]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/block/drbd/drbd_receiver.c
drbd: Converted drbdd_init() from mdev to tconn
[mirror_ubuntu-bionic-kernel.git] / drivers / block / drbd / drbd_receiver.c
CommitLineData
b411b363
PR
1/*
2 drbd_receiver.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23 */
24
25
b411b363
PR
26#include <linux/module.h>
27
28#include <asm/uaccess.h>
29#include <net/sock.h>
30
b411b363
PR
31#include <linux/drbd.h>
32#include <linux/fs.h>
33#include <linux/file.h>
34#include <linux/in.h>
35#include <linux/mm.h>
36#include <linux/memcontrol.h>
37#include <linux/mm_inline.h>
38#include <linux/slab.h>
b411b363
PR
39#include <linux/pkt_sched.h>
40#define __KERNEL_SYSCALLS__
41#include <linux/unistd.h>
42#include <linux/vmalloc.h>
43#include <linux/random.h>
b411b363
PR
44#include <linux/string.h>
45#include <linux/scatterlist.h>
46#include "drbd_int.h"
b411b363
PR
47#include "drbd_req.h"
48
49#include "drbd_vli.h"
50
77351055
PR
51struct packet_info {
52 enum drbd_packet cmd;
53 int size;
54 int vnr;
55};
56
b411b363
PR
57enum finish_epoch {
58 FE_STILL_LIVE,
59 FE_DESTROYED,
60 FE_RECYCLED,
61};
62
65d11ed6 63static int drbd_do_handshake(struct drbd_tconn *tconn);
13e6037d 64static int drbd_do_auth(struct drbd_tconn *tconn);
360cc740 65static int drbd_disconnected(int vnr, void *p, void *data);
b411b363
PR
66
67static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *, struct drbd_epoch *, enum epoch_event);
68static int e_end_block(struct drbd_conf *, struct drbd_work *, int);
69
b411b363
PR
70
71#define GFP_TRY (__GFP_HIGHMEM | __GFP_NOWARN)
72
45bb912b
LE
73/*
74 * some helper functions to deal with single linked page lists,
75 * page->private being our "next" pointer.
76 */
77
78/* If at least n pages are linked at head, get n pages off.
79 * Otherwise, don't modify head, and return NULL.
80 * Locking is the responsibility of the caller.
81 */
82static struct page *page_chain_del(struct page **head, int n)
83{
84 struct page *page;
85 struct page *tmp;
86
87 BUG_ON(!n);
88 BUG_ON(!head);
89
90 page = *head;
23ce4227
PR
91
92 if (!page)
93 return NULL;
94
45bb912b
LE
95 while (page) {
96 tmp = page_chain_next(page);
97 if (--n == 0)
98 break; /* found sufficient pages */
99 if (tmp == NULL)
100 /* insufficient pages, don't use any of them. */
101 return NULL;
102 page = tmp;
103 }
104
105 /* add end of list marker for the returned list */
106 set_page_private(page, 0);
107 /* actual return value, and adjustment of head */
108 page = *head;
109 *head = tmp;
110 return page;
111}
112
113/* may be used outside of locks to find the tail of a (usually short)
114 * "private" page chain, before adding it back to a global chain head
115 * with page_chain_add() under a spinlock. */
116static struct page *page_chain_tail(struct page *page, int *len)
117{
118 struct page *tmp;
119 int i = 1;
120 while ((tmp = page_chain_next(page)))
121 ++i, page = tmp;
122 if (len)
123 *len = i;
124 return page;
125}
126
127static int page_chain_free(struct page *page)
128{
129 struct page *tmp;
130 int i = 0;
131 page_chain_for_each_safe(page, tmp) {
132 put_page(page);
133 ++i;
134 }
135 return i;
136}
137
138static void page_chain_add(struct page **head,
139 struct page *chain_first, struct page *chain_last)
140{
141#if 1
142 struct page *tmp;
143 tmp = page_chain_tail(chain_first, NULL);
144 BUG_ON(tmp != chain_last);
145#endif
146
147 /* add chain to head */
148 set_page_private(chain_last, (unsigned long)*head);
149 *head = chain_first;
150}
151
152static struct page *drbd_pp_first_pages_or_try_alloc(struct drbd_conf *mdev, int number)
b411b363
PR
153{
154 struct page *page = NULL;
45bb912b
LE
155 struct page *tmp = NULL;
156 int i = 0;
b411b363
PR
157
158 /* Yes, testing drbd_pp_vacant outside the lock is racy.
159 * So what. It saves a spin_lock. */
45bb912b 160 if (drbd_pp_vacant >= number) {
b411b363 161 spin_lock(&drbd_pp_lock);
45bb912b
LE
162 page = page_chain_del(&drbd_pp_pool, number);
163 if (page)
164 drbd_pp_vacant -= number;
b411b363 165 spin_unlock(&drbd_pp_lock);
45bb912b
LE
166 if (page)
167 return page;
b411b363 168 }
45bb912b 169
b411b363
PR
170 /* GFP_TRY, because we must not cause arbitrary write-out: in a DRBD
171 * "criss-cross" setup, that might cause write-out on some other DRBD,
172 * which in turn might block on the other node at this very place. */
45bb912b
LE
173 for (i = 0; i < number; i++) {
174 tmp = alloc_page(GFP_TRY);
175 if (!tmp)
176 break;
177 set_page_private(tmp, (unsigned long)page);
178 page = tmp;
179 }
180
181 if (i == number)
182 return page;
183
184 /* Not enough pages immediately available this time.
185 * No need to jump around here, drbd_pp_alloc will retry this
186 * function "soon". */
187 if (page) {
188 tmp = page_chain_tail(page, NULL);
189 spin_lock(&drbd_pp_lock);
190 page_chain_add(&drbd_pp_pool, page, tmp);
191 drbd_pp_vacant += i;
192 spin_unlock(&drbd_pp_lock);
193 }
194 return NULL;
b411b363
PR
195}
196
b411b363
PR
197static void reclaim_net_ee(struct drbd_conf *mdev, struct list_head *to_be_freed)
198{
db830c46 199 struct drbd_peer_request *peer_req;
b411b363
PR
200 struct list_head *le, *tle;
201
202 /* The EEs are always appended to the end of the list. Since
203 they are sent in order over the wire, they have to finish
204 in order. As soon as we see the first not finished we can
205 stop to examine the list... */
206
207 list_for_each_safe(le, tle, &mdev->net_ee) {
db830c46
AG
208 peer_req = list_entry(le, struct drbd_peer_request, w.list);
209 if (drbd_ee_has_active_page(peer_req))
b411b363
PR
210 break;
211 list_move(le, to_be_freed);
212 }
213}
214
215static void drbd_kick_lo_and_reclaim_net(struct drbd_conf *mdev)
216{
217 LIST_HEAD(reclaimed);
db830c46 218 struct drbd_peer_request *peer_req, *t;
b411b363 219
87eeee41 220 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 221 reclaim_net_ee(mdev, &reclaimed);
87eeee41 222 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 223
db830c46
AG
224 list_for_each_entry_safe(peer_req, t, &reclaimed, w.list)
225 drbd_free_net_ee(mdev, peer_req);
b411b363
PR
226}
227
228/**
45bb912b 229 * drbd_pp_alloc() - Returns @number pages, retries forever (or until signalled)
b411b363 230 * @mdev: DRBD device.
