1180 | |
e658983a AG |
1181 | len = fill_bitmap_rle_bits(mdev, p, |
1182 | DRBD_SOCKET_BUFFER_SIZE - header_size - sizeof(*p), c); | |
b411b363 | 1183 | if (len < 0) |
f70af118 | 1184 | return -EIO; |
b411b363 PR |
1185 | |
1186 | if (len) { | |
a02d1240 | 1187 | dcbp_set_code(p, RLE_VLI_Bits); |
9f5bdc33 AG |
1188 | err = __send_command(mdev->tconn, mdev->vnr, sock, |
1189 | P_COMPRESSED_BITMAP, sizeof(*p) + len, | |
1190 | NULL, 0); | |
b411b363 | 1191 | c->packets[0]++; |
e658983a | 1192 | c->bytes[0] += header_size + sizeof(*p) + len; |
b411b363 PR |
1193 | |
1194 | if (c->bit_offset >= c->bm_bits) | |
1195 | len = 0; /* DONE */ | |
1196 | } else { | |
1197 | /* was not compressible. | |
1198 | * send a buffer full of plain text bits instead. */ | |
50d0b1ad AG |
1199 | unsigned int data_size; |
1200 | unsigned long num_words; | |
e658983a | 1201 | unsigned long *p = sock->sbuf + header_size; |
50d0b1ad AG |
1202 | |
1203 | data_size = DRBD_SOCKET_BUFFER_SIZE - header_size; | |
e658983a | 1204 | num_words = min_t(size_t, data_size / sizeof(*p), |
50d0b1ad | 1205 | c->bm_words - c->word_offset); |
e658983a | 1206 | len = num_words * sizeof(*p); |
b411b363 | 1207 | if (len) |
e658983a AG |
1208 | drbd_bm_get_lel(mdev, c->word_offset, num_words, p); |
1209 | err = __send_command(mdev->tconn, mdev->vnr, sock, P_BITMAP, len, NULL, 0); | |
b411b363 PR |
1210 | c->word_offset += num_words; |
1211 | c->bit_offset = c->word_offset * BITS_PER_LONG; | |
1212 | ||
1213 | c->packets[1]++; | |
50d0b1ad | 1214 | c->bytes[1] += header_size + len; |
b411b363 PR |
1215 | |
1216 | if (c->bit_offset > c->bm_bits) | |
1217 | c->bit_offset = c->bm_bits; | |
1218 | } | |
a982dd57 | 1219 | if (!err) { |
f70af118 AG |
1220 | if (len == 0) { |
1221 | INFO_bm_xfer_stats(mdev, "send", c); | |
1222 | return 0; | |
1223 | } else | |
1224 | return 1; | |
1225 | } | |
1226 | return -EIO; | |
b411b363 PR |
1227 | } |
1228 | ||
1229 | /* See the comment at receive_bitmap() */ | |
058820cd | 1230 | static int _drbd_send_bitmap(struct drbd_conf *mdev) |
b411b363 PR |
1231 | { |
1232 | struct bm_xfer_ctx c; | |
f70af118 | 1233 | int err; |
b411b363 | 1234 | |
841ce241 | 1235 | if (!expect(mdev->bitmap)) |
81e84650 | 1236 | return false; |
b411b363 PR |
1237 | |
1238 | if (get_ldev(mdev)) { | |
1239 | if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) { | |
1240 | dev_info(DEV, "Writing the whole bitmap, MDF_FullSync was set.\n"); | |
1241 | drbd_bm_set_all(mdev); | |
1242 | if (drbd_bm_write(mdev)) { | |
1243 | /* write_bm did fail! Leave full sync flag set in Meta P_DATA | |
1244 | * but otherwise process as per normal - need to tell other | |
1245 | * side that a full resync is required! */ | |
1246 | dev_err(DEV, "Failed to write bitmap to disk!\n"); | |
1247 | } else { | |
1248 | drbd_md_clear_flag(mdev, MDF_FULL_SYNC); | |
1249 | drbd_md_sync(mdev); | |
1250 | } | |
1251 | } | |
1252 | put_ldev(mdev); | |
1253 | } | |
1254 | ||
1255 | c = (struct bm_xfer_ctx) { | |
1256 | .bm_bits = drbd_bm_bits(mdev), | |
1257 | .bm_words = drbd_bm_words(mdev), | |
1258 | }; | |
1259 | ||
1260 | do { | |
79ed9bd0 | 1261 | err = send_bitmap_rle_or_plain(mdev, &c); |
f70af118 | 1262 | } while (err > 0); |
b411b363 | 1263 | |
f70af118 | 1264 | return err == 0; |
b411b363 PR |
1265 | } |
1266 | ||
1267 | int drbd_send_bitmap(struct drbd_conf *mdev) | |
1268 | { | |
9f5bdc33 AG |
1269 | struct drbd_socket *sock = &mdev->tconn->data; |
1270 | int err = -1; | |
b411b363 | 1271 | |
9f5bdc33 AG |
1272 | mutex_lock(&sock->mutex); |
1273 | if (sock->socket) | |
1274 | err = !_drbd_send_bitmap(mdev); | |
1275 | mutex_unlock(&sock->mutex); | |
b411b363 PR |
1276 | return err; |
1277 | } | |
1278 | ||
9ed57dcb | 1279 | void drbd_send_b_ack(struct drbd_tconn *tconn, u32 barrier_nr, u32 set_size) |
b411b363 | 1280 | { |
9f5bdc33 AG |
1281 | struct drbd_socket *sock; |
1282 | struct p_barrier_ack *p; | |
b411b363 | 1283 | |
9ed57dcb | 1284 | if (tconn->cstate < C_WF_REPORT_PARAMS) |
9f5bdc33 | 1285 | return; |
b411b363 | 1286 | |
9ed57dcb LE |
1287 | sock = &tconn->meta; |
1288 | p = conn_prepare_command(tconn, sock); | |
9f5bdc33 AG |
1289 | if (!p) |
1290 | return; | |
1291 | p->barrier = barrier_nr; | |
1292 | p->set_size = cpu_to_be32(set_size); | |
9ed57dcb | 1293 | conn_send_command(tconn, sock, P_BARRIER_ACK, sizeof(*p), NULL, 0); |
b411b363 PR |
1294 | } |
1295 | ||
1296 | /** | |
1297 | * _drbd_send_ack() - Sends an ack packet | |
1298 | * @mdev: DRBD device. | |
1299 | * @cmd: Packet command code. | |
1300 | * @sector: sector, needs to be in big endian byte order | |
1301 | * @blksize: size in byte, needs to be in big endian byte order | |
1302 | * @block_id: Id, big endian byte order | |
1303 | */ | |
d8763023 AG |
1304 | static int _drbd_send_ack(struct drbd_conf *mdev, enum drbd_packet cmd, |
1305 | u64 sector, u32 blksize, u64 block_id) | |
b411b363 | 1306 | { |
9f5bdc33 AG |
1307 | struct drbd_socket *sock; |
1308 | struct p_block_ack *p; | |
b411b363 | 1309 | |
9f5bdc33 AG |
1310 | if (mdev->state.conn < C_CONNECTED) |
1311 | return -EIO; | |
b411b363 | 1312 | |
9f5bdc33 AG |
1313 | sock = &mdev->tconn->meta; |
1314 | p = drbd_prepare_command(mdev, sock); | |
1315 | if (!p) | |
a8c32aa8 | 1316 | return -EIO; |
9f5bdc33 AG |
1317 | p->sector = sector; |
1318 | p->block_id = block_id; | |
1319 | p->blksize = blksize; | |
1320 | p->seq_num = cpu_to_be32(atomic_inc_return(&mdev->packet_seq)); | |
1321 | return drbd_send_command(mdev, sock, cmd, sizeof(*p), NULL, 0); | |
b411b363 PR |
1322 | } |
1323 | ||
2b2bf214 LE |
1324 | /* dp->sector and dp->block_id already/still in network byte order, |
1325 | * data_size is payload size according to dp->head, | |
1326 | * and may need to be corrected for digest size. */ | |
a9a9994d AG |
1327 | void drbd_send_ack_dp(struct drbd_conf *mdev, enum drbd_packet cmd, |
1328 | struct p_data *dp, int data_size) | |
b411b363 | 1329 | { |
88104ca4 AG |
1330 | if (mdev->tconn->peer_integrity_tfm) |
1331 | data_size -= crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm); | |
a9a9994d AG |
1332 | _drbd_send_ack(mdev, cmd, dp->sector, cpu_to_be32(data_size), |
1333 | dp->block_id); | |
b411b363 PR |
1334 | } |
1335 | ||
a9a9994d AG |
1336 | void drbd_send_ack_rp(struct drbd_conf *mdev, enum drbd_packet cmd, |
1337 | struct p_block_req *rp) | |
b411b363 | 1338 | { |
a9a9994d | 1339 | _drbd_send_ack(mdev, cmd, rp->sector, rp->blksize, rp->block_id); |
b411b363 PR |
1340 | } |
1341 | ||
1342 | /** | |
1343 | * drbd_send_ack() - Sends an ack packet | |
db830c46 AG |
1344 | * @mdev: DRBD device |
1345 | * @cmd: packet command code | |
1346 | * @peer_req: peer request | |
b411b363 | 1347 | */ |
d8763023 | 1348 | int drbd_send_ack(struct drbd_conf *mdev, enum drbd_packet cmd, |
db830c46 | 1349 | struct drbd_peer_request *peer_req) |
b411b363 PR |
1350 | { |
1351 | return _drbd_send_ack(mdev, cmd, | |
dd516121 AG |
1352 | cpu_to_be64(peer_req->i.sector), |
1353 | cpu_to_be32(peer_req->i.size), | |
1354 | peer_req->block_id); | |
b411b363 PR |
1355 | } |
1356 | ||
1357 | /* This function misuses the block_id field to signal if the blocks | |
1358 | * are is sync or not. */ | |
d8763023 | 1359 | int drbd_send_ack_ex(struct drbd_conf *mdev, enum drbd_packet cmd, |
b411b363 PR |
1360 | sector_t sector, int blksize, u64 block_id) |
1361 | { | |
1362 | return _drbd_send_ack(mdev, cmd, | |
1363 | cpu_to_be64(sector), | |
1364 | cpu_to_be32(blksize), | |
1365 | cpu_to_be64(block_id)); | |
1366 | } | |
1367 | ||
1368 | int drbd_send_drequest(struct drbd_conf *mdev, int cmd, | |
1369 | sector_t sector, int size, u64 block_id) | |
1370 | { | |
9f5bdc33 AG |
1371 | struct drbd_socket *sock; |
1372 | struct p_block_req *p; | |
b411b363 | 1373 | |
9f5bdc33 AG |
1374 | sock = &mdev->tconn->data; |
1375 | p = drbd_prepare_command(mdev, sock); | |
1376 | if (!p) | |
1377 | return -EIO; | |
1378 | p->sector = cpu_to_be64(sector); | |
1379 | p->block_id = block_id; | |
1380 | p->blksize = cpu_to_be32(size); | |
1381 | return drbd_send_command(mdev, sock, cmd, sizeof(*p), NULL, 0); | |
b411b363 PR |
1382 | } |
1383 | ||
d8763023 AG |
1384 | int drbd_send_drequest_csum(struct drbd_conf *mdev, sector_t sector, int size, |
1385 | void *digest, int digest_size, enum drbd_packet cmd) | |
b411b363 | 1386 | { |
9f5bdc33 AG |
1387 | struct drbd_socket *sock; |
1388 | struct p_block_req *p; | |
b411b363 | 1389 | |
9f5bdc33 | 1390 | /* FIXME: Put the digest into the preallocated socket buffer. */ |
b411b363 | 1391 | |
9f5bdc33 AG |
1392 | sock = &mdev->tconn->data; |
1393 | p = drbd_prepare_command(mdev, sock); | |
1394 | if (!p) | |
1395 | return -EIO; | |
1396 | p->sector = cpu_to_be64(sector); | |
1397 | p->block_id = ID_SYNCER /* unused */; | |
1398 | p->blksize = cpu_to_be32(size); | |
1399 | return drbd_send_command(mdev, sock, cmd, sizeof(*p), | |
1400 | digest, digest_size); | |
b411b363 PR |
1401 | } |
1402 | ||
1403 | int drbd_send_ov_request(struct drbd_conf *mdev, sector_t sector, int size) | |
1404 | { | |
9f5bdc33 AG |
1405 | struct drbd_socket *sock; |
1406 | struct p_block_req *p; | |
b411b363 | 1407 | |
9f5bdc33 AG |
1408 | sock = &mdev->tconn->data; |
1409 | p = drbd_prepare_command(mdev, sock); | |
1410 | if (!p) | |
1411 | return -EIO; | |
1412 | p->sector = cpu_to_be64(sector); | |
1413 | p->block_id = ID_SYNCER /* unused */; | |
1414 | p->blksize = cpu_to_be32(size); | |
1415 | return drbd_send_command(mdev, sock, P_OV_REQUEST, sizeof(*p), NULL, 0); | |
b411b363 PR |
1416 | } |
1417 | ||
1418 | /* called on sndtimeo | |
81e84650 AG |
1419 | * returns false if we should retry, |
1420 | * true if we think connection is dead | |
b411b363 | 1421 | */ |
1a7ba646 | 1422 | static int we_should_drop_the_connection(struct drbd_tconn *tconn, struct socket *sock) |
b411b363 PR |
1423 | { |
1424 | int drop_it; | |
1425 | /* long elapsed = (long)(jiffies - mdev->last_received); */ | |
1426 | ||
1a7ba646 PR |
1427 | drop_it = tconn->meta.socket == sock |
1428 | || !tconn->asender.task | |
1429 | || get_t_state(&tconn->asender) != RUNNING | |
bbeb641c | 1430 | || tconn->cstate < C_WF_REPORT_PARAMS; |
b411b363 PR |
1431 | |
1432 | if (drop_it) | |
81e84650 | 1433 | return true; |
b411b363 | 1434 | |
1a7ba646 | 1435 | drop_it = !--tconn->ko_count; |
b411b363 | 1436 | if (!drop_it) { |
1a7ba646 PR |
1437 | conn_err(tconn, "[%s/%d] sock_sendmsg time expired, ko = %u\n", |
1438 | current->comm, current->pid, tconn->ko_count); | |
1439 | request_ping(tconn); | |
b411b363 PR |
1440 | } |
1441 | ||
1442 | return drop_it; /* && (mdev->state == R_PRIMARY) */; | |
1443 | } | |
1444 | ||
1a7ba646 | 1445 | static void drbd_update_congested(struct drbd_tconn *tconn) |
9e204cdd | 1446 | { |
1a7ba646 | 1447 | struct sock *sk = tconn->data.socket->sk; |
9e204cdd | 1448 | if (sk->sk_wmem_queued > sk->sk_sndbuf * 4 / 5) |
1a7ba646 | 1449 | set_bit(NET_CONGESTED, &tconn->flags); |
9e204cdd AG |
1450 | } |
1451 | ||
b411b363 PR |
1452 | /* The idea of sendpage seems to be to put some kind of reference |
1453 | * to the page into the skb, and to hand it over to the NIC. In | |
1454 | * this process get_page() gets called. | |
1455 | * | |
1456 | * As soon as the page was really sent over the network put_page() | |
1457 | * gets called by some part of the network layer. [ NIC driver? ] | |
1458 | * | |
1459 | * [ get_page() / put_page() increment/decrement the count. If count | |
1460 | * reaches 0 the page will be freed. ] | |
1461 | * | |
1462 | * This works nicely with pages from FSs. | |
1463 | * But this means that in protocol A we might signal IO completion too early! | |
1464 | * | |
1465 | * In order not to corrupt data during a resync we must make sure | |
1466 | * that we do not reuse our own buffer pages (EEs) to early, therefore | |
1467 | * we have the net_ee list. | |
1468 | * | |
1469 | * XFS seems to have problems, still, it submits pages with page_count == 0! | |
1470 | * As a workaround, we disable sendpage on pages | |
1471 | * with page_count == 0 or PageSlab. | |
1472 | */ | |
1473 | static int _drbd_no_send_page(struct drbd_conf *mdev, struct page *page, | |
b987427b | 1474 | int offset, size_t size, unsigned msg_flags) |
b411b363 | 1475 | { |