45bb912b
LE
231 * @number: number of pages requested
232 * @retry: whether to retry, if not enough pages are available right now
233 *
234 * Tries to allocate number pages, first from our own page pool, then from
235 * the kernel, unless this allocation would exceed the max_buffers setting.
236 * Possibly retry until DRBD frees sufficient pages somewhere else.
b411b363 237 *
45bb912b 238 * Returns a page chain linked via page->private.
b411b363 239 */
45bb912b 240static struct page *drbd_pp_alloc(struct drbd_conf *mdev, unsigned number, bool retry)
b411b363
PR
241{
242 struct page *page = NULL;
243 DEFINE_WAIT(wait);
244
45bb912b
LE
245 /* Yes, we may run up to @number over max_buffers. If we
246 * follow it strictly, the admin will get it wrong anyways. */
89e58e75 247 if (atomic_read(&mdev->pp_in_use) < mdev->tconn->net_conf->max_buffers)
45bb912b 248 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363 249
45bb912b 250 while (page == NULL) {
b411b363
PR
251 prepare_to_wait(&drbd_pp_wait, &wait, TASK_INTERRUPTIBLE);
252
253 drbd_kick_lo_and_reclaim_net(mdev);
254
89e58e75 255 if (atomic_read(&mdev->pp_in_use) < mdev->tconn->net_conf->max_buffers) {
45bb912b 256 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363
PR
257 if (page)
258 break;
259 }
260
261 if (!retry)
262 break;
263
264 if (signal_pending(current)) {
265 dev_warn(DEV, "drbd_pp_alloc interrupted!\n");
266 break;
267 }
268
269 schedule();
270 }
271 finish_wait(&drbd_pp_wait, &wait);
272
45bb912b
LE
273 if (page)
274 atomic_add(number, &mdev->pp_in_use);
b411b363
PR
275 return page;
276}
277
278/* Must not be used from irq, as that may deadlock: see drbd_pp_alloc.
87eeee41 279 * Is also used from inside an other spin_lock_irq(&mdev->tconn->req_lock);
45bb912b
LE
280 * Either links the page chain back to the global pool,
281 * or returns all pages to the system. */
435f0740 282static void drbd_pp_free(struct drbd_conf *mdev, struct page *page, int is_net)
b411b363 283{
435f0740 284 atomic_t *a = is_net ? &mdev->pp_in_use_by_net : &mdev->pp_in_use;
b411b363 285 int i;
435f0740 286
1816a2b4 287 if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE)*minor_count)
45bb912b
LE
288 i = page_chain_free(page);
289 else {
290 struct page *tmp;
291 tmp = page_chain_tail(page, &i);
292 spin_lock(&drbd_pp_lock);
293 page_chain_add(&drbd_pp_pool, page, tmp);
294 drbd_pp_vacant += i;
295 spin_unlock(&drbd_pp_lock);
b411b363 296 }
435f0740 297 i = atomic_sub_return(i, a);
45bb912b 298 if (i < 0)
435f0740
LE
299 dev_warn(DEV, "ASSERTION FAILED: %s: %d < 0\n",
300 is_net ? "pp_in_use_by_net" : "pp_in_use", i);
b411b363
PR
301 wake_up(&drbd_pp_wait);
302}
303
304/*
305You need to hold the req_lock:
306 _drbd_wait_ee_list_empty()
307
308You must not have the req_lock:
309 drbd_free_ee()
310 drbd_alloc_ee()
311 drbd_init_ee()
312 drbd_release_ee()
313 drbd_ee_fix_bhs()
314 drbd_process_done_ee()
315 drbd_clear_done_ee()
316 drbd_wait_ee_list_empty()
317*/
318
f6ffca9f
AG
319struct drbd_peer_request *
320drbd_alloc_ee(struct drbd_conf *mdev, u64 id, sector_t sector,
321 unsigned int data_size, gfp_t gfp_mask) __must_hold(local)
b411b363 322{
db830c46 323 struct drbd_peer_request *peer_req;
b411b363 324 struct page *page;
45bb912b 325 unsigned nr_pages = (data_size + PAGE_SIZE -1) >> PAGE_SHIFT;
b411b363 326
0cf9d27e 327 if (drbd_insert_fault(mdev, DRBD_FAULT_AL_EE))
b411b363
PR
328 return NULL;
329
db830c46
AG
330 peer_req = mempool_alloc(drbd_ee_mempool, gfp_mask & ~__GFP_HIGHMEM);
331 if (!peer_req) {
b411b363
PR
332 if (!(gfp_mask & __GFP_NOWARN))
333 dev_err(DEV, "alloc_ee: Allocation of an EE failed\n");
334 return NULL;
335 }
336
45bb912b
LE
337 page = drbd_pp_alloc(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
338 if (!page)
339 goto fail;
b411b363 340
db830c46
AG
341 drbd_clear_interval(&peer_req->i);
342 peer_req->i.size = data_size;
343 peer_req->i.sector = sector;
344 peer_req->i.local = false;
345 peer_req->i.waiting = false;
346
347 peer_req->epoch = NULL;
a21e9298 348 peer_req->w.mdev = mdev;
db830c46
AG
349 peer_req->pages = page;
350 atomic_set(&peer_req->pending_bios, 0);
351 peer_req->flags = 0;
9a8e7753
AG
352 /*
353 * The block_id is opaque to the receiver. It is not endianness
354 * converted, and sent back to the sender unchanged.
355 */
db830c46 356 peer_req->block_id = id;
b411b363 357
db830c46 358 return peer_req;
b411b363 359
45bb912b 360 fail:
db830c46 361 mempool_free(peer_req, drbd_ee_mempool);
b411b363
PR
362 return NULL;
363}
364
db830c46 365void drbd_free_some_ee(struct drbd_conf *mdev, struct drbd_peer_request *peer_req,
f6ffca9f 366 int is_net)
b411b363 367{
db830c46
AG
368 if (peer_req->flags & EE_HAS_DIGEST)
369 kfree(peer_req->digest);
370 drbd_pp_free(mdev, peer_req->pages, is_net);
371 D_ASSERT(atomic_read(&peer_req->pending_bios) == 0);
372 D_ASSERT(drbd_interval_empty(&peer_req->i));
373 mempool_free(peer_req, drbd_ee_mempool);
b411b363
PR
374}
375
376int drbd_release_ee(struct drbd_conf *mdev, struct list_head *list)
377{
378 LIST_HEAD(work_list);
db830c46 379 struct drbd_peer_request *peer_req, *t;
b411b363 380 int count = 0;
435f0740 381 int is_net = list == &mdev->net_ee;
b411b363 382
87eeee41 383 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 384 list_splice_init(list, &work_list);
87eeee41 385 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 386
db830c46
AG
387 list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
388 drbd_free_some_ee(mdev, peer_req, is_net);
b411b363
PR
389 count++;
390 }
391 return count;
392}
393
394
395/*
396 * This function is called from _asender only_
8554df1c 397 * but see also comments in _req_mod(,BARRIER_ACKED)
b411b363
PR
398 * and receive_Barrier.
399 *
400 * Move entries from net_ee to done_ee, if ready.
401 * Grab done_ee, call all callbacks, free the entries.
402 * The callbacks typically send out ACKs.