b987427b AG |
1476 | struct socket *socket; |
1477 | void *addr; | |
1478 | int err; | |
1479 | ||
1480 | socket = mdev->tconn->data.socket; | |
1481 | addr = kmap(page) + offset; | |
1482 | err = drbd_send_all(mdev->tconn, socket, addr, size, msg_flags); | |
b411b363 | 1483 | kunmap(page); |
b987427b AG |
1484 | if (!err) |
1485 | mdev->send_cnt += size >> 9; | |
1486 | return err; | |
b411b363 PR |
1487 | } |
1488 | ||
1489 | static int _drbd_send_page(struct drbd_conf *mdev, struct page *page, | |
ba11ad9a | 1490 | int offset, size_t size, unsigned msg_flags) |
b411b363 | 1491 | { |
88b390ff | 1492 | struct socket *socket = mdev->tconn->data.socket; |
b411b363 | 1493 | mm_segment_t oldfs = get_fs(); |
b411b363 | 1494 | int len = size; |
88b390ff | 1495 | int err = -EIO; |
b411b363 PR |
1496 | |
1497 | /* e.g. XFS meta- & log-data is in slab pages, which have a | |
1498 | * page_count of 0 and/or have PageSlab() set. | |
1499 | * we cannot use send_page for those, as that does get_page(); | |
1500 | * put_page(); and would cause either a VM_BUG directly, or | |
1501 | * __page_cache_release a page that would actually still be referenced | |
1502 | * by someone, leading to some obscure delayed Oops somewhere else. */ | |
1503 | if (disable_sendpage || (page_count(page) < 1) || PageSlab(page)) | |
ba11ad9a | 1504 | return _drbd_no_send_page(mdev, page, offset, size, msg_flags); |
b411b363 | 1505 | |
ba11ad9a | 1506 | msg_flags |= MSG_NOSIGNAL; |
1a7ba646 | 1507 | drbd_update_congested(mdev->tconn); |
b411b363 PR |
1508 | set_fs(KERNEL_DS); |
1509 | do { | |
88b390ff AG |
1510 | int sent; |
1511 | ||
1512 | sent = socket->ops->sendpage(socket, page, offset, len, msg_flags); | |
b411b363 | 1513 | if (sent <= 0) { |
88b390ff AG |
1514 | if (sent == -EAGAIN) { |
1515 | if (we_should_drop_the_connection(mdev->tconn, socket)) | |
1516 | break; | |
1517 | continue; | |
1518 | } | |
b411b363 PR |
1519 | dev_warn(DEV, "%s: size=%d len=%d sent=%d\n", |
1520 | __func__, (int)size, len, sent); | |
88b390ff AG |
1521 | if (sent < 0) |
1522 | err = sent; | |
b411b363 PR |
1523 | break; |
1524 | } | |
1525 | len -= sent; | |
1526 | offset += sent; | |
1527 | } while (len > 0 /* THINK && mdev->cstate >= C_CONNECTED*/); | |
1528 | set_fs(oldfs); | |
01a311a5 | 1529 | clear_bit(NET_CONGESTED, &mdev->tconn->flags); |
b411b363 | 1530 | |
88b390ff AG |
1531 | if (len == 0) { |
1532 | err = 0; | |
1533 | mdev->send_cnt += size >> 9; | |
1534 | } | |
1535 | return err; | |
b411b363 PR |
1536 | } |
1537 | ||
1538 | static int _drbd_send_bio(struct drbd_conf *mdev, struct bio *bio) | |
1539 | { | |
1540 | struct bio_vec *bvec; | |
1541 | int i; | |
ba11ad9a | 1542 | /* hint all but last page with MSG_MORE */ |
001a8868 | 1543 | bio_for_each_segment(bvec, bio, i) { |
7fae55da AG |
1544 | int err; |
1545 | ||
1546 | err = _drbd_no_send_page(mdev, bvec->bv_page, | |
1547 | bvec->bv_offset, bvec->bv_len, | |
1548 | i == bio->bi_vcnt - 1 ? 0 : MSG_MORE); | |
1549 | if (err) | |
1550 | return err; | |
b411b363 | 1551 | } |
7fae55da | 1552 | return 0; |
b411b363 PR |
1553 | } |
1554 | ||
1555 | static int _drbd_send_zc_bio(struct drbd_conf *mdev, struct bio *bio) | |
1556 | { | |
1557 | struct bio_vec *bvec; | |
1558 | int i; | |
ba11ad9a | 1559 | /* hint all but last page with MSG_MORE */ |
001a8868 | 1560 | bio_for_each_segment(bvec, bio, i) { |
7fae55da AG |
1561 | int err; |
1562 | ||
1563 | err = _drbd_send_page(mdev, bvec->bv_page, | |
1564 | bvec->bv_offset, bvec->bv_len, | |
1565 | i == bio->bi_vcnt - 1 ? 0 : MSG_MORE); | |
1566 | if (err) | |
1567 | return err; | |
b411b363 | 1568 | } |
7fae55da | 1569 | return 0; |
b411b363 PR |
1570 | } |
1571 | ||
db830c46 AG |
1572 | static int _drbd_send_zc_ee(struct drbd_conf *mdev, |
1573 | struct drbd_peer_request *peer_req) | |
45bb912b | 1574 | { |
db830c46 AG |
1575 | struct page *page = peer_req->pages; |
1576 | unsigned len = peer_req->i.size; | |
9f69230c | 1577 | int err; |
db830c46 | 1578 | |
ba11ad9a | 1579 | /* hint all but last page with MSG_MORE */ |
45bb912b LE |
1580 | page_chain_for_each(page) { |
1581 | unsigned l = min_t(unsigned, len, PAGE_SIZE); | |
9f69230c AG |
1582 | |
1583 | err = _drbd_send_page(mdev, page, 0, l, | |
1584 | page_chain_next(page) ? MSG_MORE : 0); | |
1585 | if (err) | |
1586 | return err; | |
45bb912b LE |
1587 | len -= l; |
1588 | } | |
9f69230c | 1589 | return 0; |
45bb912b LE |
1590 | } |
1591 | ||
76d2e7ec PR |
1592 | static u32 bio_flags_to_wire(struct drbd_conf *mdev, unsigned long bi_rw) |
1593 | { | |
31890f4a | 1594 | if (mdev->tconn->agreed_pro_version >= 95) |
76d2e7ec | 1595 | return (bi_rw & REQ_SYNC ? DP_RW_SYNC : 0) | |
76d2e7ec PR |
1596 | (bi_rw & REQ_FUA ? DP_FUA : 0) | |
1597 | (bi_rw & REQ_FLUSH ? DP_FLUSH : 0) | | |
1598 | (bi_rw & REQ_DISCARD ? DP_DISCARD : 0); | |
1599 | else | |
721a9602 | 1600 | return bi_rw & REQ_SYNC ? DP_RW_SYNC : 0; |
76d2e7ec PR |
1601 | } |
1602 | ||
b411b363 PR |
1603 | /* Used to send write requests |
1604 | * R_PRIMARY -> Peer (P_DATA) | |
1605 | */ | |
1606 | int drbd_send_dblock(struct drbd_conf *mdev, struct drbd_request *req) | |
1607 | { | |
9f5bdc33 AG |
1608 | struct drbd_socket *sock; |
1609 | struct p_data *p; | |
b411b363 | 1610 | unsigned int dp_flags = 0; |
b411b363 | 1611 | int dgs; |
9f5bdc33 | 1612 | int err; |
b411b363 | 1613 | |
46e1ce41 PR |
1614 | sock = &mdev->tconn->data; |
1615 | p = drbd_prepare_command(mdev, sock); | |
7d4c782c | 1616 | dgs = mdev->tconn->integrity_tfm ? crypto_hash_digestsize(mdev->tconn->integrity_tfm) : 0; |
b411b363 | 1617 | |
9f5bdc33 AG |
1618 | if (!p) |
1619 | return -EIO; | |
1620 | p->sector = cpu_to_be64(req->i.sector); | |
1621 | p->block_id = (unsigned long)req; | |
5cdb0bf3 | 1622 | p->seq_num = cpu_to_be32(atomic_inc_return(&mdev->packet_seq)); |
76d2e7ec | 1623 | dp_flags = bio_flags_to_wire(mdev, req->master_bio->bi_rw); |
b411b363 PR |
1624 | if (mdev->state.conn >= C_SYNC_SOURCE && |
1625 | mdev->state.conn <= C_PAUSED_SYNC_T) | |
1626 | dp_flags |= DP_MAY_SET_IN_SYNC; | |
303d1448 PR |
1627 | if (mdev->tconn->agreed_pro_version >= 100) { |
1628 | if (req->rq_state & RQ_EXP_RECEIVE_ACK) | |
1629 | dp_flags |= DP_SEND_RECEIVE_ACK; | |
1630 | if (req->rq_state & RQ_EXP_WRITE_ACK) | |
1631 | dp_flags |= DP_SEND_WRITE_ACK; | |
1632 | } | |
9f5bdc33 AG |
1633 | p->dp_flags = cpu_to_be32(dp_flags); |
1634 | if (dgs) | |
8d412fc6 | 1635 | drbd_csum_bio(mdev, mdev->tconn->integrity_tfm, req->master_bio, p + 1); |
9f5bdc33 | 1636 | err = __send_command(mdev->tconn, mdev->vnr, sock, P_DATA, sizeof(*p) + dgs, NULL, req->i.size); |
6bdb9b0e | 1637 | if (!err) { |
470be44a LE |
1638 | /* For protocol A, we have to memcpy the payload into |
1639 | * socket buffers, as we may complete right away | |
1640 | * as soon as we handed it over to tcp, at which point the data | |
1641 | * pages may become invalid. | |
1642 | * | |
1643 | * For data-integrity enabled, we copy it as well, so we can be | |
1644 | * sure that even if the bio pages may still be modified, it | |
1645 | * won't change the data on the wire, thus if the digest checks | |
1646 | * out ok after sending on this side, but does not fit on the | |
1647 | * receiving side, we sure have detected corruption elsewhere. | |
1648 | */ | |
303d1448 | 1649 | if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || dgs) |
6bdb9b0e | 1650 | err = _drbd_send_bio(mdev, req->master_bio); |
b411b363 | 1651 | else |
6bdb9b0e | 1652 | err = _drbd_send_zc_bio(mdev, req->master_bio); |
470be44a LE |
1653 | |
1654 | /* double check digest, sometimes buffers have been modified in flight. */ | |
1655 | if (dgs > 0 && dgs <= 64) { | |
24c4830c | 1656 | /* 64 byte, 512 bit, is the largest digest size |
470be44a LE |
1657 | * currently supported in kernel crypto. */ |
1658 | unsigned char digest[64]; | |
8d412fc6 | 1659 | drbd_csum_bio(mdev, mdev->tconn->integrity_tfm, req->master_bio, digest); |
9f5bdc33 | 1660 | if (memcmp(p + 1, digest, dgs)) { |
470be44a LE |
1661 | dev_warn(DEV, |
1662 | "Digest mismatch, buffer modified by upper layers during write: %llus +%u\n", | |
ace652ac | 1663 | (unsigned long long)req->i.sector, req->i.size); |
470be44a LE |
1664 | } |
1665 | } /* else if (dgs > 64) { | |
1666 | ... Be noisy about digest too large ... | |
1667 | } */ | |
b411b363 | 1668 | } |
9f5bdc33 | 1669 | mutex_unlock(&sock->mutex); /* locked by drbd_prepare_command() */ |
b411b363 | 1670 | |
6bdb9b0e | 1671 | return err; |
b411b363 PR |
1672 | } |
1673 | ||
1674 | /* answer packet, used to send data back for read requests: | |
1675 | * Peer -> (diskless) R_PRIMARY (P_DATA_REPLY) | |
1676 | * C_SYNC_SOURCE -> C_SYNC_TARGET (P_RS_DATA_REPLY) | |
1677 | */ | |
d8763023 | 1678 | int drbd_send_block(struct drbd_conf *mdev, enum drbd_packet cmd, |
db830c46 | 1679 | struct drbd_peer_request *peer_req) |
b411b363 | 1680 | { |
9f5bdc33 AG |
1681 | struct drbd_socket *sock; |
1682 | struct p_data *p; | |
7b57b89d | 1683 | int err; |
b411b363 PR |
1684 | int dgs; |
1685 | ||
46e1ce41 PR |
1686 | sock = &mdev->tconn->data; |
1687 | p = drbd_prepare_command(mdev, sock); | |
b411b363 | 1688 | |
7d4c782c | 1689 | dgs = mdev->tconn->integrity_tfm ? crypto_hash_digestsize(mdev->tconn->integrity_tfm) : 0; |
b411b363 | 1690 | |
9f5bdc33 AG |
1691 | if (!p) |
1692 | return -EIO; | |
1693 | p->sector = cpu_to_be64(peer_req->i.sector); | |
1694 | p->block_id = peer_req->block_id; | |
1695 | p->seq_num = 0; /* unused */ | |
b17f33cb | 1696 | p->dp_flags = 0; |
9f5bdc33 | 1697 | if (dgs) |
8d412fc6 | 1698 | drbd_csum_ee(mdev, mdev->tconn->integrity_tfm, peer_req, p + 1); |
9f5bdc33 | 1699 | err = __send_command(mdev->tconn, mdev->vnr, sock, cmd, sizeof(*p) + dgs, NULL, peer_req->i.size); |
7b57b89d AG |
1700 | if (!err) |
1701 | err = _drbd_send_zc_ee(mdev, peer_req); | |
9f5bdc33 | 1702 | mutex_unlock(&sock->mutex); /* locked by drbd_prepare_command() */ |
bd26bfc5 | 1703 | |
7b57b89d | 1704 | return err; |
b411b363 PR |
1705 | } |
1706 | ||
8f7bed77 | 1707 | int drbd_send_out_of_sync(struct drbd_conf *mdev, struct drbd_request *req) |
73a01a18 | 1708 | { |
9f5bdc33 AG |
1709 | struct drbd_socket *sock; |
1710 | struct p_block_desc *p; | |
73a01a18 | 1711 | |
9f5bdc33 AG |
1712 | sock = &mdev->tconn->data; |
1713 | p = drbd_prepare_command(mdev, sock); | |
1714 | if (!p) | |
1715 | return -EIO; | |
1716 | p->sector = cpu_to_be64(req->i.sector); | |
1717 | p->blksize = cpu_to_be32(req->i.size); | |
1718 | return drbd_send_command(mdev, sock, P_OUT_OF_SYNC, sizeof(*p), NULL, 0); | |
73a01a18 PR |
1719 | } |
1720 | ||
b411b363 PR |
1721 | /* |
1722 | drbd_send distinguishes two cases: | |
1723 | ||
1724 | Packets sent via the data socket "sock" | |
1725 | and packets sent via the meta data socket "msock" | |
1726 | ||
1727 | sock msock | |
1728 | -----------------+-------------------------+------------------------------ | |
1729 | timeout conf.timeout / 2 conf.timeout / 2 | |
1730 | timeout action send a ping via msock Abort communication | |
1731 | and close all sockets | |
1732 | */ | |
1733 | ||
1734 | /* | |
1735 | * you must have down()ed the appropriate [m]sock_mutex elsewhere! | |
1736 | */ | |
bedbd2a5 | 1737 | int drbd_send(struct drbd_tconn *tconn, struct socket *sock, |
b411b363 PR |
1738 | void *buf, size_t size, unsigned msg_flags) |
1739 | { | |
1740 | struct kvec iov; | |
1741 | struct msghdr msg; | |
1742 | int rv, sent = 0; | |
1743 | ||
1744 | if (!sock) | |
c0d42c8e | 1745 | return -EBADR; |
b411b363 PR |
1746 | |
1747 | /* THINK if (signal_pending) return ... ? */ | |
1748 | ||
1749 | iov.iov_base = buf; | |
1750 | iov.iov_len = size; | |
1751 | ||
1752 | msg.msg_name = NULL; | |
1753 | msg.msg_namelen = 0; | |
1754 | msg.msg_control = NULL; | |
1755 | msg.msg_controllen = 0; | |
1756 | msg.msg_flags = msg_flags | MSG_NOSIGNAL; | |
1757 | ||
bedbd2a5 | 1758 | if (sock == tconn->data.socket) { |
44ed167d PR |
1759 | rcu_read_lock(); |
1760 | tconn->ko_count = rcu_dereference(tconn->net_conf)->ko_count; | |
1761 | rcu_read_unlock(); | |
bedbd2a5 | 1762 | drbd_update_congested(tconn); |
b411b363 PR |
1763 | } |
1764 | do { | |
1765 | /* STRANGE | |
1766 | * tcp_sendmsg does _not_ use its size parameter at all ? | |
1767 | * | |
1768 | * -EAGAIN on timeout, -EINTR on signal. | |
1769 | */ | |
1770 | /* THINK | |
1771 | * do we need to block DRBD_SIG if sock == &meta.socket ?? | |
1772 | * otherwise wake_asender() might interrupt some send_*Ack ! | |
1773 | */ | |
1774 | rv = kernel_sendmsg(sock, &msg, &iov, 1, size); | |
1775 | if (rv == -EAGAIN) { | |
bedbd2a5 | 1776 | if (we_should_drop_the_connection(tconn, sock)) |
b411b363 PR |
1777 | break; |
1778 | else | |
1779 | continue; | |
1780 | } | |
b411b363 PR |
1781 | if (rv == -EINTR) { |
1782 | flush_signals(current); | |
1783 | rv = 0; | |
1784 | } | |
1785 | if (rv < 0) | |
1786 | break; | |
1787 | sent += rv; | |
1788 | iov.iov_base += rv; | |
1789 | iov.iov_len -= rv; | |
1790 | } while (sent < size); | |
1791 | ||
bedbd2a5 PR |
1792 | if (sock == tconn->data.socket) |
1793 | clear_bit(NET_CONGESTED, &tconn->flags); | |
b411b363 PR |
1794 | |
1795 | if (rv <= 0) { | |
1796 | if (rv != -EAGAIN) { | |
bedbd2a5 PR |
1797 | conn_err(tconn, "%s_sendmsg returned %d\n", |
1798 | sock == tconn->meta.socket ? "msock" : "sock", | |
1799 | rv); | |
bbeb641c | 1800 | conn_request_state(tconn, NS(conn, C_BROKEN_PIPE), CS_HARD); |
b411b363 | 1801 | } else |
bbeb641c | 1802 | conn_request_state(tconn, NS(conn, C_TIMEOUT), CS_HARD); |
b411b363 PR |
1803 | } |
1804 | ||
1805 | return sent; | |
1806 | } | |
1807 | ||
fb708e40 AG |
1808 | /** |
1809 | * drbd_send_all - Send an entire buffer | |
1810 | * | |
1811 | * Returns 0 upon success and a negative error value otherwise. | |
1812 | */ | |
1813 | int drbd_send_all(struct drbd_tconn *tconn, struct socket *sock, void *buffer, | |
1814 | size_t size, unsigned msg_flags) | |
1815 | { | |
1816 | int err; | |
1817 | ||
1818 | err = drbd_send(tconn, sock, buffer, size, msg_flags); | |
1819 | if (err < 0) | |
1820 | return err; | |
1821 | if (err != size) | |
1822 | return -EIO; | |
1823 | return 0; | |
1824 | } | |
1825 | ||
b411b363 PR |
1826 | static int drbd_open(struct block_device *bdev, fmode_t mode) |
1827 | { | |
1828 | struct drbd_conf *mdev = bdev->bd_disk->private_data; | |
1829 | unsigned long flags; | |
1830 | int rv = 0; | |
1831 | ||
2a48fc0a | 1832 | mutex_lock(&drbd_main_mutex); |
87eeee41 | 1833 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); |
b411b363 PR |
1834 | /* to have a stable mdev->state.role |
1835 | * and no race with updating open_cnt */ | |
1836 | ||
1837 | if (mdev->state.role != R_PRIMARY) { | |
1838 | if (mode & FMODE_WRITE) | |
1839 | rv = -EROFS; | |
1840 | else if (!allow_oos) | |
1841 | rv = -EMEDIUMTYPE; | |
1842 | } | |
1843 | ||
1844 | if (!rv) | |
1845 | mdev->open_cnt++; | |
87eeee41 | 1846 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
2a48fc0a | 1847 | mutex_unlock(&drbd_main_mutex); |
b411b363 PR |
1848 | |
1849 | return rv; | |
1850 | } | |
1851 | ||
1852 | static int drbd_release(struct gendisk *gd, fmode_t mode) | |
1853 | { | |
1854 | struct drbd_conf *mdev = gd->private_data; | |
2a48fc0a | 1855 | mutex_lock(&drbd_main_mutex); |
b411b363 | 1856 | mdev->open_cnt--; |
2a48fc0a | 1857 | mutex_unlock(&drbd_main_mutex); |
b411b363 PR |
1858 | return 0; |
1859 | } | |
1860 | ||
b411b363 PR |
1861 | static void drbd_set_defaults(struct drbd_conf *mdev) |
1862 | { | |
f399002e LE |
1863 | /* Beware! The actual layout differs |
1864 | * between big endian and little endian */ | |
da9fbc27 | 1865 | mdev->state = (union drbd_dev_state) { |
b411b363 PR |
1866 | { .role = R_SECONDARY, |
1867 | .peer = R_UNKNOWN, | |
1868 | .conn = C_STANDALONE, | |
1869 | .disk = D_DISKLESS, | |
1870 | .pdsk = D_UNKNOWN, | |
b411b363 PR |
1871 | } }; |
1872 | } | |
1873 | ||
1874 | void drbd_init_set_defaults(struct drbd_conf *mdev) | |
1875 | { | |
1876 | /* the memset(,0,) did most of this. | |
1877 | * note: only assignments, no allocation in here */ | |
1878 | ||
1879 | drbd_set_defaults(mdev); | |
1880 | ||
b411b363 PR |
1881 | atomic_set(&mdev->ap_bio_cnt, 0); |
1882 | atomic_set(&mdev->ap_pending_cnt, 0); | |
1883 | atomic_set(&mdev->rs_pending_cnt, 0); | |
1884 | atomic_set(&mdev->unacked_cnt, 0); | |
1885 | atomic_set(&mdev->local_cnt, 0); | |
435f0740 | 1886 | atomic_set(&mdev->pp_in_use_by_net, 0); |
778f271d | 1887 | atomic_set(&mdev->rs_sect_in, 0); |
0f0601f4 | 1888 | atomic_set(&mdev->rs_sect_ev, 0); |
759fbdfb | 1889 | atomic_set(&mdev->ap_in_flight, 0); |
e1711731 | 1890 | atomic_set(&mdev->md_io_in_use, 0); |
b411b363 | 1891 | |
8410da8f PR |
1892 | mutex_init(&mdev->own_state_mutex); |
1893 | mdev->state_mutex = &mdev->own_state_mutex; | |
b411b363 PR |
1894 | |
1895 | spin_lock_init(&mdev->al_lock); | |
b411b363 | 1896 | spin_lock_init(&mdev->peer_seq_lock); |
b411b363 PR |
1897 | |
1898 | INIT_LIST_HEAD(&mdev->active_ee); | |
1899 | INIT_LIST_HEAD(&mdev->sync_ee); | |
1900 | INIT_LIST_HEAD(&mdev->done_ee); | |
1901 | INIT_LIST_HEAD(&mdev->read_ee); | |
1902 | INIT_LIST_HEAD(&mdev->net_ee); | |
1903 | INIT_LIST_HEAD(&mdev->resync_reads); | |
b411b363 PR |
1904 | INIT_LIST_HEAD(&mdev->resync_work.list); |
1905 | INIT_LIST_HEAD(&mdev->unplug_work.list); | |
e9e6f3ec | 1906 | INIT_LIST_HEAD(&mdev->go_diskless.list); |
b411b363 | 1907 | INIT_LIST_HEAD(&mdev->md_sync_work.list); |
c4752ef1 | 1908 | INIT_LIST_HEAD(&mdev->start_resync_work.list); |
b411b363 | 1909 | INIT_LIST_HEAD(&mdev->bm_io_work.w.list); |
0ced55a3 | 1910 | |
794abb75 | 1911 | mdev->resync_work.cb = w_resync_timer; |
b411b363 | 1912 | mdev->unplug_work.cb = w_send_write_hint; |
e9e6f3ec | 1913 | mdev->go_diskless.cb = w_go_diskless; |
b411b363 PR |
1914 | mdev->md_sync_work.cb = w_md_sync; |
1915 | mdev->bm_io_work.w.cb = w_bitmap_io; | |
370a43e7 | 1916 | mdev->start_resync_work.cb = w_start_resync; |
a21e9298 PR |
1917 | |
1918 | mdev->resync_work.mdev = mdev; | |
1919 | mdev->unplug_work.mdev = mdev; | |
1920 | mdev->go_diskless.mdev = mdev; | |
1921 | mdev->md_sync_work.mdev = mdev; | |
1922 | mdev->bm_io_work.w.mdev = mdev; | |
1923 | mdev->start_resync_work.mdev = mdev; | |
1924 | ||
b411b363 PR |
1925 | init_timer(&mdev->resync_timer); |
1926 | init_timer(&mdev->md_sync_timer); | |
370a43e7 | 1927 | init_timer(&mdev->start_resync_timer); |
7fde2be9 | 1928 | init_timer(&mdev->request_timer); |
b411b363 PR |
1929 | mdev->resync_timer.function = resync_timer_fn; |
1930 | mdev->resync_timer.data = (unsigned long) mdev; | |
1931 | mdev->md_sync_timer.function = md_sync_timer_fn; | |
1932 | mdev->md_sync_timer.data = (unsigned long) mdev; | |
370a43e7 PR |
1933 | mdev->start_resync_timer.function = start_resync_timer_fn; |
1934 | mdev->start_resync_timer.data = (unsigned long) mdev; | |
7fde2be9 PR |
1935 | mdev->request_timer.function = request_timer_fn; |
1936 | mdev->request_timer.data = (unsigned long) mdev; | |
b411b363 PR |
1937 | |
1938 | init_waitqueue_head(&mdev->misc_wait); | |
1939 | init_waitqueue_head(&mdev->state_wait); | |
1940 | init_waitqueue_head(&mdev->ee_wait); | |
1941 | init_waitqueue_head(&mdev->al_wait); | |
1942 | init_waitqueue_head(&mdev->seq_wait); | |
1943 | ||
b411b363 | 1944 | mdev->resync_wenr = LC_FREE; |
99432fcc PR |
1945 | mdev->peer_max_bio_size = DRBD_MAX_BIO_SIZE_SAFE; |
1946 | mdev->local_max_bio_size = DRBD_MAX_BIO_SIZE_SAFE; | |
b411b363 PR |
1947 | } |
1948 | ||
1949 | void drbd_mdev_cleanup(struct drbd_conf *mdev) | |
1950 | { | |
1d7734a0 | 1951 | int i; |
e6b3ea83 | 1952 | if (mdev->tconn->receiver.t_state != NONE) |
b411b363 | 1953 | dev_err(DEV, "ASSERT FAILED: receiver t_state == %d expected 0.\n", |
e6b3ea83 | 1954 | mdev->tconn->receiver.t_state); |
b411b363 | 1955 | |
b411b363 PR |
1956 | mdev->al_writ_cnt = |
1957 | mdev->bm_writ_cnt = | |
1958 | mdev->read_cnt = | |
1959 | mdev->recv_cnt = | |
1960 | mdev->send_cnt = | |
1961 | mdev->writ_cnt = | |
1962 | mdev->p_size = | |
1963 | mdev->rs_start = | |
1964 | mdev->rs_total = | |
1d7734a0 LE |
1965 | mdev->rs_failed = 0; |
1966 | mdev->rs_last_events = 0; | |
0f0601f4 | 1967 | mdev->rs_last_sect_ev = 0; |
1d7734a0 LE |
1968 | for (i = 0; i < DRBD_SYNC_MARKS; i++) { |
1969 | mdev->rs_mark_left[i] = 0; | |
1970 | mdev->rs_mark_time[i] = 0; | |
1971 | } | |
89e58e75 | 1972 | D_ASSERT(mdev->tconn->net_conf == NULL); |
b411b363 PR |
1973 | |
1974 | drbd_set_my_capacity(mdev, 0); | |
1975 | if (mdev->bitmap) { | |
1976 | /* maybe never allocated. */ | |
02d9a94b | 1977 | drbd_bm_resize(mdev, 0, 1); |
b411b363 PR |
1978 | drbd_bm_cleanup(mdev); |
1979 | } | |
1980 | ||
1d041225 PR |
1981 | drbd_free_bc(mdev->ldev); |
1982 | mdev->ldev = NULL; | |
1983 | ||
0778286a | 1984 | clear_bit(AL_SUSPENDED, &mdev->flags); |
b411b363 | 1985 | |
b411b363 PR |
1986 | D_ASSERT(list_empty(&mdev->active_ee)); |
1987 | D_ASSERT(list_empty(&mdev->sync_ee)); | |
1988 | D_ASSERT(list_empty(&mdev->done_ee)); | |
1989 | D_ASSERT(list_empty(&mdev->read_ee)); | |
1990 | D_ASSERT(list_empty(&mdev->net_ee)); | |
1991 | D_ASSERT(list_empty(&mdev->resync_reads)); | |
d5b27b01 | 1992 | D_ASSERT(list_empty(&mdev->tconn->sender_work.q)); |
b411b363 PR |
1993 | D_ASSERT(list_empty(&mdev->resync_work.list)); |
1994 | D_ASSERT(list_empty(&mdev->unplug_work.list)); | |
e9e6f3ec | 1995 | D_ASSERT(list_empty(&mdev->go_diskless.list)); |
2265b473 LE |
1996 | |
1997 | drbd_set_defaults(mdev); | |
b411b363 PR |
1998 | } |
1999 | ||
2000 | ||
2001 | static void drbd_destroy_mempools(void) | |
2002 | { | |
2003 | struct page *page; | |
2004 | ||
2005 | while (drbd_pp_pool) { | |
2006 | page = drbd_pp_pool; | |
2007 | drbd_pp_pool = (struct page *)page_private(page); | |
2008 | __free_page(page); | |
2009 | drbd_pp_vacant--; | |
2010 | } | |
2011 | ||
2012 | /* D_ASSERT(atomic_read(&drbd_pp_vacant)==0); */ | |
2013 | ||
9476f39d LE |
2014 | if (drbd_md_io_bio_set) |
2015 | bioset_free(drbd_md_io_bio_set); | |
4281808f LE |
2016 | if (drbd_md_io_page_pool) |
2017 | mempool_destroy(drbd_md_io_page_pool); | |
b411b363 PR |
2018 | if (drbd_ee_mempool) |
2019 | mempool_destroy(drbd_ee_mempool); | |
2020 | if (drbd_request_mempool) | |
2021 | mempool_destroy(drbd_request_mempool); | |
2022 | if (drbd_ee_cache) | |
2023 | kmem_cache_destroy(drbd_ee_cache); | |
2024 | if (drbd_request_cache) | |
2025 | kmem_cache_destroy(drbd_request_cache); | |
2026 | if (drbd_bm_ext_cache) | |
2027 | kmem_cache_destroy(drbd_bm_ext_cache); | |
2028 | if (drbd_al_ext_cache) | |
2029 | kmem_cache_destroy(drbd_al_ext_cache); | |
2030 | ||
9476f39d | 2031 | drbd_md_io_bio_set = NULL; |
4281808f | 2032 | drbd_md_io_page_pool = NULL; |
b411b363 PR |
2033 | drbd_ee_mempool = NULL; |
2034 | drbd_request_mempool = NULL; | |
2035 | drbd_ee_cache = NULL; | |
2036 | drbd_request_cache = NULL; | |
2037 | drbd_bm_ext_cache = NULL; | |
2038 | drbd_al_ext_cache = NULL; | |
2039 | ||
2040 | return; | |
2041 | } | |
2042 | ||
2043 | static int drbd_create_mempools(void) | |
2044 | { | |
2045 | struct page *page; | |
1816a2b4 | 2046 | const int number = (DRBD_MAX_BIO_SIZE/PAGE_SIZE) * minor_count; |
b411b363 PR |
2047 | int i; |
2048 | ||
2049 | /* prepare our caches and mempools */ | |
2050 | drbd_request_mempool = NULL; | |
2051 | drbd_ee_cache = NULL; | |
2052 | drbd_request_cache = NULL; | |
2053 | drbd_bm_ext_cache = NULL; | |
2054 | drbd_al_ext_cache = NULL; | |
2055 | drbd_pp_pool = NULL; | |
4281808f | 2056 | drbd_md_io_page_pool = NULL; |
9476f39d | 2057 | drbd_md_io_bio_set = NULL; |
b411b363 PR |
2058 | |
2059 | /* caches */ | |
2060 | drbd_request_cache = kmem_cache_create( | |
2061 | "drbd_req", sizeof(struct drbd_request), 0, 0, NULL); | |
2062 | if (drbd_request_cache == NULL) | |
2063 | goto Enomem; | |
2064 | ||
2065 | drbd_ee_cache = kmem_cache_create( | |
f6ffca9f | 2066 | "drbd_ee", sizeof(struct drbd_peer_request), 0, 0, NULL); |
b411b363 PR |
2067 | if (drbd_ee_cache == NULL) |
2068 | goto Enomem; | |
2069 | ||
2070 | drbd_bm_ext_cache = kmem_cache_create( | |
2071 | "drbd_bm", sizeof(struct bm_extent), 0, 0, NULL); | |
2072 | if (drbd_bm_ext_cache == NULL) | |
2073 | goto Enomem; | |
2074 | ||
2075 | drbd_al_ext_cache = kmem_cache_create( | |
2076 | "drbd_al", sizeof(struct lc_element), 0, 0, NULL); | |
2077 | if (drbd_al_ext_cache == NULL) | |
2078 | goto Enomem; | |
2079 | ||
2080 | /* mempools */ | |
9476f39d LE |
2081 | drbd_md_io_bio_set = bioset_create(DRBD_MIN_POOL_PAGES, 0); |