403 */
404static int drbd_process_done_ee(struct drbd_conf *mdev)
405{
406 LIST_HEAD(work_list);
407 LIST_HEAD(reclaimed);
db830c46 408 struct drbd_peer_request *peer_req, *t;
b411b363
PR
409 int ok = (mdev->state.conn >= C_WF_REPORT_PARAMS);
410
87eeee41 411 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
412 reclaim_net_ee(mdev, &reclaimed);
413 list_splice_init(&mdev->done_ee, &work_list);
87eeee41 414 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 415
db830c46
AG
416 list_for_each_entry_safe(peer_req, t, &reclaimed, w.list)
417 drbd_free_net_ee(mdev, peer_req);
b411b363
PR
418
419 /* possible callbacks here:
420 * e_end_block, and e_end_resync_block, e_send_discard_ack.
421 * all ignore the last argument.
422 */
db830c46 423 list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
b411b363 424 /* list_del not necessary, next/prev members not touched */
db830c46
AG
425 ok = peer_req->w.cb(mdev, &peer_req->w, !ok) && ok;
426 drbd_free_ee(mdev, peer_req);
b411b363
PR
427 }
428 wake_up(&mdev->ee_wait);
429
430 return ok;
431}
432
433void _drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
434{
435 DEFINE_WAIT(wait);
436
437 /* avoids spin_lock/unlock
438 * and calling prepare_to_wait in the fast path */
439 while (!list_empty(head)) {
440 prepare_to_wait(&mdev->ee_wait, &wait, TASK_UNINTERRUPTIBLE);
87eeee41 441 spin_unlock_irq(&mdev->tconn->req_lock);
7eaceacc 442 io_schedule();
b411b363 443 finish_wait(&mdev->ee_wait, &wait);
87eeee41 444 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
445 }
446}
447
448void drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
449{
87eeee41 450 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 451 _drbd_wait_ee_list_empty(mdev, head);
87eeee41 452 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
453}
454
455/* see also kernel_accept; which is only present since 2.6.18.
456 * also we want to log which part of it failed, exactly */
7653620d 457static int drbd_accept(const char **what, struct socket *sock, struct socket **newsock)
b411b363
PR
458{
459 struct sock *sk = sock->sk;
460 int err = 0;
461
462 *what = "listen";
463 err = sock->ops->listen(sock, 5);
464 if (err < 0)
465 goto out;
466
467 *what = "sock_create_lite";
468 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
469 newsock);
470 if (err < 0)
471 goto out;
472
473 *what = "accept";
474 err = sock->ops->accept(sock, *newsock, 0);
475 if (err < 0) {
476 sock_release(*newsock);
477 *newsock = NULL;
478 goto out;
479 }
480 (*newsock)->ops = sock->ops;
481
482out:
483 return err;
484}
485
dbd9eea0 486static int drbd_recv_short(struct socket *sock, void *buf, size_t size, int flags)
b411b363
PR
487{
488 mm_segment_t oldfs;
489 struct kvec iov = {
490 .iov_base = buf,
491 .iov_len = size,
492 };
493 struct msghdr msg = {
494 .msg_iovlen = 1,
495 .msg_iov = (struct iovec *)&iov,
496 .msg_flags = (flags ? flags : MSG_WAITALL | MSG_NOSIGNAL)
497 };
498 int rv;
499
500 oldfs = get_fs();
501 set_fs(KERNEL_DS);
502 rv = sock_recvmsg(sock, &msg, size, msg.msg_flags);
503 set_fs(oldfs);
504
505 return rv;
506}
507
de0ff338 508static int drbd_recv(struct drbd_tconn *tconn, void *buf, size_t size)
b411b363
PR
509{
510 mm_segment_t oldfs;
511 struct kvec iov = {
512 .iov_base = buf,
513 .iov_len = size,
514 };
515 struct msghdr msg = {
516 .msg_iovlen = 1,
517 .msg_iov = (struct iovec *)&iov,
518 .msg_flags = MSG_WAITALL | MSG_NOSIGNAL
519 };
520 int rv;
521
522 oldfs = get_fs();
523 set_fs(KERNEL_DS);
524
525 for (;;) {
de0ff338 526 rv = sock_recvmsg(tconn->data.socket, &msg, size, msg.msg_flags);
b411b363
PR
527 if (rv == size)
528 break;
529
530 /* Note:
531 * ECONNRESET other side closed the connection
532 * ERESTARTSYS (on sock) we got a signal
533 */
534
535 if (rv < 0) {
536 if (rv == -ECONNRESET)
de0ff338 537 conn_info(tconn, "sock was reset by peer\n");
b411b363 538 else if (rv != -ERESTARTSYS)
de0ff338 539 conn_err(tconn, "sock_recvmsg returned %d\n", rv);
b411b363
PR
540 break;
541 } else if (rv == 0) {
de0ff338 542 conn_info(tconn, "sock was shut down by peer\n");
b411b363
PR
543 break;
544 } else {
545 /* signal came in, or peer/link went down,
546 * after we read a partial message
547 */
548 /* D_ASSERT(signal_pending(current)); */
549 break;
550 }
551 };
552
553 set_fs(oldfs);
554
555 if (rv != size)
de0ff338 556 drbd_force_state(tconn->volume0, NS(conn, C_BROKEN_PIPE));
b411b363
PR
557
558 return rv;
559}
560
5dbf1673
LE
561/* quoting tcp(7):
562 * On individual connections, the socket buffer size must be set prior to the
563 * listen(2) or connect(2) calls in order to have it take effect.
564 * This is our wrapper to do so.
565 */
566static void drbd_setbufsize(struct socket *sock, unsigned int snd,
567 unsigned int rcv)
568{
569 /* open coded SO_SNDBUF, SO_RCVBUF */
570 if (snd) {
571 sock->sk->sk_sndbuf = snd;
572 sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
573 }
574 if (rcv) {
575 sock->sk->sk_rcvbuf = rcv;
576 sock->sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
577 }
578}
579
eac3e990 580static struct socket *drbd_try_connect(struct drbd_tconn *tconn)
b411b363
PR
581{
582 const char *what;
583 struct socket *sock;
584 struct sockaddr_in6 src_in6;
585 int err;
586 int disconnect_on_error = 1;
587
eac3e990 588 if (!get_net_conf(tconn))
b411b363
PR
589 return NULL;
590
591 what = "sock_create_kern";
eac3e990 592 err = sock_create_kern(((struct sockaddr *)tconn->net_conf->my_addr)->sa_family,
b411b363
PR
593 SOCK_STREAM, IPPROTO_TCP, &sock);
594 if (err < 0) {
595 sock = NULL;
596 goto out;
597 }
598
599 sock->sk->sk_rcvtimeo =
eac3e990
PR
600 sock->sk->sk_sndtimeo = tconn->net_conf->try_connect_int*HZ;
601 drbd_setbufsize(sock, tconn->net_conf->sndbuf_size,
602 tconn->net_conf->rcvbuf_size);
b411b363
PR
603
604 /* explicitly bind to the configured IP as source IP
605 * for the outgoing connections.
606 * This is needed for multihomed hosts and to be
607 * able to use lo: interfaces for drbd.
608 * Make sure to use 0 as port number, so linux selects
609 * a free one dynamically.
610 */
eac3e990
PR
611 memcpy(&src_in6, tconn->net_conf->my_addr,
612 min_t(int, tconn->net_conf->my_addr_len, sizeof(src_in6)));
613 if (((struct sockaddr *)tconn->net_conf->my_addr)->sa_family == AF_INET6)
b411b363
PR
614 src_in6.sin6_port = 0;
615 else
616 ((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
617
618 what = "bind before connect";
619 err = sock->ops->bind(sock,
620 (struct sockaddr *) &src_in6,
eac3e990 621 tconn->net_conf->my_addr_len);
b411b363
PR
622 if (err < 0)
623 goto out;
624
625 /* connect may fail, peer not yet available.
626 * stay C_WF_CONNECTION, don't go Disconnecting! */
627 disconnect_on_error = 0;
628 what = "connect";
629 err = sock->ops->connect(sock,
eac3e990
PR
630 (struct sockaddr *)tconn->net_conf->peer_addr,
631 tconn->net_conf->peer_addr_len, 0);
b411b363
PR
632
633out:
634 if (err < 0) {
635 if (sock) {
636 sock_release(sock);
637 sock = NULL;
638 }
639 switch (-err) {
640 /* timeout, busy, signal pending */
641 case ETIMEDOUT: case EAGAIN: case EINPROGRESS:
642 case EINTR: case ERESTARTSYS:
643 /* peer not (yet) available, network problem */
644 case ECONNREFUSED: case ENETUNREACH:
645 case EHOSTDOWN: case EHOSTUNREACH:
646 disconnect_on_error = 0;
647 break;
648 default:
eac3e990 649 conn_err(tconn, "%s failed, err = %d\n", what, err);
b411b363
PR
650 }
651 if (disconnect_on_error)
eac3e990 652 drbd_force_state(tconn->volume0, NS(conn, C_DISCONNECTING));
b411b363 653 }
eac3e990 654 put_net_conf(tconn);
b411b363
PR
655 return sock;
656}
657
7653620d 658static struct socket *drbd_wait_for_connect(struct drbd_tconn *tconn)
b411b363
PR
659{
660 int timeo, err;
661 struct socket *s_estab = NULL, *s_listen;
662 const char *what;
663
7653620d 664 if (!get_net_conf(tconn))
b411b363
PR
665 return NULL;
666
667 what = "sock_create_kern";
7653620d 668 err = sock_create_kern(((struct sockaddr *)tconn->net_conf->my_addr)->sa_family,
b411b363
PR
669 SOCK_STREAM, IPPROTO_TCP, &s_listen);
670 if (err) {
671 s_listen = NULL;
672 goto out;
673 }
674
7653620d 675 timeo = tconn->net_conf->try_connect_int * HZ;
b411b363
PR
676 timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
677
678 s_listen->sk->sk_reuse = 1; /* SO_REUSEADDR */
679 s_listen->sk->sk_rcvtimeo = timeo;
680 s_listen->sk->sk_sndtimeo = timeo;
7653620d
PR
681 drbd_setbufsize(s_listen, tconn->net_conf->sndbuf_size,
682 tconn->net_conf->rcvbuf_size);
b411b363
PR
683
684 what = "bind before listen";
685 err = s_listen->ops->bind(s_listen,
7653620d
PR
686 (struct sockaddr *) tconn->net_conf->my_addr,
687 tconn->net_conf->my_addr_len);
b411b363
PR
688 if (err < 0)
689 goto out;
690
7653620d 691 err = drbd_accept(&what, s_listen, &s_estab);
b411b363
PR
692
693out:
694 if (s_listen)
695 sock_release(s_listen);
696 if (err < 0) {
697 if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
7653620d
PR
698 conn_err(tconn, "%s failed, err = %d\n", what, err);
699 drbd_force_state(tconn->volume0, NS(conn, C_DISCONNECTING));
b411b363
PR
700 }
701 }
7653620d 702 put_net_conf(tconn);
b411b363
PR
703
704 return s_estab;
705}
706
d38e787e 707static int drbd_send_fp(struct drbd_tconn *tconn, struct socket *sock, enum drbd_packet cmd)
b411b363 708{
d38e787e 709 struct p_header *h = &tconn->data.sbuf.header;
b411b363 710
d38e787e 711 return _conn_send_cmd(tconn, 0, sock, cmd, h, sizeof(*h), 0);
b411b363
PR
712}
713
a25b63f1 714static enum drbd_packet drbd_recv_fp(struct drbd_tconn *tconn, struct socket *sock)
b411b363 715{
a25b63f1 716 struct p_header80 *h = &tconn->data.rbuf.header.h80;
b411b363
PR
717 int rr;
718
dbd9eea0 719 rr = drbd_recv_short(sock, h, sizeof(*h), 0);
b411b363 720
ca9bc12b 721 if (rr == sizeof(*h) && h->magic == cpu_to_be32(DRBD_MAGIC))
b411b363
PR
722 return be16_to_cpu(h->command);
723
724 return 0xffff;
725}
726
727/**
728 * drbd_socket_okay() - Free the socket if its connection is not okay
b411b363
PR
729 * @sock: pointer to the pointer to the socket.
730 */
dbd9eea0 731static int drbd_socket_okay(struct socket **sock)
b411b363
PR
732{
733 int rr;
734 char tb[4];
735
736 if (!*sock)
81e84650 737 return false;
b411b363 738
dbd9eea0 739 rr = drbd_recv_short(*sock, tb, 4, MSG_DONTWAIT | MSG_PEEK);
b411b363
PR
740
741 if (rr > 0 || rr == -EAGAIN) {
81e84650 742 return true;
b411b363
PR
743 } else {
744 sock_release(*sock);
745 *sock = NULL;
81e84650 746 return false;
b411b363
PR
747 }
748}
749
907599e0
PR
750static int drbd_connected(int vnr, void *p, void *data)
751{
752 struct drbd_conf *mdev = (struct drbd_conf *)p;
753 int ok = 1;
754
755 atomic_set(&mdev->packet_seq, 0);
756 mdev->peer_seq = 0;
757
758 ok &= drbd_send_sync_param(mdev, &mdev->sync_conf);
759 ok &= drbd_send_sizes(mdev, 0, 0);
760 ok &= drbd_send_uuids(mdev);
761 ok &= drbd_send_state(mdev);
762 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
763 clear_bit(RESIZE_PENDING, &mdev->flags);
764
765 return !ok;
766}
767
b411b363
PR
768/*
769 * return values:
770 * 1 yes, we have a valid connection
771 * 0 oops, did not work out, please try again
772 * -1 peer talks different language,
773 * no point in trying again, please go standalone.
774 * -2 We do not have a network config...