2082 | if (drbd_md_io_bio_set == NULL) | |
2083 | goto Enomem; | |
9476f39d | 2084 | |
4281808f LE |
2085 | drbd_md_io_page_pool = mempool_create_page_pool(DRBD_MIN_POOL_PAGES, 0); |
2086 | if (drbd_md_io_page_pool == NULL) | |
2087 | goto Enomem; | |
2088 | ||
b411b363 PR |
2089 | drbd_request_mempool = mempool_create(number, |
2090 | mempool_alloc_slab, mempool_free_slab, drbd_request_cache); | |
2091 | if (drbd_request_mempool == NULL) | |
2092 | goto Enomem; | |
2093 | ||
2094 | drbd_ee_mempool = mempool_create(number, | |
2095 | mempool_alloc_slab, mempool_free_slab, drbd_ee_cache); | |
2027ae1f | 2096 | if (drbd_ee_mempool == NULL) |
b411b363 PR |
2097 | goto Enomem; |
2098 | ||
2099 | /* drbd's page pool */ | |
2100 | spin_lock_init(&drbd_pp_lock); | |
2101 | ||
2102 | for (i = 0; i < number; i++) { | |
2103 | page = alloc_page(GFP_HIGHUSER); | |
2104 | if (!page) | |
2105 | goto Enomem; | |
2106 | set_page_private(page, (unsigned long)drbd_pp_pool); | |
2107 | drbd_pp_pool = page; | |
2108 | } | |
2109 | drbd_pp_vacant = number; | |
2110 | ||
2111 | return 0; | |
2112 | ||
2113 | Enomem: | |
2114 | drbd_destroy_mempools(); /* in case we allocated some */ | |
2115 | return -ENOMEM; | |
2116 | } | |
2117 | ||
2118 | static int drbd_notify_sys(struct notifier_block *this, unsigned long code, | |
2119 | void *unused) | |
2120 | { | |
2121 | /* just so we have it. you never know what interesting things we | |
2122 | * might want to do here some day... | |
2123 | */ | |
2124 | ||
2125 | return NOTIFY_DONE; | |
2126 | } | |
2127 | ||
2128 | static struct notifier_block drbd_notifier = { | |
2129 | .notifier_call = drbd_notify_sys, | |
2130 | }; | |
2131 | ||
7721f567 | 2132 | static void drbd_release_all_peer_reqs(struct drbd_conf *mdev) |
b411b363 PR |
2133 | { |
2134 | int rr; | |
2135 | ||
7721f567 | 2136 | rr = drbd_free_peer_reqs(mdev, &mdev->active_ee); |
b411b363 PR |
2137 | if (rr) |
2138 | dev_err(DEV, "%d EEs in active list found!\n", rr); | |
2139 | ||
7721f567 | 2140 | rr = drbd_free_peer_reqs(mdev, &mdev->sync_ee); |
b411b363 PR |
2141 | if (rr) |
2142 | dev_err(DEV, "%d EEs in sync list found!\n", rr); | |
2143 | ||
7721f567 | 2144 | rr = drbd_free_peer_reqs(mdev, &mdev->read_ee); |
b411b363 PR |
2145 | if (rr) |
2146 | dev_err(DEV, "%d EEs in read list found!\n", rr); | |
2147 | ||
7721f567 | 2148 | rr = drbd_free_peer_reqs(mdev, &mdev->done_ee); |
b411b363 PR |
2149 | if (rr) |
2150 | dev_err(DEV, "%d EEs in done list found!\n", rr); | |
2151 | ||
7721f567 | 2152 | rr = drbd_free_peer_reqs(mdev, &mdev->net_ee); |
b411b363 PR |
2153 | if (rr) |
2154 | dev_err(DEV, "%d EEs in net list found!\n", rr); | |
2155 | } | |
2156 | ||
774b3055 | 2157 | /* caution. no locking. */ |
81fa2e67 | 2158 | void drbd_minor_destroy(struct kref *kref) |
b411b363 | 2159 | { |
81fa2e67 | 2160 | struct drbd_conf *mdev = container_of(kref, struct drbd_conf, kref); |
9dc9fbb3 | 2161 | struct drbd_tconn *tconn = mdev->tconn; |
b411b363 | 2162 | |
dfa8bedb PR |
2163 | del_timer_sync(&mdev->request_timer); |
2164 | ||
b411b363 | 2165 | /* paranoia asserts */ |
70dc65e1 | 2166 | D_ASSERT(mdev->open_cnt == 0); |
b411b363 PR |
2167 | /* end paranoia asserts */ |
2168 | ||
b411b363 PR |
2169 | /* cleanup stuff that may have been allocated during |
2170 | * device (re-)configuration or state changes */ | |
2171 | ||
2172 | if (mdev->this_bdev) | |
2173 | bdput(mdev->this_bdev); | |
2174 | ||
1d041225 PR |
2175 | drbd_free_bc(mdev->ldev); |
2176 | mdev->ldev = NULL; | |
b411b363 | 2177 | |
7721f567 | 2178 | drbd_release_all_peer_reqs(mdev); |
b411b363 PR |
2179 | |
2180 | lc_destroy(mdev->act_log); | |
2181 | lc_destroy(mdev->resync); | |
2182 | ||
2183 | kfree(mdev->p_uuid); | |
2184 | /* mdev->p_uuid = NULL; */ | |
2185 | ||
cd1d9950 PR |
2186 | if (mdev->bitmap) /* should no longer be there. */ |
2187 | drbd_bm_cleanup(mdev); | |
2188 | __free_page(mdev->md_io_page); | |
2189 | put_disk(mdev->vdisk); | |
2190 | blk_cleanup_queue(mdev->rq_queue); | |
9958c857 | 2191 | kfree(mdev->rs_plan_s); |
cd1d9950 | 2192 | kfree(mdev); |
9dc9fbb3 PR |
2193 | |
2194 | kref_put(&tconn->kref, &conn_destroy); | |
b411b363 PR |
2195 | } |
2196 | ||
2312f0b3 LE |
2197 | /* One global retry thread, if we need to push back some bio and have it |
2198 | * reinserted through our make request function. | |
2199 | */ | |
2200 | static struct retry_worker { | |
2201 | struct workqueue_struct *wq; | |
2202 | struct work_struct worker; | |
2203 | ||
2204 | spinlock_t lock; | |
2205 | struct list_head writes; | |
2206 | } retry; | |
2207 | ||
2208 | static void do_retry(struct work_struct *ws) | |
2209 | { | |
2210 | struct retry_worker *retry = container_of(ws, struct retry_worker, worker); | |
2211 | LIST_HEAD(writes); | |
2212 | struct drbd_request *req, *tmp; | |
2213 | ||
2214 | spin_lock_irq(&retry->lock); | |
2215 | list_splice_init(&retry->writes, &writes); | |
2216 | spin_unlock_irq(&retry->lock); | |
2217 | ||
2218 | list_for_each_entry_safe(req, tmp, &writes, tl_requests) { | |
2219 | struct drbd_conf *mdev = req->w.mdev; | |
2220 | struct bio *bio = req->master_bio; | |
2221 | unsigned long start_time = req->start_time; | |
9a278a79 LE |
2222 | bool expected; |
2223 | ||
2224 | expected = | |
2225 | expect(atomic_read(&req->completion_ref) == 0) && | |
2226 | expect(req->rq_state & RQ_POSTPONED) && | |
2227 | expect((req->rq_state & RQ_LOCAL_PENDING) == 0 || | |
2228 | (req->rq_state & RQ_LOCAL_ABORTED) != 0); | |
2229 | ||
2230 | if (!expected) | |
2231 | dev_err(DEV, "req=%p completion_ref=%d rq_state=%x\n", | |
2232 | req, atomic_read(&req->completion_ref), | |
2233 | req->rq_state); | |
2234 | ||
2235 | /* We still need to put one kref associated with the | |
2236 | * "completion_ref" going zero in the code path that queued it | |
2237 | * here. The request object may still be referenced by a | |
2238 | * frozen local req->private_bio, in case we force-detached. | |
2312f0b3 | 2239 | */ |
9a278a79 | 2240 | kref_put(&req->kref, drbd_req_destroy); |
2312f0b3 LE |
2241 | |
2242 | /* A single suspended or otherwise blocking device may stall | |
2243 | * all others as well. Fortunately, this code path is to | |
2244 | * recover from a situation that "should not happen": | |
2245 | * concurrent writes in multi-primary setup. | |
2246 | * In a "normal" lifecycle, this workqueue is supposed to be | |
2247 | * destroyed without ever doing anything. | |
2248 | * If it turns out to be an issue anyways, we can do per | |
2249 | * resource (replication group) or per device (minor) retry | |
2250 | * workqueues instead. | |
2251 | */ | |
2252 | ||
2253 | /* We are not just doing generic_make_request(), | |
2254 | * as we want to keep the start_time information. */ | |
5df69ece LE |
2255 | inc_ap_bio(mdev); |
2256 | __drbd_make_request(mdev, bio, start_time); | |
2312f0b3 LE |
2257 | } |
2258 | } | |
2259 | ||
9d05e7c4 | 2260 | void drbd_restart_request(struct drbd_request *req) |
2312f0b3 LE |
2261 | { |
2262 | unsigned long flags; | |
2263 | spin_lock_irqsave(&retry.lock, flags); | |
2264 | list_move_tail(&req->tl_requests, &retry.writes); | |
2265 | spin_unlock_irqrestore(&retry.lock, flags); | |
2266 | ||
2267 | /* Drop the extra reference that would otherwise | |
2268 | * have been dropped by complete_master_bio. | |
2269 | * do_retry() needs to grab a new one. */ | |
2270 | dec_ap_bio(req->w.mdev); | |
b411b363 | 2271 | |
2312f0b3 | 2272 | queue_work(retry.wq, &retry.worker); |
b411b363 PR |
2273 | } |
2274 | ||
2312f0b3 | 2275 | |
b411b363 PR |
2276 | static void drbd_cleanup(void) |
2277 | { | |
2278 | unsigned int i; | |
81a5d60e | 2279 | struct drbd_conf *mdev; |
81fa2e67 | 2280 | struct drbd_tconn *tconn, *tmp; |
b411b363 PR |
2281 | |
2282 | unregister_reboot_notifier(&drbd_notifier); | |
2283 | ||
17a93f30 LE |
2284 | /* first remove proc, |
2285 | * drbdsetup uses it's presence to detect | |
2286 | * whether DRBD is loaded. | |
2287 | * If we would get stuck in proc removal, | |
2288 | * but have netlink already deregistered, | |
2289 | * some drbdsetup commands may wait forever | |
2290 | * for an answer. | |
2291 | */ | |
2292 | if (drbd_proc) | |
2293 | remove_proc_entry("drbd", NULL); | |
2294 | ||
2312f0b3 LE |
2295 | if (retry.wq) |
2296 | destroy_workqueue(retry.wq); | |
b411b363 | 2297 | |
3b98c0c2 | 2298 | drbd_genl_unregister(); |
b411b363 | 2299 | |
81fa2e67 PR |
2300 | idr_for_each_entry(&minors, mdev, i) { |
2301 | idr_remove(&minors, mdev_to_minor(mdev)); | |
2302 | idr_remove(&mdev->tconn->volumes, mdev->vnr); | |
2303 | del_gendisk(mdev->vdisk); | |
c141ebda | 2304 | /* synchronize_rcu(); No other threads running at this point */ |
81fa2e67 | 2305 | kref_put(&mdev->kref, &drbd_minor_destroy); |
b411b363 PR |
2306 | } |
2307 | ||
c141ebda | 2308 | /* not _rcu since, no other updater anymore. Genl already unregistered */ |
81fa2e67 | 2309 | list_for_each_entry_safe(tconn, tmp, &drbd_tconns, all_tconn) { |
c141ebda PR |
2310 | list_del(&tconn->all_tconn); /* not _rcu no proc, not other threads */ |
2311 | /* synchronize_rcu(); */ | |
81fa2e67 PR |
2312 | kref_put(&tconn->kref, &conn_destroy); |
2313 | } | |
b411b363 | 2314 | |
81a5d60e | 2315 | drbd_destroy_mempools(); |
b411b363 PR |
2316 | unregister_blkdev(DRBD_MAJOR, "drbd"); |
2317 | ||
81a5d60e PR |
2318 | idr_destroy(&minors); |
2319 | ||
b411b363 PR |
2320 | printk(KERN_INFO "drbd: module cleanup done.\n"); |
2321 | } | |
2322 | ||
2323 | /** | |
d97482ed | 2324 | * drbd_congested() - Callback for the flusher thread |
b411b363 | 2325 | * @congested_data: User data |
d97482ed | 2326 | * @bdi_bits: Bits the BDI flusher thread is currently interested in |
b411b363 PR |
2327 | * |
2328 | * Returns 1<<BDI_async_congested and/or 1<<BDI_sync_congested if we are congested. | |
2329 | */ | |
2330 | static int drbd_congested(void *congested_data, int bdi_bits) | |
2331 | { | |
2332 | struct drbd_conf *mdev = congested_data; | |
2333 | struct request_queue *q; | |
2334 | char reason = '-'; | |
2335 | int r = 0; | |
2336 | ||
1b881ef7 | 2337 | if (!may_inc_ap_bio(mdev)) { |
b411b363 PR |
2338 | /* DRBD has frozen IO */ |
2339 | r = bdi_bits; | |
2340 | reason = 'd'; | |
2341 | goto out; | |
2342 | } | |
2343 | ||
6f3465ed | 2344 | if (test_bit(CALLBACK_PENDING, &mdev->tconn->flags)) { |
c2ba686f LE |
2345 | r |= (1 << BDI_async_congested); |
2346 | /* Without good local data, we would need to read from remote, | |
2347 | * and that would need the worker thread as well, which is | |
2348 | * currently blocked waiting for that usermode helper to | |
2349 | * finish. | |
2350 | */ | |
2351 | if (!get_ldev_if_state(mdev, D_UP_TO_DATE)) | |
2352 | r |= (1 << BDI_sync_congested); | |
2353 | else | |
2354 | put_ldev(mdev); | |
2355 | r &= bdi_bits; | |
2356 | reason = 'c'; | |
2357 | goto out; | |
2358 | } | |
2359 | ||
b411b363 PR |
2360 | if (get_ldev(mdev)) { |
2361 | q = bdev_get_queue(mdev->ldev->backing_bdev); | |
2362 | r = bdi_congested(&q->backing_dev_info, bdi_bits); | |
2363 | put_ldev(mdev); | |
2364 | if (r) | |
2365 | reason = 'b'; | |
2366 | } | |
2367 | ||
01a311a5 | 2368 | if (bdi_bits & (1 << BDI_async_congested) && test_bit(NET_CONGESTED, &mdev->tconn->flags)) { |
b411b363 PR |
2369 | r |= (1 << BDI_async_congested); |
2370 | reason = reason == 'b' ? 'a' : 'n'; | |
2371 | } | |
2372 | ||
2373 | out: | |
2374 | mdev->congestion_reason = reason; | |
2375 | return r; | |
2376 | } | |
2377 | ||
6699b655 PR |
2378 | static void drbd_init_workqueue(struct drbd_work_queue* wq) |
2379 | { | |
6699b655 PR |
2380 | spin_lock_init(&wq->q_lock); |
2381 | INIT_LIST_HEAD(&wq->q); | |
8c0785a5 | 2382 | init_waitqueue_head(&wq->q_wait); |
6699b655 PR |
2383 | } |
2384 | ||
0ace9dfa | 2385 | struct drbd_tconn *conn_get_by_name(const char *name) |
1aba4d7f PR |
2386 | { |
2387 | struct drbd_tconn *tconn; | |
2388 | ||
3b98c0c2 LE |
2389 | if (!name || !name[0]) |
2390 | return NULL; | |
2391 | ||
c141ebda | 2392 | rcu_read_lock(); |
ec0bddbc | 2393 | list_for_each_entry_rcu(tconn, &drbd_tconns, all_tconn) { |
0ace9dfa PR |
2394 | if (!strcmp(tconn->name, name)) { |
2395 | kref_get(&tconn->kref); | |
1aba4d7f | 2396 | goto found; |
0ace9dfa | 2397 | } |
1aba4d7f PR |
2398 | } |
2399 | tconn = NULL; | |