775 */
907599e0 776static int drbd_connect(struct drbd_tconn *tconn)
b411b363
PR
777{
778 struct socket *s, *sock, *msock;
779 int try, h, ok;
780
907599e0 781 if (drbd_request_state(tconn->volume0, NS(conn, C_WF_CONNECTION)) < SS_SUCCESS)
b411b363
PR
782 return -2;
783
907599e0
PR
784 clear_bit(DISCARD_CONCURRENT, &tconn->flags);
785 tconn->agreed_pro_version = 99;
fd340c12
PR
786 /* agreed_pro_version must be smaller than 100 so we send the old
787 header (h80) in the first packet and in the handshake packet. */
b411b363
PR
788
789 sock = NULL;
790 msock = NULL;
791
792 do {
793 for (try = 0;;) {
794 /* 3 tries, this should take less than a second! */
907599e0 795 s = drbd_try_connect(tconn);
b411b363
PR
796 if (s || ++try >= 3)
797 break;
798 /* give the other side time to call bind() & listen() */
20ee6390 799 schedule_timeout_interruptible(HZ / 10);
b411b363
PR
800 }
801
802 if (s) {
803 if (!sock) {
907599e0 804 drbd_send_fp(tconn, s, P_HAND_SHAKE_S);
b411b363
PR
805 sock = s;
806 s = NULL;
807 } else if (!msock) {
907599e0 808 drbd_send_fp(tconn, s, P_HAND_SHAKE_M);
b411b363
PR
809 msock = s;
810 s = NULL;
811 } else {
907599e0 812 conn_err(tconn, "Logic error in drbd_connect()\n");
b411b363
PR
813 goto out_release_sockets;
814 }
815 }
816
817 if (sock && msock) {
907599e0 818 schedule_timeout_interruptible(tconn->net_conf->ping_timeo*HZ/10);
dbd9eea0
PR
819 ok = drbd_socket_okay(&sock);
820 ok = drbd_socket_okay(&msock) && ok;
b411b363
PR
821 if (ok)
822 break;
823 }
824
825retry:
907599e0 826 s = drbd_wait_for_connect(tconn);
b411b363 827 if (s) {
907599e0 828 try = drbd_recv_fp(tconn, s);
dbd9eea0
PR
829 drbd_socket_okay(&sock);
830 drbd_socket_okay(&msock);
b411b363
PR
831 switch (try) {
832 case P_HAND_SHAKE_S:
833 if (sock) {
907599e0 834 conn_warn(tconn, "initial packet S crossed\n");
b411b363
PR
835 sock_release(sock);
836 }
837 sock = s;
838 break;
839 case P_HAND_SHAKE_M:
840 if (msock) {
907599e0 841 conn_warn(tconn, "initial packet M crossed\n");
b411b363
PR
842 sock_release(msock);
843 }
844 msock = s;
907599e0 845 set_bit(DISCARD_CONCURRENT, &tconn->flags);
b411b363
PR
846 break;
847 default:
907599e0 848 conn_warn(tconn, "Error receiving initial packet\n");
b411b363
PR
849 sock_release(s);
850 if (random32() & 1)
851 goto retry;
852 }
853 }
854
907599e0 855 if (tconn->volume0->state.conn <= C_DISCONNECTING)
b411b363
PR
856 goto out_release_sockets;
857 if (signal_pending(current)) {
858 flush_signals(current);
859 smp_rmb();
907599e0 860 if (get_t_state(&tconn->receiver) == EXITING)
b411b363
PR
861 goto out_release_sockets;
862 }
863
864 if (sock && msock) {
dbd9eea0
PR
865 ok = drbd_socket_okay(&sock);
866 ok = drbd_socket_okay(&msock) && ok;
b411b363
PR
867 if (ok)
868 break;
869 }
870 } while (1);
871
872 msock->sk->sk_reuse = 1; /* SO_REUSEADDR */
873 sock->sk->sk_reuse = 1; /* SO_REUSEADDR */
874
875 sock->sk->sk_allocation = GFP_NOIO;
876 msock->sk->sk_allocation = GFP_NOIO;
877
878 sock->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
879 msock->sk->sk_priority = TC_PRIO_INTERACTIVE;
880
b411b363 881 /* NOT YET ...
907599e0 882 * sock->sk->sk_sndtimeo = tconn->net_conf->timeout*HZ/10;
b411b363
PR
883 * sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
884 * first set it to the P_HAND_SHAKE timeout,
885 * which we set to 4x the configured ping_timeout. */
886 sock->sk->sk_sndtimeo =
907599e0 887 sock->sk->sk_rcvtimeo = tconn->net_conf->ping_timeo*4*HZ/10;
b411b363 888
907599e0
PR
889 msock->sk->sk_sndtimeo = tconn->net_conf->timeout*HZ/10;
890 msock->sk->sk_rcvtimeo = tconn->net_conf->ping_int*HZ;
b411b363
PR
891
892 /* we don't want delays.
25985edc 893 * we use TCP_CORK where appropriate, though */
b411b363
PR
894 drbd_tcp_nodelay(sock);
895 drbd_tcp_nodelay(msock);
896
907599e0
PR
897 tconn->data.socket = sock;
898 tconn->meta.socket = msock;
899 tconn->last_received = jiffies;
b411b363 900
907599e0 901 h = drbd_do_handshake(tconn);
b411b363
PR
902 if (h <= 0)
903 return h;
904
907599e0 905 if (tconn->cram_hmac_tfm) {
b411b363 906 /* drbd_request_state(mdev, NS(conn, WFAuth)); */
907599e0 907 switch (drbd_do_auth(tconn)) {
b10d96cb 908 case -1:
907599e0 909 conn_err(tconn, "Authentication of peer failed\n");
b411b363 910 return -1;
b10d96cb 911 case 0:
907599e0 912 conn_err(tconn, "Authentication of peer failed, trying again.\n");
b10d96cb 913 return 0;
b411b363
PR
914 }
915 }
916
907599e0 917 if (drbd_request_state(tconn->volume0, NS(conn, C_WF_REPORT_PARAMS)) < SS_SUCCESS)
b411b363
PR
918 return 0;
919
907599e0 920 sock->sk->sk_sndtimeo = tconn->net_conf->timeout*HZ/10;
b411b363
PR
921 sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
922
907599e0 923 drbd_thread_start(&tconn->asender);
b411b363 924
907599e0 925 if (drbd_send_protocol(tconn) == -1)
7e2455c1 926 return -1;
b411b363 927
907599e0 928 return !idr_for_each(&tconn->volumes, drbd_connected, tconn);
b411b363
PR
929
930out_release_sockets:
931 if (sock)
932 sock_release(sock);
933 if (msock)
934 sock_release(msock);
935 return -1;
936}
937
ce243853 938static bool decode_header(struct drbd_tconn *tconn, struct p_header *h, struct packet_info *pi)
b411b363 939{
fd340c12 940 if (h->h80.magic == cpu_to_be32(DRBD_MAGIC)) {
77351055
PR
941 pi->cmd = be16_to_cpu(h->h80.command);
942 pi->size = be16_to_cpu(h->h80.length);
eefc2f7d 943 pi->vnr = 0;
ca9bc12b 944 } else if (h->h95.magic == cpu_to_be16(DRBD_MAGIC_BIG)) {
77351055
PR
945 pi->cmd = be16_to_cpu(h->h95.command);
946 pi->size = be32_to_cpu(h->h95.length) & 0x00ffffff;
947 pi->vnr = 0;
02918be2 948 } else {
ce243853 949 conn_err(tconn, "magic?? on data m: 0x%08x c: %d l: %d\n",
004352fa
LE
950 be32_to_cpu(h->h80.magic),
951 be16_to_cpu(h->h80.command),
952 be16_to_cpu(h->h80.length));
81e84650 953 return false;
b411b363 954 }
257d0af6
PR
955 return true;
956}
957
9ba7aa00 958static int drbd_recv_header(struct drbd_tconn *tconn, struct packet_info *pi)
257d0af6 959{
9ba7aa00 960 struct p_header *h = &tconn->data.rbuf.header;
257d0af6
PR
961 int r;
962
9ba7aa00 963 r = drbd_recv(tconn, h, sizeof(*h));
257d0af6
PR
964 if (unlikely(r != sizeof(*h))) {
965 if (!signal_pending(current))
9ba7aa00 966 conn_warn(tconn, "short read expecting header on sock: r=%d\n", r);
257d0af6
PR
967 return false;
968 }
969
9ba7aa00
PR
970 r = decode_header(tconn, h, pi);
971 tconn->last_received = jiffies;
b411b363 972
257d0af6 973 return r;
b411b363
PR
974}
975
2451fc3b 976static void drbd_flush(struct drbd_conf *mdev)
b411b363
PR
977{
978 int rv;
979
980 if (mdev->write_ordering >= WO_bdev_flush && get_ldev(mdev)) {
fbd9b09a 981 rv = blkdev_issue_flush(mdev->ldev->backing_bdev, GFP_KERNEL,
dd3932ed 982 NULL);
b411b363
PR
983 if (rv) {
984 dev_err(DEV, "local disk flush failed with status %d\n", rv);
985 /* would rather check on EOPNOTSUPP, but that is not reliable.