2400 | found: | |
c141ebda | 2401 | rcu_read_unlock(); |
1aba4d7f PR |
2402 | return tconn; |
2403 | } | |
2404 | ||
089c075d AG |
2405 | struct drbd_tconn *conn_get_by_addrs(void *my_addr, int my_addr_len, |
2406 | void *peer_addr, int peer_addr_len) | |
2407 | { | |
2408 | struct drbd_tconn *tconn; | |
2409 | ||
2410 | rcu_read_lock(); | |
2411 | list_for_each_entry_rcu(tconn, &drbd_tconns, all_tconn) { | |
2412 | if (tconn->my_addr_len == my_addr_len && | |
2413 | tconn->peer_addr_len == peer_addr_len && | |
2414 | !memcmp(&tconn->my_addr, my_addr, my_addr_len) && | |
2415 | !memcmp(&tconn->peer_addr, peer_addr, peer_addr_len)) { | |
2416 | kref_get(&tconn->kref); | |
2417 | goto found; | |
2418 | } | |
2419 | } | |
2420 | tconn = NULL; | |
2421 | found: | |
2422 | rcu_read_unlock(); | |
2423 | return tconn; | |
2424 | } | |
2425 | ||
e6ef8a5c AG |
2426 | static int drbd_alloc_socket(struct drbd_socket *socket) |
2427 | { | |
2428 | socket->rbuf = (void *) __get_free_page(GFP_KERNEL); | |
2429 | if (!socket->rbuf) | |
2430 | return -ENOMEM; | |
5a87d920 AG |
2431 | socket->sbuf = (void *) __get_free_page(GFP_KERNEL); |
2432 | if (!socket->sbuf) | |
2433 | return -ENOMEM; | |
e6ef8a5c AG |
2434 | return 0; |
2435 | } | |
2436 | ||
2437 | static void drbd_free_socket(struct drbd_socket *socket) | |
2438 | { | |
5a87d920 | 2439 | free_page((unsigned long) socket->sbuf); |
e6ef8a5c AG |
2440 | free_page((unsigned long) socket->rbuf); |
2441 | } | |
2442 | ||
91fd4dad PR |
2443 | void conn_free_crypto(struct drbd_tconn *tconn) |
2444 | { | |
1d041225 PR |
2445 | drbd_free_sock(tconn); |
2446 | ||
2447 | crypto_free_hash(tconn->csums_tfm); | |
2448 | crypto_free_hash(tconn->verify_tfm); | |
91fd4dad | 2449 | crypto_free_hash(tconn->cram_hmac_tfm); |
8d412fc6 | 2450 | crypto_free_hash(tconn->integrity_tfm); |
5b614abe | 2451 | crypto_free_hash(tconn->peer_integrity_tfm); |
91fd4dad PR |
2452 | kfree(tconn->int_dig_in); |
2453 | kfree(tconn->int_dig_vv); | |
1d041225 PR |
2454 | |
2455 | tconn->csums_tfm = NULL; | |
2456 | tconn->verify_tfm = NULL; | |
91fd4dad | 2457 | tconn->cram_hmac_tfm = NULL; |
8d412fc6 | 2458 | tconn->integrity_tfm = NULL; |
5b614abe | 2459 | tconn->peer_integrity_tfm = NULL; |
91fd4dad PR |
2460 | tconn->int_dig_in = NULL; |
2461 | tconn->int_dig_vv = NULL; | |
2462 | } | |
2463 | ||
afbbfa88 AG |
2464 | int set_resource_options(struct drbd_tconn *tconn, struct res_opts *res_opts) |
2465 | { | |
2466 | cpumask_var_t new_cpu_mask; | |
2467 | int err; | |
2468 | ||
2469 | if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) | |
2470 | return -ENOMEM; | |
2471 | /* | |
2472 | retcode = ERR_NOMEM; | |
2473 | drbd_msg_put_info("unable to allocate cpumask"); | |
2474 | */ | |
2475 | ||
2476 | /* silently ignore cpu mask on UP kernel */ | |
2477 | if (nr_cpu_ids > 1 && res_opts->cpu_mask[0] != 0) { | |
2478 | /* FIXME: Get rid of constant 32 here */ | |
c5b005ab PR |
2479 | err = bitmap_parse(res_opts->cpu_mask, 32, |
2480 | cpumask_bits(new_cpu_mask), nr_cpu_ids); | |
afbbfa88 | 2481 | if (err) { |
c5b005ab | 2482 | conn_warn(tconn, "bitmap_parse() failed with %d\n", err); |
afbbfa88 AG |
2483 | /* retcode = ERR_CPU_MASK_PARSE; */ |
2484 | goto fail; | |
2485 | } | |
2486 | } | |
2487 | tconn->res_opts = *res_opts; | |
2488 | if (!cpumask_equal(tconn->cpu_mask, new_cpu_mask)) { | |
2489 | cpumask_copy(tconn->cpu_mask, new_cpu_mask); | |
2490 | drbd_calc_cpu_mask(tconn); | |
2491 | tconn->receiver.reset_cpu_mask = 1; | |
2492 | tconn->asender.reset_cpu_mask = 1; | |
2493 | tconn->worker.reset_cpu_mask = 1; | |
2494 | } | |
2495 | err = 0; | |
2496 | ||
2497 | fail: | |
2498 | free_cpumask_var(new_cpu_mask); | |
2499 | return err; | |
2500 | ||
2501 | } | |
2502 | ||
ec0bddbc | 2503 | /* caller must be under genl_lock() */ |
afbbfa88 | 2504 | struct drbd_tconn *conn_create(const char *name, struct res_opts *res_opts) |
2111438b PR |
2505 | { |
2506 | struct drbd_tconn *tconn; | |
2507 | ||
2508 | tconn = kzalloc(sizeof(struct drbd_tconn), GFP_KERNEL); | |
2509 | if (!tconn) | |
2510 | return NULL; | |
2511 | ||
2512 | tconn->name = kstrdup(name, GFP_KERNEL); | |
2513 | if (!tconn->name) | |
2514 | goto fail; | |
2515 | ||
e6ef8a5c AG |
2516 | if (drbd_alloc_socket(&tconn->data)) |
2517 | goto fail; | |
2518 | if (drbd_alloc_socket(&tconn->meta)) | |
2519 | goto fail; | |
2520 | ||
774b3055 PR |
2521 | if (!zalloc_cpumask_var(&tconn->cpu_mask, GFP_KERNEL)) |
2522 | goto fail; | |
2523 | ||
afbbfa88 AG |
2524 | if (set_resource_options(tconn, res_opts)) |
2525 | goto fail; | |
2526 | ||
12038a3a PR |
2527 | tconn->current_epoch = kzalloc(sizeof(struct drbd_epoch), GFP_KERNEL); |
2528 | if (!tconn->current_epoch) | |
2529 | goto fail; | |
b6dd1a89 LE |
2530 | |
2531 | INIT_LIST_HEAD(&tconn->transfer_log); | |
2532 | ||
12038a3a PR |
2533 | INIT_LIST_HEAD(&tconn->current_epoch->list); |
2534 | tconn->epochs = 1; | |
2535 | spin_lock_init(&tconn->epoch_lock); | |
4b0007c0 PR |
2536 | tconn->write_ordering = WO_bdev_flush; |
2537 | ||
b6dd1a89 LE |
2538 | tconn->send.seen_any_write_yet = false; |
2539 | tconn->send.current_epoch_nr = 0; | |
2540 | tconn->send.current_epoch_writes = 0; | |
2541 | ||
bbeb641c | 2542 | tconn->cstate = C_STANDALONE; |
8410da8f | 2543 | mutex_init(&tconn->cstate_mutex); |
6699b655 | 2544 | spin_lock_init(&tconn->req_lock); |
a0095508 | 2545 | mutex_init(&tconn->conf_update); |
2a67d8b9 | 2546 | init_waitqueue_head(&tconn->ping_wait); |
062e879c | 2547 | idr_init(&tconn->volumes); |
b2fb6dbe | 2548 | |
d5b27b01 | 2549 | drbd_init_workqueue(&tconn->sender_work); |
6699b655 | 2550 | mutex_init(&tconn->data.mutex); |
6699b655 PR |
2551 | mutex_init(&tconn->meta.mutex); |
2552 | ||
392c8801 PR |
2553 | drbd_thread_init(tconn, &tconn->receiver, drbdd_init, "receiver"); |
2554 | drbd_thread_init(tconn, &tconn->worker, drbd_worker, "worker"); | |
2555 | drbd_thread_init(tconn, &tconn->asender, drbd_asender, "asender"); | |
2556 | ||
9dc9fbb3 | 2557 | kref_init(&tconn->kref); |
ec0bddbc | 2558 | list_add_tail_rcu(&tconn->all_tconn, &drbd_tconns); |
2111438b PR |
2559 | |
2560 | return tconn; | |
2561 | ||
2562 | fail: | |
12038a3a | 2563 | kfree(tconn->current_epoch); |
774b3055 | 2564 | free_cpumask_var(tconn->cpu_mask); |
e6ef8a5c AG |
2565 | drbd_free_socket(&tconn->meta); |
2566 | drbd_free_socket(&tconn->data); | |
2111438b PR |
2567 | kfree(tconn->name); |
2568 | kfree(tconn); | |
2569 | ||
2570 | return NULL; | |
2571 | } | |
2572 | ||
9dc9fbb3 | 2573 | void conn_destroy(struct kref *kref) |
2111438b | 2574 | { |
9dc9fbb3 PR |
2575 | struct drbd_tconn *tconn = container_of(kref, struct drbd_tconn, kref); |
2576 | ||
12038a3a PR |
2577 | if (atomic_read(&tconn->current_epoch->epoch_size) != 0) |
2578 | conn_err(tconn, "epoch_size:%d\n", atomic_read(&tconn->current_epoch->epoch_size)); | |
2579 | kfree(tconn->current_epoch); | |
2580 | ||
062e879c | 2581 | idr_destroy(&tconn->volumes); |
2111438b | 2582 | |
774b3055 | 2583 | free_cpumask_var(tconn->cpu_mask); |
e6ef8a5c AG |
2584 | drbd_free_socket(&tconn->meta); |
2585 | drbd_free_socket(&tconn->data); | |
2111438b | 2586 | kfree(tconn->name); |
b42a70ad PR |
2587 | kfree(tconn->int_dig_in); |
2588 | kfree(tconn->int_dig_vv); | |
2111438b PR |
2589 | kfree(tconn); |
2590 | } | |
2591 | ||
774b3055 | 2592 | enum drbd_ret_code conn_new_minor(struct drbd_tconn *tconn, unsigned int minor, int vnr) |
b411b363 PR |
2593 | { |
2594 | struct drbd_conf *mdev; | |
2595 | struct gendisk *disk; | |
2596 | struct request_queue *q; | |
774b3055 | 2597 | int vnr_got = vnr; |
81a5d60e | 2598 | int minor_got = minor; |
8432b314 | 2599 | enum drbd_ret_code err = ERR_NOMEM; |
774b3055 PR |
2600 | |
2601 | mdev = minor_to_mdev(minor); | |
2602 | if (mdev) | |
2603 | return ERR_MINOR_EXISTS; | |
b411b363 PR |
2604 | |
2605 | /* GFP_KERNEL, we are outside of all write-out paths */ | |
2606 | mdev = kzalloc(sizeof(struct drbd_conf), GFP_KERNEL); | |
2607 | if (!mdev) | |
774b3055 PR |
2608 | return ERR_NOMEM; |
2609 | ||
9dc9fbb3 | 2610 | kref_get(&tconn->kref); |
774b3055 | 2611 | mdev->tconn = tconn; |
b411b363 PR |
2612 | |
2613 | mdev->minor = minor; | |
3b98c0c2 | 2614 | mdev->vnr = vnr; |
b411b363 PR |
2615 | |
2616 | drbd_init_set_defaults(mdev); | |
2617 | ||
2618 | q = blk_alloc_queue(GFP_KERNEL); | |
2619 | if (!q) | |
2620 | goto out_no_q; | |
2621 | mdev->rq_queue = q; | |
2622 | q->queuedata = mdev; | |
b411b363 PR |
2623 | |
2624 | disk = alloc_disk(1); | |
2625 | if (!disk) | |
2626 | goto out_no_disk; | |
2627 | mdev->vdisk = disk; | |
2628 | ||
81e84650 | 2629 | set_disk_ro(disk, true); |
b411b363 PR |
2630 | |
2631 | disk->queue = q; | |
2632 | disk->major = DRBD_MAJOR; | |
2633 | disk->first_minor = minor; | |
2634 | disk->fops = &drbd_ops; | |
2635 | sprintf(disk->disk_name, "drbd%d", minor); | |
2636 | disk->private_data = mdev; | |
2637 | ||
2638 | mdev->this_bdev = bdget(MKDEV(DRBD_MAJOR, minor)); | |
2639 | /* we have no partitions. we contain only ourselves. */ | |
2640 | mdev->this_bdev->bd_contains = mdev->this_bdev; | |
2641 | ||
2642 | q->backing_dev_info.congested_fn = drbd_congested; | |
2643 | q->backing_dev_info.congested_data = mdev; | |
2644 | ||
2f58dcfc | 2645 | blk_queue_make_request(q, drbd_make_request); |
a73ff323 | 2646 | blk_queue_flush(q, REQ_FLUSH | REQ_FUA); |
99432fcc PR |
2647 | /* Setting the max_hw_sectors to an odd value of 8kibyte here |
2648 | This triggers a max_bio_size message upon first attach or connect */ | |
2649 | blk_queue_max_hw_sectors(q, DRBD_MAX_BIO_SIZE_SAFE >> 8); | |
b411b363 PR |
2650 | blk_queue_bounce_limit(q, BLK_BOUNCE_ANY); |
2651 | blk_queue_merge_bvec(q, drbd_merge_bvec); | |
87eeee41 | 2652 | q->queue_lock = &mdev->tconn->req_lock; /* needed since we use */ |
b411b363 PR |
2653 | |
2654 | mdev->md_io_page = alloc_page(GFP_KERNEL); | |
2655 | if (!mdev->md_io_page) | |
2656 | goto out_no_io_page; | |
2657 | ||
2658 | if (drbd_bm_init(mdev)) | |
2659 | goto out_no_bitmap; | |
dac1389c | 2660 | mdev->read_requests = RB_ROOT; |
de696716 | 2661 | mdev->write_requests = RB_ROOT; |
b411b363 | 2662 | |
56de2102 TH |
2663 | minor_got = idr_alloc(&minors, mdev, minor, minor + 1, GFP_KERNEL); |
2664 | if (minor_got < 0) { | |
2665 | if (minor_got == -ENOSPC) { | |
2666 | err = ERR_MINOR_EXISTS; | |
2667 | drbd_msg_put_info("requested minor exists already"); | |
2668 | } | |
8432b314 | 2669 | goto out_no_minor_idr; |
81a5d60e | 2670 | } |
8432b314 | 2671 | |
56de2102 TH |
2672 | vnr_got = idr_alloc(&tconn->volumes, mdev, vnr, vnr + 1, GFP_KERNEL); |
2673 | if (vnr_got < 0) { | |
2674 | if (vnr_got == -ENOSPC) { | |
2675 | err = ERR_INVALID_REQUEST; | |
2676 | drbd_msg_put_info("requested volume exists already"); | |
2677 | } | |
8432b314 | 2678 | goto out_idr_remove_minor; |
8432b314 | 2679 | } |
56de2102 | 2680 | |
774b3055 | 2681 | add_disk(disk); |
81fa2e67 | 2682 | kref_init(&mdev->kref); /* one ref for both idrs and the the add_disk */ |
774b3055 | 2683 | |
2325eb66 PR |
2684 | /* inherit the connection state */ |
2685 | mdev->state.conn = tconn->cstate; | |
2686 | if (mdev->state.conn == C_WF_REPORT_PARAMS) | |
c141ebda | 2687 | drbd_connected(mdev); |
2325eb66 | 2688 | |
774b3055 | 2689 | return NO_ERROR; |
b411b363 | 2690 | |
8432b314 LE |
2691 | out_idr_remove_minor: |
2692 | idr_remove(&minors, minor_got); | |
569083c0 | 2693 | synchronize_rcu(); |
8432b314 | 2694 | out_no_minor_idr: |
b411b363 PR |
2695 | drbd_bm_cleanup(mdev); |
2696 | out_no_bitmap: | |
2697 | __free_page(mdev->md_io_page); | |
2698 | out_no_io_page: | |
2699 | put_disk(disk); | |
2700 | out_no_disk: | |
2701 | blk_cleanup_queue(q); | |
2702 | out_no_q: | |
b411b363 | 2703 | kfree(mdev); |
9dc9fbb3 | 2704 | kref_put(&tconn->kref, &conn_destroy); |
8432b314 | 2705 | return err; |
b411b363 PR |
2706 | } |
2707 | ||
b411b363 PR |
2708 | int __init drbd_init(void) |
2709 | { | |
2710 | int err; | |
2711 | ||
2b8a90b5 | 2712 | if (minor_count < DRBD_MINOR_COUNT_MIN || minor_count > DRBD_MINOR_COUNT_MAX) { |
b411b363 | 2713 | printk(KERN_ERR |
81a5d60e | 2714 | "drbd: invalid minor_count (%d)\n", minor_count); |
b411b363 PR |
2715 | #ifdef MODULE |
2716 | return -EINVAL; | |
2717 | #else | |