986 * don't try again for ANY return value != 0
987 * if (rv == -EOPNOTSUPP) */
988 drbd_bump_write_ordering(mdev, WO_drain_io);
989 }
990 put_ldev(mdev);
991 }
b411b363
PR
992}
993
994/**
995 * drbd_may_finish_epoch() - Applies an epoch_event to the epoch's state, eventually finishes it.
996 * @mdev: DRBD device.
997 * @epoch: Epoch object.
998 * @ev: Epoch event.
999 */
1000static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
1001 struct drbd_epoch *epoch,
1002 enum epoch_event ev)
1003{
2451fc3b 1004 int epoch_size;
b411b363 1005 struct drbd_epoch *next_epoch;
b411b363
PR
1006 enum finish_epoch rv = FE_STILL_LIVE;
1007
1008 spin_lock(&mdev->epoch_lock);
1009 do {
1010 next_epoch = NULL;
b411b363
PR
1011
1012 epoch_size = atomic_read(&epoch->epoch_size);
1013
1014 switch (ev & ~EV_CLEANUP) {
1015 case EV_PUT:
1016 atomic_dec(&epoch->active);
1017 break;
1018 case EV_GOT_BARRIER_NR:
1019 set_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags);
b411b363
PR
1020 break;
1021 case EV_BECAME_LAST:
1022 /* nothing to do*/
1023 break;
1024 }
1025
b411b363
PR
1026 if (epoch_size != 0 &&
1027 atomic_read(&epoch->active) == 0 &&
2451fc3b 1028 test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags)) {
b411b363
PR
1029 if (!(ev & EV_CLEANUP)) {
1030 spin_unlock(&mdev->epoch_lock);
1031 drbd_send_b_ack(mdev, epoch->barrier_nr, epoch_size);
1032 spin_lock(&mdev->epoch_lock);
1033 }
1034 dec_unacked(mdev);
1035
1036 if (mdev->current_epoch != epoch) {
1037 next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
1038 list_del(&epoch->list);
1039 ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
1040 mdev->epochs--;
b411b363
PR
1041 kfree(epoch);
1042
1043 if (rv == FE_STILL_LIVE)
1044 rv = FE_DESTROYED;
1045 } else {
1046 epoch->flags = 0;
1047 atomic_set(&epoch->epoch_size, 0);
698f9315 1048 /* atomic_set(&epoch->active, 0); is already zero */
b411b363
PR
1049 if (rv == FE_STILL_LIVE)
1050 rv = FE_RECYCLED;
2451fc3b 1051 wake_up(&mdev->ee_wait);
b411b363
PR
1052 }
1053 }
1054
1055 if (!next_epoch)
1056 break;
1057
1058 epoch = next_epoch;
1059 } while (1);
1060
1061 spin_unlock(&mdev->epoch_lock);
1062
b411b363
PR
1063 return rv;
1064}
1065
1066/**
1067 * drbd_bump_write_ordering() - Fall back to an other write ordering method
1068 * @mdev: DRBD device.
1069 * @wo: Write ordering method to try.
1070 */
1071void drbd_bump_write_ordering(struct drbd_conf *mdev, enum write_ordering_e wo) __must_hold(local)
1072{
1073 enum write_ordering_e pwo;
1074 static char *write_ordering_str[] = {
1075 [WO_none] = "none",
1076 [WO_drain_io] = "drain",
1077 [WO_bdev_flush] = "flush",
b411b363
PR
1078 };
1079
1080 pwo = mdev->write_ordering;
1081 wo = min(pwo, wo);
b411b363
PR
1082 if (wo == WO_bdev_flush && mdev->ldev->dc.no_disk_flush)
1083 wo = WO_drain_io;
1084 if (wo == WO_drain_io && mdev->ldev->dc.no_disk_drain)
1085 wo = WO_none;
1086 mdev->write_ordering = wo;
2451fc3b 1087 if (pwo != mdev->write_ordering || wo == WO_bdev_flush)
b411b363
PR
1088 dev_info(DEV, "Method to ensure write ordering: %s\n", write_ordering_str[mdev->write_ordering]);
1089}
1090
45bb912b
LE
1091/**
1092 * drbd_submit_ee()
1093 * @mdev: DRBD device.
db830c46 1094 * @peer_req: peer request
45bb912b 1095 * @rw: flag field, see bio->bi_rw
10f6d992
LE
1096 *
1097 * May spread the pages to multiple bios,
1098 * depending on bio_add_page restrictions.
1099 *
1100 * Returns 0 if all bios have been submitted,
1101 * -ENOMEM if we could not allocate enough bios,
1102 * -ENOSPC (any better suggestion?) if we have not been able to bio_add_page a
1103 * single page to an empty bio (which should never happen and likely indicates
1104 * that the lower level IO stack is in some way broken). This has been observed
1105 * on certain Xen deployments.
45bb912b
LE
1106 */
1107/* TODO allocate from our own bio_set. */
db830c46 1108int drbd_submit_ee(struct drbd_conf *mdev, struct drbd_peer_request *peer_req,
f6ffca9f 1109 const unsigned rw, const int fault_type)
45bb912b
LE
1110{
1111 struct bio *bios = NULL;
1112 struct bio *bio;
db830c46
AG
1113 struct page *page = peer_req->pages;
1114 sector_t sector = peer_req->i.sector;
1115 unsigned ds = peer_req->i.size;
45bb912b
LE
1116 unsigned n_bios = 0;
1117 unsigned nr_pages = (ds + PAGE_SIZE -1) >> PAGE_SHIFT;
10f6d992 1118 int err = -ENOMEM;
45bb912b
LE
1119
1120 /* In most cases, we will only need one bio. But in case the lower
1121 * level restrictions happen to be different at this offset on this
1122 * side than those of the sending peer, we may need to submit the
1123 * request in more than one bio. */
1124next_bio:
1125 bio = bio_alloc(GFP_NOIO, nr_pages);
1126 if (!bio) {
1127 dev_err(DEV, "submit_ee: Allocation of a bio failed\n");
1128 goto fail;
1129 }
db830c46 1130 /* > peer_req->i.sector, unless this is the first bio */
45bb912b
LE
1131 bio->bi_sector = sector;
1132 bio->bi_bdev = mdev->ldev->backing_bdev;
45bb912b 1133 bio->bi_rw = rw;
db830c46 1134 bio->bi_private = peer_req;
45bb912b
LE
1135 bio->bi_end_io = drbd_endio_sec;
1136
1137 bio->bi_next = bios;
1138 bios = bio;
1139 ++n_bios;
1140
1141 page_chain_for_each(page) {
1142 unsigned len = min_t(unsigned, ds, PAGE_SIZE);
1143 if (!bio_add_page(bio, page, len, 0)) {
10f6d992
LE
1144 /* A single page must always be possible!