46530e85 | 2718 | minor_count = DRBD_MINOR_COUNT_DEF; |
b411b363 PR |
2719 | #endif |
2720 | } | |
2721 | ||
b411b363 PR |
2722 | err = register_blkdev(DRBD_MAJOR, "drbd"); |
2723 | if (err) { | |
2724 | printk(KERN_ERR | |
2725 | "drbd: unable to register block device major %d\n", | |
2726 | DRBD_MAJOR); | |
2727 | return err; | |
2728 | } | |
2729 | ||
3b98c0c2 LE |
2730 | err = drbd_genl_register(); |
2731 | if (err) { | |
2732 | printk(KERN_ERR "drbd: unable to register generic netlink family\n"); | |
2733 | goto fail; | |
2734 | } | |
2735 | ||
2736 | ||
b411b363 PR |
2737 | register_reboot_notifier(&drbd_notifier); |
2738 | ||
2739 | /* | |
2740 | * allocate all necessary structs | |
2741 | */ | |
2742 | err = -ENOMEM; | |
2743 | ||
2744 | init_waitqueue_head(&drbd_pp_wait); | |
2745 | ||
2746 | drbd_proc = NULL; /* play safe for drbd_cleanup */ | |
81a5d60e | 2747 | idr_init(&minors); |
b411b363 PR |
2748 | |
2749 | err = drbd_create_mempools(); | |
2750 | if (err) | |
3b98c0c2 | 2751 | goto fail; |
b411b363 | 2752 | |
8c484ee4 | 2753 | drbd_proc = proc_create_data("drbd", S_IFREG | S_IRUGO , NULL, &drbd_proc_fops, NULL); |
b411b363 PR |
2754 | if (!drbd_proc) { |
2755 | printk(KERN_ERR "drbd: unable to register proc file\n"); | |
3b98c0c2 | 2756 | goto fail; |
b411b363 PR |
2757 | } |
2758 | ||
2759 | rwlock_init(&global_state_lock); | |
2111438b | 2760 | INIT_LIST_HEAD(&drbd_tconns); |
b411b363 | 2761 | |
2312f0b3 LE |
2762 | retry.wq = create_singlethread_workqueue("drbd-reissue"); |
2763 | if (!retry.wq) { | |
2764 | printk(KERN_ERR "drbd: unable to create retry workqueue\n"); | |
2765 | goto fail; | |
2766 | } | |
2767 | INIT_WORK(&retry.worker, do_retry); | |
2768 | spin_lock_init(&retry.lock); | |
2769 | INIT_LIST_HEAD(&retry.writes); | |
b411b363 PR |
2770 | |
2771 | printk(KERN_INFO "drbd: initialized. " | |
2772 | "Version: " REL_VERSION " (api:%d/proto:%d-%d)\n", | |
2773 | API_VERSION, PRO_VERSION_MIN, PRO_VERSION_MAX); | |
2774 | printk(KERN_INFO "drbd: %s\n", drbd_buildtag()); | |
2775 | printk(KERN_INFO "drbd: registered as block device major %d\n", | |
2776 | DRBD_MAJOR); | |
b411b363 PR |
2777 | |
2778 | return 0; /* Success! */ | |
2779 | ||
3b98c0c2 | 2780 | fail: |
b411b363 PR |
2781 | drbd_cleanup(); |
2782 | if (err == -ENOMEM) | |
2783 | /* currently always the case */ | |
2784 | printk(KERN_ERR "drbd: ran out of memory\n"); | |
2785 | else | |
2786 | printk(KERN_ERR "drbd: initialization failure\n"); | |
2787 | return err; | |
2788 | } | |
2789 | ||
2790 | void drbd_free_bc(struct drbd_backing_dev *ldev) | |
2791 | { | |
2792 | if (ldev == NULL) | |
2793 | return; | |
2794 | ||
e525fd89 TH |
2795 | blkdev_put(ldev->backing_bdev, FMODE_READ | FMODE_WRITE | FMODE_EXCL); |
2796 | blkdev_put(ldev->md_bdev, FMODE_READ | FMODE_WRITE | FMODE_EXCL); | |
b411b363 PR |
2797 | |
2798 | kfree(ldev); | |
2799 | } | |
2800 | ||
360cc740 | 2801 | void drbd_free_sock(struct drbd_tconn *tconn) |
b411b363 | 2802 | { |
360cc740 PR |
2803 | if (tconn->data.socket) { |
2804 | mutex_lock(&tconn->data.mutex); | |
2805 | kernel_sock_shutdown(tconn->data.socket, SHUT_RDWR); | |
2806 | sock_release(tconn->data.socket); | |
2807 | tconn->data.socket = NULL; | |
2808 | mutex_unlock(&tconn->data.mutex); | |
b411b363 | 2809 | } |
360cc740 PR |
2810 | if (tconn->meta.socket) { |
2811 | mutex_lock(&tconn->meta.mutex); | |
2812 | kernel_sock_shutdown(tconn->meta.socket, SHUT_RDWR); | |
2813 | sock_release(tconn->meta.socket); | |
2814 | tconn->meta.socket = NULL; | |
2815 | mutex_unlock(&tconn->meta.mutex); | |
b411b363 PR |
2816 | } |
2817 | } | |
2818 | ||
b411b363 | 2819 | /* meta data management */ |
b411b363 | 2820 | |
19fffd7b | 2821 | void conn_md_sync(struct drbd_tconn *tconn) |
b411b363 | 2822 | { |
19fffd7b PR |
2823 | struct drbd_conf *mdev; |
2824 | int vnr; | |
b411b363 | 2825 | |
19fffd7b PR |
2826 | rcu_read_lock(); |
2827 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { | |
2828 | kref_get(&mdev->kref); | |
2829 | rcu_read_unlock(); | |
2830 | drbd_md_sync(mdev); | |
2831 | kref_put(&mdev->kref, &drbd_minor_destroy); | |
2832 | rcu_read_lock(); | |
2833 | } | |
2834 | rcu_read_unlock(); | |
b411b363 PR |
2835 | } |
2836 | ||
ae8bf312 | 2837 | /* aligned 4kByte */ |
b411b363 | 2838 | struct meta_data_on_disk { |
cccac985 | 2839 | u64 la_size_sect; /* last agreed size. */ |
b411b363 PR |
2840 | u64 uuid[UI_SIZE]; /* UUIDs. */ |
2841 | u64 device_uuid; | |
2842 | u64 reserved_u64_1; | |
2843 | u32 flags; /* MDF */ | |
2844 | u32 magic; | |
2845 | u32 md_size_sect; | |
2846 | u32 al_offset; /* offset to this block */ | |
ae8bf312 | 2847 | u32 al_nr_extents; /* important for restoring the AL (userspace) */ |
f399002e | 2848 | /* `-- act_log->nr_elements <-- ldev->dc.al_extents */ |
b411b363 PR |
2849 | u32 bm_offset; /* offset to the bitmap, from here */ |
2850 | u32 bm_bytes_per_bit; /* BM_BLOCK_SIZE */ | |
99432fcc | 2851 | u32 la_peer_max_bio_size; /* last peer max_bio_size */ |
b411b363 | 2852 | |
3a4d4eb3 LE |
2853 | /* see al_tr_number_to_on_disk_sector() */ |
2854 | u32 al_stripes; | |
2855 | u32 al_stripe_size_4k; | |
2856 | ||
2857 | u8 reserved_u8[4096 - (7*8 + 10*4)]; | |
b411b363 PR |
2858 | } __packed; |
2859 | ||
2860 | /** | |
2861 | * drbd_md_sync() - Writes the meta data super block if the MD_DIRTY flag bit is set | |
2862 | * @mdev: DRBD device. | |
2863 | */ | |
2864 | void drbd_md_sync(struct drbd_conf *mdev) | |
2865 | { | |
2866 | struct meta_data_on_disk *buffer; | |
2867 | sector_t sector; | |
2868 | int i; | |
2869 | ||
ae8bf312 LE |
2870 | /* Don't accidentally change the DRBD meta data layout. */ |
2871 | BUILD_BUG_ON(UI_SIZE != 4); | |
2872 | BUILD_BUG_ON(sizeof(struct meta_data_on_disk) != 4096); | |
2873 | ||
ee15b038 LE |
2874 | del_timer(&mdev->md_sync_timer); |
2875 | /* timer may be rearmed by drbd_md_mark_dirty() now. */ | |
b411b363 PR |
2876 | if (!test_and_clear_bit(MD_DIRTY, &mdev->flags)) |
2877 | return; | |
b411b363 PR |
2878 | |
2879 | /* We use here D_FAILED and not D_ATTACHING because we try to write | |
2880 | * metadata even if we detach due to a disk failure! */ | |
2881 | if (!get_ldev_if_state(mdev, D_FAILED)) | |
2882 | return; | |
2883 | ||
e1711731 PR |
2884 | buffer = drbd_md_get_buffer(mdev); |
2885 | if (!buffer) | |
2886 | goto out; | |
2887 | ||
ae8bf312 | 2888 | memset(buffer, 0, sizeof(*buffer)); |
b411b363 | 2889 | |
cccac985 | 2890 | buffer->la_size_sect = cpu_to_be64(drbd_get_capacity(mdev->this_bdev)); |
b411b363 PR |
2891 | for (i = UI_CURRENT; i < UI_SIZE; i++) |
2892 | buffer->uuid[i] = cpu_to_be64(mdev->ldev->md.uuid[i]); | |
2893 | buffer->flags = cpu_to_be32(mdev->ldev->md.flags); | |
d5d7ebd4 | 2894 | buffer->magic = cpu_to_be32(DRBD_MD_MAGIC_84_UNCLEAN); |
b411b363 PR |
2895 | |
2896 | buffer->md_size_sect = cpu_to_be32(mdev->ldev->md.md_size_sect); | |
2897 | buffer->al_offset = cpu_to_be32(mdev->ldev->md.al_offset); | |
2898 | buffer->al_nr_extents = cpu_to_be32(mdev->act_log->nr_elements); | |
2899 | buffer->bm_bytes_per_bit = cpu_to_be32(BM_BLOCK_SIZE); | |
2900 | buffer->device_uuid = cpu_to_be64(mdev->ldev->md.device_uuid); | |
2901 | ||
2902 | buffer->bm_offset = cpu_to_be32(mdev->ldev->md.bm_offset); | |
99432fcc | 2903 | buffer->la_peer_max_bio_size = cpu_to_be32(mdev->peer_max_bio_size); |
b411b363 | 2904 | |
3a4d4eb3 LE |
2905 | buffer->al_stripes = cpu_to_be32(mdev->ldev->md.al_stripes); |
2906 | buffer->al_stripe_size_4k = cpu_to_be32(mdev->ldev->md.al_stripe_size_4k); | |
2907 | ||
2908 | D_ASSERT(drbd_md_ss(mdev->ldev) == mdev->ldev->md.md_offset); | |
b411b363 PR |
2909 | sector = mdev->ldev->md.md_offset; |
2910 | ||
3fbf4d21 | 2911 | if (drbd_md_sync_page_io(mdev, mdev->ldev, sector, WRITE)) { |
b411b363 PR |
2912 | /* this was a try anyways ... */ |
2913 | dev_err(DEV, "meta data update failed!\n"); | |
383606e0 | 2914 | drbd_chk_io_error(mdev, 1, DRBD_META_IO_ERROR); |
b411b363 PR |
2915 | } |
2916 | ||
2917 | /* Update mdev->ldev->md.la_size_sect, | |
2918 | * since we updated it on metadata. */ | |
2919 | mdev->ldev->md.la_size_sect = drbd_get_capacity(mdev->this_bdev); | |
2920 | ||
e1711731 PR |
2921 | drbd_md_put_buffer(mdev); |
2922 | out: | |
b411b363 PR |
2923 | put_ldev(mdev); |
2924 | } | |
2925 | ||
3a4d4eb3 LE |
2926 | static int check_activity_log_stripe_size(struct drbd_conf *mdev, |
2927 | struct meta_data_on_disk *on_disk, | |
2928 | struct drbd_md *in_core) | |
2929 | { | |
2930 | u32 al_stripes = be32_to_cpu(on_disk->al_stripes); | |
2931 | u32 al_stripe_size_4k = be32_to_cpu(on_disk->al_stripe_size_4k); | |
2932 | u64 al_size_4k; | |
2933 | ||
2934 | /* both not set: default to old fixed size activity log */ | |
2935 | if (al_stripes == 0 && al_stripe_size_4k == 0) { | |
2936 | al_stripes = 1; | |
2937 | al_stripe_size_4k = MD_32kB_SECT/8; | |
2938 | } | |
2939 | ||
2940 | /* some paranoia plausibility checks */ | |
2941 | ||
2942 | /* we need both values to be set */ | |
2943 | if (al_stripes == 0 || al_stripe_size_4k == 0) | |
2944 | goto err; | |
2945 | ||
2946 | al_size_4k = (u64)al_stripes * al_stripe_size_4k; | |
2947 | ||
2948 | /* Upper limit of activity log area, to avoid potential overflow | |
2949 | * problems in al_tr_number_to_on_disk_sector(). As right now, more | |
2950 | * than 72 * 4k blocks total only increases the amount of history, | |
2951 | * limiting this arbitrarily to 16 GB is not a real limitation ;-) */ | |
2952 | if (al_size_4k > (16 * 1024 * 1024/4)) | |
2953 | goto err; | |
2954 | ||
2955 | /* Lower limit: we need at least 8 transaction slots (32kB) | |
2956 | * to not break existing setups */ | |
2957 | if (al_size_4k < MD_32kB_SECT/8) | |
2958 | goto err; | |
2959 | ||
2960 | in_core->al_stripe_size_4k = al_stripe_size_4k; | |
2961 | in_core->al_stripes = al_stripes; | |
2962 | in_core->al_size_4k = al_size_4k; | |
2963 | ||
2964 | return 0; | |
2965 | err: | |
2966 | dev_err(DEV, "invalid activity log striping: al_stripes=%u, al_stripe_size_4k=%u\n", | |
2967 | al_stripes, al_stripe_size_4k); | |
2968 | return -EINVAL; | |
2969 | } | |
2970 | ||
b411b363 PR |
2971 | /** |
2972 | * drbd_md_read() - Reads in the meta data super block | |
2973 | * @mdev: DRBD device. | |
2974 | * @bdev: Device from which the meta data should be read in. | |
2975 | * | |
3a4d4eb3 | 2976 | * Return NO_ERROR on success, and an enum drbd_ret_code in case |
d5d7ebd4 | 2977 | * something goes wrong. |
3a4d4eb3 LE |
2978 | * |
2979 | * Called exactly once during drbd_adm_attach() | |
b411b363 PR |
2980 | */ |
2981 | int drbd_md_read(struct drbd_conf *mdev, struct drbd_backing_dev *bdev) | |
2982 | { | |
2983 | struct meta_data_on_disk *buffer; | |
d5d7ebd4 | 2984 | u32 magic, flags; |
b411b363 PR |
2985 | int i, rv = NO_ERROR; |
2986 | ||
2987 | if (!get_ldev_if_state(mdev, D_ATTACHING)) | |
2988 | return ERR_IO_MD_DISK; | |
2989 | ||
e1711731 PR |
2990 | buffer = drbd_md_get_buffer(mdev); |
2991 | if (!buffer) | |
2992 | goto out; | |
b411b363 | 2993 | |
3a4d4eb3 LE |
2994 | /* First, figure out where our meta data superblock is located. */ |
2995 | bdev->md.meta_dev_idx = bdev->disk_conf->meta_dev_idx; | |
2996 | bdev->md.md_offset = drbd_md_ss(bdev); | |
2997 | ||
3fbf4d21 | 2998 | if (drbd_md_sync_page_io(mdev, bdev, bdev->md.md_offset, READ)) { |
25985edc | 2999 | /* NOTE: can't do normal error processing here as this is |
b411b363 PR |
3000 | called BEFORE disk is attached */ |
3001 | dev_err(DEV, "Error while reading metadata.\n"); | |
3002 | rv = ERR_IO_MD_DISK; | |
3003 | goto err; | |
3004 | } | |
3005 | ||
d5d7ebd4 LE |
3006 | magic = be32_to_cpu(buffer->magic); |
3007 | flags = be32_to_cpu(buffer->flags); | |
3008 | if (magic == DRBD_MD_MAGIC_84_UNCLEAN || | |
3009 | (magic == DRBD_MD_MAGIC_08 && !(flags & MDF_AL_CLEAN))) { | |
3010 | /* btw: that's Activity Log clean, not "all" clean. */ | |
3011 | dev_err(DEV, "Found unclean meta data. Did you \"drbdadm apply-al\"?\n"); | |
3012 | rv = ERR_MD_UNCLEAN; | |
3013 | goto err; | |
3014 | } | |
3a4d4eb3 LE |
3015 | |
3016 | rv = ERR_MD_INVALID; | |
d5d7ebd4 | 3017 | if (magic != DRBD_MD_MAGIC_08) { |
43de7c85 | 3018 | if (magic == DRBD_MD_MAGIC_07) |
d5d7ebd4 LE |
3019 | dev_err(DEV, "Found old (0.7) meta data magic. Did you \"drbdadm create-md\"?\n"); |