1145 * But in case it fails anyways,
1146 * we deal with it, and complain (below). */
1147 if (bio->bi_vcnt == 0) {
1148 dev_err(DEV,
1149 "bio_add_page failed for len=%u, "
1150 "bi_vcnt=0 (bi_sector=%llu)\n",
1151 len, (unsigned long long)bio->bi_sector);
1152 err = -ENOSPC;
1153 goto fail;
1154 }
45bb912b
LE
1155 goto next_bio;
1156 }
1157 ds -= len;
1158 sector += len >> 9;
1159 --nr_pages;
1160 }
1161 D_ASSERT(page == NULL);
1162 D_ASSERT(ds == 0);
1163
db830c46 1164 atomic_set(&peer_req->pending_bios, n_bios);
45bb912b
LE
1165 do {
1166 bio = bios;
1167 bios = bios->bi_next;
1168 bio->bi_next = NULL;
1169
45bb912b 1170 drbd_generic_make_request(mdev, fault_type, bio);
45bb912b 1171 } while (bios);
45bb912b
LE
1172 return 0;
1173
1174fail:
1175 while (bios) {
1176 bio = bios;
1177 bios = bios->bi_next;
1178 bio_put(bio);
1179 }
10f6d992 1180 return err;
45bb912b
LE
1181}
1182
53840641 1183static void drbd_remove_epoch_entry_interval(struct drbd_conf *mdev,
db830c46 1184 struct drbd_peer_request *peer_req)
53840641 1185{
db830c46 1186 struct drbd_interval *i = &peer_req->i;
53840641
AG
1187
1188 drbd_remove_interval(&mdev->write_requests, i);
1189 drbd_clear_interval(i);
1190
6c852bec 1191 /* Wake up any processes waiting for this peer request to complete. */
53840641
AG
1192 if (i->waiting)
1193 wake_up(&mdev->misc_wait);
1194}
1195
d8763023
AG
1196static int receive_Barrier(struct drbd_conf *mdev, enum drbd_packet cmd,
1197 unsigned int data_size)
b411b363 1198{
2451fc3b 1199 int rv;
e42325a5 1200 struct p_barrier *p = &mdev->tconn->data.rbuf.barrier;
b411b363
PR
1201 struct drbd_epoch *epoch;
1202
b411b363
PR
1203 inc_unacked(mdev);
1204
b411b363
PR
1205 mdev->current_epoch->barrier_nr = p->barrier;
1206 rv = drbd_may_finish_epoch(mdev, mdev->current_epoch, EV_GOT_BARRIER_NR);
1207
1208 /* P_BARRIER_ACK may imply that the corresponding extent is dropped from
1209 * the activity log, which means it would not be resynced in case the
1210 * R_PRIMARY crashes now.
1211 * Therefore we must send the barrier_ack after the barrier request was
1212 * completed. */
1213 switch (mdev->write_ordering) {
b411b363
PR
1214 case WO_none:
1215 if (rv == FE_RECYCLED)
81e84650 1216 return true;
2451fc3b
PR
1217
1218 /* receiver context, in the writeout path of the other node.
1219 * avoid potential distributed deadlock */
1220 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1221 if (epoch)
1222 break;
1223 else
1224 dev_warn(DEV, "Allocation of an epoch failed, slowing down\n");
1225 /* Fall through */
b411b363
PR
1226
1227 case WO_bdev_flush:
1228 case WO_drain_io:
b411b363 1229 drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
2451fc3b
PR
1230 drbd_flush(mdev);
1231
1232 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1233 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1234 if (epoch)
1235 break;
b411b363
PR
1236 }
1237
2451fc3b
PR
1238 epoch = mdev->current_epoch;
1239 wait_event(mdev->ee_wait, atomic_read(&epoch->epoch_size) == 0);
1240
1241 D_ASSERT(atomic_read(&epoch->active) == 0);
1242 D_ASSERT(epoch->flags == 0);
b411b363 1243
81e84650 1244 return true;
2451fc3b
PR
1245 default:
1246 dev_err(DEV, "Strangeness in mdev->write_ordering %d\n", mdev->write_ordering);
81e84650 1247 return false;
b411b363
PR
1248 }
1249
1250 epoch->flags = 0;
1251 atomic_set(&epoch->epoch_size, 0);
1252 atomic_set(&epoch->active, 0);
1253
1254 spin_lock(&mdev->epoch_lock);
1255 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1256 list_add(&epoch->list, &mdev->current_epoch->list);
1257 mdev->current_epoch = epoch;
1258 mdev->epochs++;
b411b363
PR
1259 } else {
1260 /* The current_epoch got recycled while we allocated this one... */
1261 kfree(epoch);
1262 }
1263 spin_unlock(&mdev->epoch_lock);
1264
81e84650 1265 return true;
b411b363
PR
1266}
1267
1268/* used from receive_RSDataReply (recv_resync_read)
1269 * and from receive_Data */
f6ffca9f
AG
1270static struct drbd_peer_request *
1271read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector,
1272 int data_size) __must_hold(local)
b411b363 1273{
6666032a 1274 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
db830c46 1275 struct drbd_peer_request *peer_req;
b411b363 1276 struct page *page;
45bb912b 1277 int dgs, ds, rr;
a0638456
PR
1278 void *dig_in = mdev->tconn->int_dig_in;
1279 void *dig_vv = mdev->tconn->int_dig_vv;
6b4388ac 1280 unsigned long *data;
b411b363 1281
a0638456
PR
1282 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
1283 crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
b411b363
PR
1284
1285 if (dgs) {
de0ff338 1286 rr = drbd_recv(mdev->tconn, dig_in, dgs);
b411b363 1287 if (rr != dgs) {
0ddc5549
LE
1288 if (!signal_pending(current))
1289 dev_warn(DEV,
1290 "short read receiving data digest: read %d expected %d\n",
1291 rr, dgs);
b411b363
PR
1292 return NULL;
1293 }
1294 }
1295
1296 data_size -= dgs;
1297
841ce241
AG
1298 if (!expect(data_size != 0))
1299 return NULL;
1300 if (!expect(IS_ALIGNED(data_size, 512)))
1301 return NULL;
1302 if (!expect(data_size <= DRBD_MAX_BIO_SIZE))
1303 return NULL;
b411b363 1304
6666032a
LE
1305 /* even though we trust out peer,
1306 * we sometimes have to double check. */
1307 if (sector + (data_size>>9) > capacity) {
fdda6544
LE
1308 dev_err(DEV, "request from peer beyond end of local disk: "
1309 "capacity: %llus < sector: %llus + size: %u\n",
6666032a
LE
1310 (unsigned long long)capacity,
1311 (unsigned long long)sector, data_size);