3020 | else | |
3021 | dev_err(DEV, "Meta data magic not found. Did you \"drbdadm create-md\"?\n"); | |
b411b363 PR |
3022 | goto err; |
3023 | } | |
3a4d4eb3 LE |
3024 | |
3025 | if (check_activity_log_stripe_size(mdev, buffer, &bdev->md)) | |
3026 | goto err; | |
3027 | ||
b411b363 PR |
3028 | if (be32_to_cpu(buffer->al_offset) != bdev->md.al_offset) { |
3029 | dev_err(DEV, "unexpected al_offset: %d (expected %d)\n", | |
3030 | be32_to_cpu(buffer->al_offset), bdev->md.al_offset); | |
b411b363 PR |
3031 | goto err; |
3032 | } | |
3033 | if (be32_to_cpu(buffer->bm_offset) != bdev->md.bm_offset) { | |
3034 | dev_err(DEV, "unexpected bm_offset: %d (expected %d)\n", | |
3035 | be32_to_cpu(buffer->bm_offset), bdev->md.bm_offset); | |
b411b363 PR |
3036 | goto err; |
3037 | } | |
3038 | if (be32_to_cpu(buffer->md_size_sect) != bdev->md.md_size_sect) { | |
3039 | dev_err(DEV, "unexpected md_size: %u (expected %u)\n", | |
3040 | be32_to_cpu(buffer->md_size_sect), bdev->md.md_size_sect); | |
b411b363 PR |
3041 | goto err; |
3042 | } | |
3043 | ||
3044 | if (be32_to_cpu(buffer->bm_bytes_per_bit) != BM_BLOCK_SIZE) { | |
3045 | dev_err(DEV, "unexpected bm_bytes_per_bit: %u (expected %u)\n", | |
3046 | be32_to_cpu(buffer->bm_bytes_per_bit), BM_BLOCK_SIZE); | |
b411b363 PR |
3047 | goto err; |
3048 | } | |
3049 | ||
3a4d4eb3 LE |
3050 | rv = NO_ERROR; |
3051 | ||
cccac985 | 3052 | bdev->md.la_size_sect = be64_to_cpu(buffer->la_size_sect); |
b411b363 PR |
3053 | for (i = UI_CURRENT; i < UI_SIZE; i++) |
3054 | bdev->md.uuid[i] = be64_to_cpu(buffer->uuid[i]); | |
3055 | bdev->md.flags = be32_to_cpu(buffer->flags); | |
b411b363 PR |
3056 | bdev->md.device_uuid = be64_to_cpu(buffer->device_uuid); |
3057 | ||
87eeee41 | 3058 | spin_lock_irq(&mdev->tconn->req_lock); |
99432fcc | 3059 | if (mdev->state.conn < C_CONNECTED) { |
db141b2f | 3060 | unsigned int peer; |
99432fcc | 3061 | peer = be32_to_cpu(buffer->la_peer_max_bio_size); |
db141b2f | 3062 | peer = max(peer, DRBD_MAX_BIO_SIZE_SAFE); |
99432fcc PR |
3063 | mdev->peer_max_bio_size = peer; |
3064 | } | |
87eeee41 | 3065 | spin_unlock_irq(&mdev->tconn->req_lock); |
b411b363 PR |
3066 | |
3067 | err: | |
e1711731 PR |
3068 | drbd_md_put_buffer(mdev); |
3069 | out: | |
b411b363 PR |
3070 | put_ldev(mdev); |
3071 | ||
3072 | return rv; | |
3073 | } | |
3074 | ||
3075 | /** | |
3076 | * drbd_md_mark_dirty() - Mark meta data super block as dirty | |
3077 | * @mdev: DRBD device. | |
3078 | * | |
3079 | * Call this function if you change anything that should be written to | |
3080 | * the meta-data super block. This function sets MD_DIRTY, and starts a | |
3081 | * timer that ensures that within five seconds you have to call drbd_md_sync(). | |
3082 | */ | |
ca0e6098 | 3083 | #ifdef DEBUG |
ee15b038 LE |
3084 | void drbd_md_mark_dirty_(struct drbd_conf *mdev, unsigned int line, const char *func) |
3085 | { | |
3086 | if (!test_and_set_bit(MD_DIRTY, &mdev->flags)) { | |
3087 | mod_timer(&mdev->md_sync_timer, jiffies + HZ); | |
3088 | mdev->last_md_mark_dirty.line = line; | |
3089 | mdev->last_md_mark_dirty.func = func; | |
3090 | } | |
3091 | } | |
3092 | #else | |
b411b363 PR |
3093 | void drbd_md_mark_dirty(struct drbd_conf *mdev) |
3094 | { | |
ee15b038 | 3095 | if (!test_and_set_bit(MD_DIRTY, &mdev->flags)) |
ca0e6098 | 3096 | mod_timer(&mdev->md_sync_timer, jiffies + 5*HZ); |
b411b363 | 3097 | } |
ee15b038 | 3098 | #endif |
b411b363 | 3099 | |
9f2247bb | 3100 | void drbd_uuid_move_history(struct drbd_conf *mdev) __must_hold(local) |
b411b363 PR |
3101 | { |
3102 | int i; | |
3103 | ||
62b0da3a | 3104 | for (i = UI_HISTORY_START; i < UI_HISTORY_END; i++) |
b411b363 | 3105 | mdev->ldev->md.uuid[i+1] = mdev->ldev->md.uuid[i]; |
b411b363 PR |
3106 | } |
3107 | ||
9f2247bb | 3108 | void __drbd_uuid_set(struct drbd_conf *mdev, int idx, u64 val) __must_hold(local) |
b411b363 PR |
3109 | { |
3110 | if (idx == UI_CURRENT) { | |
3111 | if (mdev->state.role == R_PRIMARY) | |
3112 | val |= 1; | |
3113 | else | |
3114 | val &= ~((u64)1); | |
3115 | ||
3116 | drbd_set_ed_uuid(mdev, val); | |
3117 | } | |
3118 | ||
3119 | mdev->ldev->md.uuid[idx] = val; | |
b411b363 PR |
3120 | drbd_md_mark_dirty(mdev); |
3121 | } | |
3122 | ||
9f2247bb PR |
3123 | void _drbd_uuid_set(struct drbd_conf *mdev, int idx, u64 val) __must_hold(local) |
3124 | { | |
3125 | unsigned long flags; | |
3126 | spin_lock_irqsave(&mdev->ldev->md.uuid_lock, flags); | |
3127 | __drbd_uuid_set(mdev, idx, val); | |
3128 | spin_unlock_irqrestore(&mdev->ldev->md.uuid_lock, flags); | |
3129 | } | |
b411b363 PR |
3130 | |
3131 | void drbd_uuid_set(struct drbd_conf *mdev, int idx, u64 val) __must_hold(local) | |
3132 | { | |
9f2247bb PR |
3133 | unsigned long flags; |
3134 | spin_lock_irqsave(&mdev->ldev->md.uuid_lock, flags); | |
b411b363 PR |
3135 | if (mdev->ldev->md.uuid[idx]) { |
3136 | drbd_uuid_move_history(mdev); | |
3137 | mdev->ldev->md.uuid[UI_HISTORY_START] = mdev->ldev->md.uuid[idx]; | |
b411b363 | 3138 | } |
9f2247bb PR |
3139 | __drbd_uuid_set(mdev, idx, val); |
3140 | spin_unlock_irqrestore(&mdev->ldev->md.uuid_lock, flags); | |
b411b363 PR |
3141 | } |
3142 | ||
3143 | /** | |
3144 | * drbd_uuid_new_current() - Creates a new current UUID | |
3145 | * @mdev: DRBD device. | |
3146 | * | |
3147 | * Creates a new current UUID, and rotates the old current UUID into | |
3148 | * the bitmap slot. Causes an incremental resync upon next connect. | |
3149 | */ | |
3150 | void drbd_uuid_new_current(struct drbd_conf *mdev) __must_hold(local) | |
3151 | { | |
3152 | u64 val; | |
9f2247bb PR |
3153 | unsigned long long bm_uuid; |
3154 | ||
3155 | get_random_bytes(&val, sizeof(u64)); | |
3156 | ||
3157 | spin_lock_irq(&mdev->ldev->md.uuid_lock); | |
3158 | bm_uuid = mdev->ldev->md.uuid[UI_BITMAP]; | |
62b0da3a LE |
3159 | |
3160 | if (bm_uuid) | |
3161 | dev_warn(DEV, "bm UUID was already set: %llX\n", bm_uuid); | |
b411b363 | 3162 | |
b411b363 | 3163 | mdev->ldev->md.uuid[UI_BITMAP] = mdev->ldev->md.uuid[UI_CURRENT]; |
9f2247bb PR |
3164 | __drbd_uuid_set(mdev, UI_CURRENT, val); |
3165 | spin_unlock_irq(&mdev->ldev->md.uuid_lock); | |
b411b363 | 3166 | |
62b0da3a | 3167 | drbd_print_uuids(mdev, "new current UUID"); |
aaa8e2b3 LE |
3168 | /* get it to stable storage _now_ */ |
3169 | drbd_md_sync(mdev); | |
b411b363 PR |
3170 | } |
3171 | ||
3172 | void drbd_uuid_set_bm(struct drbd_conf *mdev, u64 val) __must_hold(local) | |
3173 | { | |
9f2247bb | 3174 | unsigned long flags; |
b411b363 PR |
3175 | if (mdev->ldev->md.uuid[UI_BITMAP] == 0 && val == 0) |
3176 | return; | |
3177 | ||
9f2247bb | 3178 | spin_lock_irqsave(&mdev->ldev->md.uuid_lock, flags); |
b411b363 PR |
3179 | if (val == 0) { |
3180 | drbd_uuid_move_history(mdev); | |
3181 | mdev->ldev->md.uuid[UI_HISTORY_START] = mdev->ldev->md.uuid[UI_BITMAP]; | |
3182 | mdev->ldev->md.uuid[UI_BITMAP] = 0; | |
b411b363 | 3183 | } else { |
62b0da3a LE |
3184 | unsigned long long bm_uuid = mdev->ldev->md.uuid[UI_BITMAP]; |
3185 | if (bm_uuid) | |
3186 | dev_warn(DEV, "bm UUID was already set: %llX\n", bm_uuid); | |
b411b363 | 3187 | |
62b0da3a | 3188 | mdev->ldev->md.uuid[UI_BITMAP] = val & ~((u64)1); |
b411b363 | 3189 | } |
9f2247bb PR |
3190 | spin_unlock_irqrestore(&mdev->ldev->md.uuid_lock, flags); |
3191 | ||
b411b363 PR |
3192 | drbd_md_mark_dirty(mdev); |
3193 | } | |
3194 | ||
3195 | /** | |
3196 | * drbd_bmio_set_n_write() - io_fn for drbd_queue_bitmap_io() or drbd_bitmap_io() | |
3197 | * @mdev: DRBD device. | |
3198 | * | |
3199 | * Sets all bits in the bitmap and writes the whole bitmap to stable storage. | |
3200 | */ | |
3201 | int drbd_bmio_set_n_write(struct drbd_conf *mdev) | |
3202 | { | |
3203 | int rv = -EIO; | |
3204 | ||
3205 | if (get_ldev_if_state(mdev, D_ATTACHING)) { | |
3206 | drbd_md_set_flag(mdev, MDF_FULL_SYNC); | |
3207 | drbd_md_sync(mdev); | |
3208 | drbd_bm_set_all(mdev); | |
3209 | ||
3210 | rv = drbd_bm_write(mdev); | |
3211 | ||
3212 | if (!rv) { | |
3213 | drbd_md_clear_flag(mdev, MDF_FULL_SYNC); | |
3214 | drbd_md_sync(mdev); | |
3215 | } | |
3216 | ||
3217 | put_ldev(mdev); | |
3218 | } | |
3219 | ||
3220 | return rv; | |
3221 | } | |
3222 | ||
3223 | /** | |
3224 | * drbd_bmio_clear_n_write() - io_fn for drbd_queue_bitmap_io() or drbd_bitmap_io() | |
3225 | * @mdev: DRBD device. | |
3226 | * | |
3227 | * Clears all bits in the bitmap and writes the whole bitmap to stable storage. | |
3228 | */ | |
3229 | int drbd_bmio_clear_n_write(struct drbd_conf *mdev) | |
3230 | { | |
3231 | int rv = -EIO; | |
3232 | ||
0778286a | 3233 | drbd_resume_al(mdev); |
b411b363 PR |
3234 | if (get_ldev_if_state(mdev, D_ATTACHING)) { |
3235 | drbd_bm_clear_all(mdev); | |
3236 | rv = drbd_bm_write(mdev); | |
3237 | put_ldev(mdev); | |
3238 | } | |
3239 | ||
3240 | return rv; | |
3241 | } | |
3242 | ||
99920dc5 | 3243 | static int w_bitmap_io(struct drbd_work *w, int unused) |
b411b363 PR |
3244 | { |
3245 | struct bm_io_work *work = container_of(w, struct bm_io_work, w); | |
00d56944 | 3246 | struct drbd_conf *mdev = w->mdev; |
02851e9f | 3247 | int rv = -EIO; |
b411b363 PR |
3248 | |
3249 | D_ASSERT(atomic_read(&mdev->ap_bio_cnt) == 0); | |
3250 | ||
02851e9f | 3251 | if (get_ldev(mdev)) { |
20ceb2b2 | 3252 | drbd_bm_lock(mdev, work->why, work->flags); |
02851e9f LE |
3253 | rv = work->io_fn(mdev); |
3254 | drbd_bm_unlock(mdev); | |
3255 | put_ldev(mdev); | |
3256 | } | |
b411b363 | 3257 | |
4738fa16 | 3258 | clear_bit_unlock(BITMAP_IO, &mdev->flags); |
b411b363 PR |
3259 | wake_up(&mdev->misc_wait); |
3260 | ||
3261 | if (work->done) | |
3262 | work->done(mdev, rv); | |
3263 | ||
3264 | clear_bit(BITMAP_IO_QUEUED, &mdev->flags); | |
3265 | work->why = NULL; | |
20ceb2b2 | 3266 | work->flags = 0; |
b411b363 | 3267 | |
99920dc5 | 3268 | return 0; |
b411b363 PR |
3269 | } |
3270 | ||
82f59cc6 LE |
3271 | void drbd_ldev_destroy(struct drbd_conf *mdev) |
3272 | { | |
3273 | lc_destroy(mdev->resync); | |
3274 | mdev->resync = NULL; | |
3275 | lc_destroy(mdev->act_log); | |
3276 | mdev->act_log = NULL; | |
3277 | __no_warn(local, | |
3278 | drbd_free_bc(mdev->ldev); | |
3279 | mdev->ldev = NULL;); | |
3280 | ||
82f59cc6 LE |
3281 | clear_bit(GO_DISKLESS, &mdev->flags); |
3282 | } | |
3283 | ||
99920dc5 | 3284 | static int w_go_diskless(struct drbd_work *w, int unused) |
e9e6f3ec | 3285 | { |
00d56944 PR |
3286 | struct drbd_conf *mdev = w->mdev; |
3287 | ||
e9e6f3ec | 3288 | D_ASSERT(mdev->state.disk == D_FAILED); |
9d282875 LE |
3289 | /* we cannot assert local_cnt == 0 here, as get_ldev_if_state will |
3290 | * inc/dec it frequently. Once we are D_DISKLESS, no one will touch | |
82f59cc6 LE |
3291 | * the protected members anymore, though, so once put_ldev reaches zero |
3292 | * again, it will be safe to free them. */ | |
a2a3c74f LE |
3293 | |
3294 | /* Try to write changed bitmap pages, read errors may have just | |
3295 | * set some bits outside the area covered by the activity log. | |
3296 | * | |
3297 | * If we have an IO error during the bitmap writeout, | |
3298 | * we will want a full sync next time, just in case. | |
3299 | * (Do we want a specific meta data flag for this?) | |
3300 | * | |
3301 | * If that does not make it to stable storage either, | |
fd0017c1 PR |
3302 | * we cannot do anything about that anymore. |
3303 | * | |
3304 | * We still need to check if both bitmap and ldev are present, we may | |
3305 | * end up here after a failed attach, before ldev was even assigned. | |
3306 | */ | |
3307 | if (mdev->bitmap && mdev->ldev) { | |
a2a3c74f LE |
3308 | if (drbd_bitmap_io_from_worker(mdev, drbd_bm_write, |
3309 | "detach", BM_LOCKED_MASK)) { | |
edc9f5eb | 3310 | if (test_bit(WAS_READ_ERROR, &mdev->flags)) { |
a2a3c74f LE |
3311 | drbd_md_set_flag(mdev, MDF_FULL_SYNC); |
3312 | drbd_md_sync(mdev); | |
3313 | } | |
3314 | } | |
3315 | } | |
3316 | ||
e9e6f3ec | 3317 | drbd_force_state(mdev, NS(disk, D_DISKLESS)); |
99920dc5 | 3318 | return 0; |
e9e6f3ec LE |
3319 | } |
3320 | ||
b411b363 PR |
3321 | /** |
3322 | * drbd_queue_bitmap_io() - Queues an IO operation on the whole bitmap | |
3323 | * @mdev: DRBD device. | |
3324 | * @io_fn: IO callback to be called when bitmap IO is possible | |
3325 | * @done: callback to be called after the bitmap IO was performed | |
3326 | * @why: Descriptive text of the reason for doing the IO | |
3327 | * | |
3328 | * While IO on the bitmap happens we freeze application IO thus we ensure | |
3329 | * that drbd_set_out_of_sync() can not be called. This function MAY ONLY be | |
3330 | * called from worker context. It MUST NOT be used while a previous such | |
3331 | * work is still pending! | |
3332 | */ | |
3333 | void drbd_queue_bitmap_io(struct drbd_conf *mdev, | |
3334 | int (*io_fn)(struct drbd_conf *), | |
3335 | void (*done)(struct drbd_conf *, int), | |
20ceb2b2 | 3336 | char *why, enum bm_flag flags) |
b411b363 | 3337 | { |
e6b3ea83 | 3338 | D_ASSERT(current == mdev->tconn->worker.task); |
b411b363 PR |
3339 | |
3340 | D_ASSERT(!test_bit(BITMAP_IO_QUEUED, &mdev->flags)); | |
3341 | D_ASSERT(!test_bit(BITMAP_IO, &mdev->flags)); | |
3342 | D_ASSERT(list_empty(&mdev->bm_io_work.w.list)); | |
3343 | if (mdev->bm_io_work.why) | |
3344 | dev_err(DEV, "FIXME going to queue '%s' but '%s' still pending?\n", | |
3345 | why, mdev->bm_io_work.why); | |
3346 | ||
3347 | mdev->bm_io_work.io_fn = io_fn; | |
3348 | mdev->bm_io_work.done = done; | |
3349 | mdev->bm_io_work.why = why; | |
20ceb2b2 | 3350 | mdev->bm_io_work.flags = flags; |
b411b363 | 3351 | |
87eeee41 | 3352 | spin_lock_irq(&mdev->tconn->req_lock); |
b411b363 PR |
3353 | set_bit(BITMAP_IO, &mdev->flags); |
3354 | if (atomic_read(&mdev->ap_bio_cnt) == 0) { | |
127b3178 | 3355 | if (!test_and_set_bit(BITMAP_IO_QUEUED, &mdev->flags)) |
d5b27b01 | 3356 | drbd_queue_work(&mdev->tconn->sender_work, &mdev->bm_io_work.w); |
b411b363 | 3357 | } |
87eeee41 | 3358 | spin_unlock_irq(&mdev->tconn->req_lock); |
b411b363 PR |
3359 | } |
3360 | ||
3361 | /** | |
3362 | * drbd_bitmap_io() - Does an IO operation on the whole bitmap | |
3363 | * @mdev: DRBD device. | |
3364 | * @io_fn: IO callback to be called when bitmap IO is possible | |
3365 | * @why: Descriptive text of the reason for doing the IO | |
3366 | * | |
3367 | * freezes application IO while that the actual IO operations runs. This | |
3368 | * functions MAY NOT be called from worker context. | |
3369 | */ | |
20ceb2b2 LE |
3370 | int drbd_bitmap_io(struct drbd_conf *mdev, int (*io_fn)(struct drbd_conf *), |
3371 | char *why, enum bm_flag flags) | |
b411b363 PR |
3372 | { |
3373 | int rv; | |
3374 | ||
e6b3ea83 | 3375 | D_ASSERT(current != mdev->tconn->worker.task); |
b411b363 | 3376 | |
20ceb2b2 LE |
3377 | if ((flags & BM_LOCKED_SET_ALLOWED) == 0) |
3378 | drbd_suspend_io(mdev); | |
b411b363 | 3379 | |
20ceb2b2 | 3380 | drbd_bm_lock(mdev, why, flags); |
b411b363 PR |
3381 | rv = io_fn(mdev); |
3382 | drbd_bm_unlock(mdev); | |
3383 | ||
20ceb2b2 LE |
3384 | if ((flags & BM_LOCKED_SET_ALLOWED) == 0) |
3385 | drbd_resume_io(mdev); | |
b411b363 PR |
3386 | |
3387 | return rv; | |
3388 | } | |
3389 | ||
3390 | void drbd_md_set_flag(struct drbd_conf *mdev, int flag) __must_hold(local) | |
3391 | { | |
3392 | if ((mdev->ldev->md.flags & flag) != flag) { | |
3393 | drbd_md_mark_dirty(mdev); | |
3394 | mdev->ldev->md.flags |= flag; | |
3395 | } | |
3396 | } | |
3397 | ||
3398 | void drbd_md_clear_flag(struct drbd_conf *mdev, int flag) __must_hold(local) | |
3399 | { | |
3400 | if ((mdev->ldev->md.flags & flag) != 0) { | |
3401 | drbd_md_mark_dirty(mdev); | |
3402 | mdev->ldev->md.flags &= ~flag; | |
3403 | } | |
3404 | } | |
3405 | int drbd_md_test_flag(struct drbd_backing_dev *bdev, int flag) | |
3406 | { | |
3407 | return (bdev->md.flags & flag) != 0; | |
3408 | } | |
3409 | ||
3410 | static void md_sync_timer_fn(unsigned long data) | |
3411 | { | |
3412 | struct drbd_conf *mdev = (struct drbd_conf *) data; | |
3413 | ||
b792b655 LE |
3414 | /* must not double-queue! */ |
3415 | if (list_empty(&mdev->md_sync_work.list)) | |
3416 | drbd_queue_work_front(&mdev->tconn->sender_work, &mdev->md_sync_work); | |
b411b363 PR |
3417 | } |
3418 | ||
99920dc5 | 3419 | static int w_md_sync(struct drbd_work *w, int unused) |
b411b363 | 3420 | { |
00d56944 PR |
3421 | struct drbd_conf *mdev = w->mdev; |
3422 | ||
b411b363 | 3423 | dev_warn(DEV, "md_sync_timer expired! Worker calls drbd_md_sync().\n"); |
ee15b038 LE |
3424 | #ifdef DEBUG |
3425 | dev_warn(DEV, "last md_mark_dirty: %s:%u\n", | |
3426 | mdev->last_md_mark_dirty.func, mdev->last_md_mark_dirty.line); | |
3427 | #endif | |
b411b363 | 3428 | drbd_md_sync(mdev); |
99920dc5 | 3429 | return 0; |
b411b363 PR |
3430 | } |
3431 | ||
d8763023 | 3432 | const char *cmdname(enum drbd_packet cmd) |
f2ad9063 AG |
3433 | { |
3434 | /* THINK may need to become several global tables | |
3435 | * when we want to support more than | |
3436 | * one PRO_VERSION */ | |
3437 | static const char *cmdnames[] = { | |
3438 | [P_DATA] = "Data", | |
3439 | [P_DATA_REPLY] = "DataReply", | |
3440 | [P_RS_DATA_REPLY] = "RSDataReply", | |
3441 | [P_BARRIER] = "Barrier", | |
3442 | [P_BITMAP] = "ReportBitMap", | |
3443 | [P_BECOME_SYNC_TARGET] = "BecomeSyncTarget", | |
3444 | [P_BECOME_SYNC_SOURCE] = "BecomeSyncSource", | |
3445 | [P_UNPLUG_REMOTE] = "UnplugRemote", | |
3446 | [P_DATA_REQUEST] = "DataRequest", | |
3447 | [P_RS_DATA_REQUEST] = "RSDataRequest", | |
3448 | [P_SYNC_PARAM] = "SyncParam", | |
3449 | [P_SYNC_PARAM89] = "SyncParam89", | |
3450 | [P_PROTOCOL] = "ReportProtocol", | |
3451 | [P_UUIDS] = "ReportUUIDs", | |
3452 | [P_SIZES] = "ReportSizes", | |
3453 | [P_STATE] = "ReportState", | |
3454 | [P_SYNC_UUID] = "ReportSyncUUID", | |
3455 | [P_AUTH_CHALLENGE] = "AuthChallenge", | |
3456 | [P_AUTH_RESPONSE] = "AuthResponse", | |
3457 | [P_PING] = "Ping", | |
3458 | [P_PING_ACK] = "PingAck", | |
3459 | [P_RECV_ACK] = "RecvAck", | |
3460 | [P_WRITE_ACK] = "WriteAck", | |
3461 | [P_RS_WRITE_ACK] = "RSWriteAck", | |
d4dabbe2 | 3462 | [P_SUPERSEDED] = "Superseded", |
f2ad9063 AG |
3463 | [P_NEG_ACK] = "NegAck", |
3464 | [P_NEG_DREPLY] = "NegDReply", | |
3465 | [P_NEG_RS_DREPLY] = "NegRSDReply", | |
3466 | [P_BARRIER_ACK] = "BarrierAck", | |
3467 | [P_STATE_CHG_REQ] = "StateChgRequest", | |
3468 | [P_STATE_CHG_REPLY] = "StateChgReply", | |
3469 | [P_OV_REQUEST] = "OVRequest", | |
3470 | [P_OV_REPLY] = "OVReply", | |
3471 | [P_OV_RESULT] = "OVResult", | |
3472 | [P_CSUM_RS_REQUEST] = "CsumRSRequest", | |
3473 | [P_RS_IS_IN_SYNC] = "CsumRSIsInSync", | |
3474 | [P_COMPRESSED_BITMAP] = "CBitmap", | |
3475 | [P_DELAY_PROBE] = "DelayProbe", | |
3476 | [P_OUT_OF_SYNC] = "OutOfSync", | |
7be8da07 | 3477 | [P_RETRY_WRITE] = "RetryWrite", |
ae25b336 LE |
3478 | [P_RS_CANCEL] = "RSCancel", |
3479 | [P_CONN_ST_CHG_REQ] = "conn_st_chg_req", | |
3480 | [P_CONN_ST_CHG_REPLY] = "conn_st_chg_reply", | |
036b17ea PR |
3481 | [P_RETRY_WRITE] = "retry_write", |
3482 | [P_PROTOCOL_UPDATE] = "protocol_update", | |
ae25b336 LE |
3483 | |
3484 | /* enum drbd_packet, but not commands - obsoleted flags: | |
3485 | * P_MAY_IGNORE | |
3486 | * P_MAX_OPT_CMD | |
3487 | */ | |
f2ad9063 AG |
3488 | }; |
3489 | ||
ae25b336 | 3490 | /* too big for the array: 0xfffX */ |
e5d6f33a AG |
3491 | if (cmd == P_INITIAL_META) |
3492 | return "InitialMeta"; | |
3493 | if (cmd == P_INITIAL_DATA) | |
3494 | return "InitialData"; | |
6038178e AG |
3495 | if (cmd == P_CONNECTION_FEATURES) |
3496 | return "ConnectionFeatures"; | |
6e849ce8 | 3497 | if (cmd >= ARRAY_SIZE(cmdnames)) |
f2ad9063 AG |
3498 | return "Unknown"; |
3499 | return cmdnames[cmd]; | |
3500 | } | |
3501 | ||
7be8da07 AG |
3502 | /** |
3503 | * drbd_wait_misc - wait for a request to make progress | |
3504 | * @mdev: device associated with the request | |
3505 | * @i: the struct drbd_interval embedded in struct drbd_request or | |
3506 | * struct drbd_peer_request | |
3507 | */ | |
3508 | int drbd_wait_misc(struct drbd_conf *mdev, struct drbd_interval *i) | |
3509 | { | |
44ed167d | 3510 | struct net_conf *nc; |
7be8da07 AG |
3511 | DEFINE_WAIT(wait); |
3512 | long timeout; | |
3513 | ||
44ed167d PR |
3514 | rcu_read_lock(); |
3515 | nc = rcu_dereference(mdev->tconn->net_conf); | |
3516 | if (!nc) { | |
3517 | rcu_read_unlock(); | |
7be8da07 | 3518 | return -ETIMEDOUT; |
44ed167d PR |
3519 | } |
3520 | timeout = nc->ko_count ? nc->timeout * HZ / 10 * nc->ko_count : MAX_SCHEDULE_TIMEOUT; | |
3521 | rcu_read_unlock(); | |
7be8da07 AG |
3522 | |
3523 | /* Indicate to wake up mdev->misc_wait on progress. */ | |
3524 | i->waiting = true; | |
3525 | prepare_to_wait(&mdev->misc_wait, &wait, TASK_INTERRUPTIBLE); | |
3526 | spin_unlock_irq(&mdev->tconn->req_lock); | |
3527 | timeout = schedule_timeout(timeout); | |
3528 | finish_wait(&mdev->misc_wait, &wait); | |
3529 | spin_lock_irq(&mdev->tconn->req_lock); | |
3530 | if (!timeout || mdev->state.conn < C_CONNECTED) | |
3531 | return -ETIMEDOUT; | |
3532 | if (signal_pending(current)) | |
3533 | return -ERESTARTSYS; | |
3534 | return 0; | |
b411b363 PR |
3535 | } |
3536 | ||
3537 | #ifdef CONFIG_DRBD_FAULT_INJECTION | |
3538 | /* Fault insertion support including random number generator shamelessly | |
3539 | * stolen from kernel/rcutorture.c */ | |
3540 | struct fault_random_state { | |
3541 | unsigned long state; | |
3542 | unsigned long count; | |
3543 | }; | |
3544 | ||
3545 | #define FAULT_RANDOM_MULT 39916801 /* prime */ | |
3546 | #define FAULT_RANDOM_ADD 479001701 /* prime */ | |
3547 | #define FAULT_RANDOM_REFRESH 10000 | |
3548 | ||
3549 | /* | |
3550 | * Crude but fast random-number generator. Uses a linear congruential | |
3551 | * generator, with occasional help from get_random_bytes(). | |
3552 | */ | |
3553 | static unsigned long | |
3554 | _drbd_fault_random(struct fault_random_state *rsp) | |
3555 | { | |
3556 | long refresh; | |
3557 | ||
49829ea7 | 3558 | if (!rsp->count--) { |
b411b363 PR |
3559 | get_random_bytes(&refresh, sizeof(refresh)); |
3560 | rsp->state += refresh; | |
3561 | rsp->count = FAULT_RANDOM_REFRESH; | |
3562 | } | |
3563 | rsp->state = rsp->state * FAULT_RANDOM_MULT + FAULT_RANDOM_ADD; | |
3564 | return swahw32(rsp->state); | |
3565 | } | |
3566 | ||
3567 | static char * | |
3568 | _drbd_fault_str(unsigned int type) { | |
3569 | static char *_faults[] = { | |
3570 | [DRBD_FAULT_MD_WR] = "Meta-data write", | |
3571 | [DRBD_FAULT_MD_RD] = "Meta-data read", | |
3572 | [DRBD_FAULT_RS_WR] = "Resync write", | |
3573 | [DRBD_FAULT_RS_RD] = "Resync read", | |
3574 | [DRBD_FAULT_DT_WR] = "Data write", | |
3575 | [DRBD_FAULT_DT_RD] = "Data read", | |
3576 | [DRBD_FAULT_DT_RA] = "Data read ahead", | |
3577 | [DRBD_FAULT_BM_ALLOC] = "BM allocation", | |
6b4388ac PR |
3578 | [DRBD_FAULT_AL_EE] = "EE allocation", |
3579 | [DRBD_FAULT_RECEIVE] = "receive data corruption", | |
b411b363 PR |
3580 | }; |
3581 | ||
3582 | return (type < DRBD_FAULT_MAX) ? _faults[type] : "**Unknown**"; | |
3583 | } | |
3584 | ||
3585 | unsigned int | |
3586 | _drbd_insert_fault(struct drbd_conf *mdev, unsigned int type) | |
3587 | { | |
3588 | static struct fault_random_state rrs = {0, 0}; | |
3589 | ||
3590 | unsigned int ret = ( | |
3591 | (fault_devs == 0 || | |
3592 | ((1 << mdev_to_minor(mdev)) & fault_devs) != 0) && | |
3593 | (((_drbd_fault_random(&rrs) % 100) + 1) <= fault_rate)); | |
3594 | ||
3595 | if (ret) { | |
3596 | fault_count++; | |
3597 | ||
7383506c | 3598 | if (__ratelimit(&drbd_ratelimit_state)) |
b411b363 PR |
3599 | dev_warn(DEV, "***Simulating %s failure\n", |
3600 | _drbd_fault_str(type)); | |
3601 | } | |
3602 | ||
3603 | return ret; | |
3604 | } | |
3605 | #endif | |
3606 | ||
3607 | const char *drbd_buildtag(void) | |
3608 | { | |
3609 | /* DRBD built from external sources has here a reference to the | |
3610 | git hash of the source code. */ | |
3611 | ||
3612 | static char buildtag[38] = "\0uilt-in"; | |
3613 | ||
3614 | if (buildtag[0] == 0) { | |
bc4854bc CW |
3615 | #ifdef MODULE |
3616 | sprintf(buildtag, "srcversion: %-24s", THIS_MODULE->srcversion); | |
3617 | #else | |
3618 | buildtag[0] = 'b'; | |
b411b363 | 3619 | #endif |
b411b363 PR |
3620 | } |
3621 | ||
3622 | return buildtag; | |
3623 | } | |
3624 | ||
3625 | module_init(drbd_init) | |
3626 | module_exit(drbd_cleanup) | |
3627 | ||
b411b363 PR |
3628 | EXPORT_SYMBOL(drbd_conn_str); |
3629 | EXPORT_SYMBOL(drbd_role_str); | |
3630 | EXPORT_SYMBOL(drbd_disk_str); | |
3631 | EXPORT_SYMBOL(drbd_set_st_err_str); |