1312 return NULL;
1313 }
1314
b411b363
PR
1315 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1316 * "criss-cross" setup, that might cause write-out on some other DRBD,
1317 * which in turn might block on the other node at this very place. */
db830c46
AG
1318 peer_req = drbd_alloc_ee(mdev, id, sector, data_size, GFP_NOIO);
1319 if (!peer_req)
b411b363 1320 return NULL;
45bb912b 1321
b411b363 1322 ds = data_size;
db830c46 1323 page = peer_req->pages;
45bb912b
LE
1324 page_chain_for_each(page) {
1325 unsigned len = min_t(int, ds, PAGE_SIZE);
6b4388ac 1326 data = kmap(page);
de0ff338 1327 rr = drbd_recv(mdev->tconn, data, len);
0cf9d27e 1328 if (drbd_insert_fault(mdev, DRBD_FAULT_RECEIVE)) {
6b4388ac
PR
1329 dev_err(DEV, "Fault injection: Corrupting data on receive\n");
1330 data[0] = data[0] ^ (unsigned long)-1;
1331 }
b411b363 1332 kunmap(page);
45bb912b 1333 if (rr != len) {
db830c46 1334 drbd_free_ee(mdev, peer_req);
0ddc5549
LE
1335 if (!signal_pending(current))
1336 dev_warn(DEV, "short read receiving data: read %d expected %d\n",
1337 rr, len);
b411b363
PR
1338 return NULL;
1339 }
1340 ds -= rr;
1341 }
1342
1343 if (dgs) {
db830c46 1344 drbd_csum_ee(mdev, mdev->tconn->integrity_r_tfm, peer_req, dig_vv);
b411b363 1345 if (memcmp(dig_in, dig_vv, dgs)) {
470be44a
LE
1346 dev_err(DEV, "Digest integrity check FAILED: %llus +%u\n",
1347 (unsigned long long)sector, data_size);
b411b363 1348 drbd_bcast_ee(mdev, "digest failed",
db830c46
AG
1349 dgs, dig_in, dig_vv, peer_req);
1350 drbd_free_ee(mdev, peer_req);
b411b363
PR
1351 return NULL;
1352 }
1353 }
1354 mdev->recv_cnt += data_size>>9;
db830c46 1355 return peer_req;
b411b363
PR
1356}
1357
1358/* drbd_drain_block() just takes a data block
1359 * out of the socket input buffer, and discards it.
1360 */
1361static int drbd_drain_block(struct drbd_conf *mdev, int data_size)
1362{
1363 struct page *page;
1364 int rr, rv = 1;
1365 void *data;
1366
c3470cde 1367 if (!data_size)
81e84650 1368 return true;
c3470cde 1369
45bb912b 1370 page = drbd_pp_alloc(mdev, 1, 1);
b411b363
PR
1371
1372 data = kmap(page);
1373 while (data_size) {
de0ff338 1374 rr = drbd_recv(mdev->tconn, data, min_t(int, data_size, PAGE_SIZE));
b411b363
PR
1375 if (rr != min_t(int, data_size, PAGE_SIZE)) {
1376 rv = 0;
0ddc5549
LE
1377 if (!signal_pending(current))
1378 dev_warn(DEV,
1379 "short read receiving data: read %d expected %d\n",
1380 rr, min_t(int, data_size, PAGE_SIZE));
b411b363
PR
1381 break;
1382 }
1383 data_size -= rr;
1384 }
1385 kunmap(page);
435f0740 1386 drbd_pp_free(mdev, page, 0);
b411b363
PR
1387 return rv;
1388}
1389
1390static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
1391 sector_t sector, int data_size)
1392{
1393 struct bio_vec *bvec;
1394 struct bio *bio;
1395 int dgs, rr, i, expect;
a0638456
PR
1396 void *dig_in = mdev->tconn->int_dig_in;
1397 void *dig_vv = mdev->tconn->int_dig_vv;
b411b363 1398
a0638456
PR
1399 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
1400 crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
b411b363
PR
1401
1402 if (dgs) {
de0ff338 1403 rr = drbd_recv(mdev->tconn, dig_in, dgs);
b411b363 1404 if (rr != dgs) {
0ddc5549
LE
1405 if (!signal_pending(current))
1406 dev_warn(DEV,
1407 "short read receiving data reply digest: read %d expected %d\n",
1408 rr, dgs);
b411b363
PR
1409 return 0;
1410 }
1411 }
1412
1413 data_size -= dgs;
1414
1415 /* optimistically update recv_cnt. if receiving fails below,
1416 * we disconnect anyways, and counters will be reset. */
1417 mdev->recv_cnt += data_size>>9;
1418
1419 bio = req->master_bio;
1420 D_ASSERT(sector == bio->bi_sector);
1421
1422 bio_for_each_segment(bvec, bio, i) {
1423 expect = min_t(int, data_size, bvec->bv_len);
de0ff338 1424 rr = drbd_recv(mdev->tconn,
b411b363
PR
1425 kmap(bvec->bv_page)+bvec->bv_offset,
1426 expect);
1427 kunmap(bvec->bv_page);
1428 if (rr != expect) {
0ddc5549
LE
1429 if (!signal_pending(current))
1430 dev_warn(DEV, "short read receiving data reply: "
1431 "read %d expected %d\n",
1432 rr, expect);
b411b363
PR
1433 return 0;
1434 }
1435 data_size -= rr;
1436 }
1437
1438 if (dgs) {
a0638456 1439 drbd_csum_bio(mdev, mdev->tconn->integrity_r_tfm, bio, dig_vv);
b411b363
PR
1440 if (memcmp(dig_in, dig_vv, dgs)) {
1441 dev_err(DEV, "Digest integrity check FAILED. Broken NICs?\n");
1442 return 0;
1443 }
1444 }
1445
1446 D_ASSERT(data_size == 0);
1447 return 1;
1448}
1449
1450/* e_end_resync_block() is called via
1451 * drbd_process_done_ee() by asender only */
1452static int e_end_resync_block(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1453{
db830c46
AG
1454 struct drbd_peer_request *peer_req = (struct drbd_peer_request *)w;
1455 sector_t sector = peer_req->i.sector;
b411b363
PR
1456 int ok;
1457
db830c46 1458 D_ASSERT(drbd_interval_empty(&peer_req->i));
b411b363 1459
db830c46
AG
1460 if (likely((peer_req->flags & EE_WAS_ERROR) == 0)) {
1461 drbd_set_in_sync(mdev, sector, peer_req->i.size);
1462 ok = drbd_send_ack(mdev, P_RS_WRITE_ACK, peer_req);
b411b363
PR
1463 } else {
1464 /* Record failure to sync */
db830c46 1465 drbd_rs_failed_io(mdev, sector, peer_req->i.size);
b411b363 1466
db830c46 1467 ok = drbd_send_ack(mdev, P_NEG_ACK, peer_req);
b411b363
PR
1468 }
1469 dec_unacked(mdev);
1470
1471 return ok;
1472}
1473
1474static int recv_resync_read(struct drbd_conf *mdev, sector_t sector, int data_size) __releases(local)
1475{
db830c46 1476 struct drbd_peer_request *peer_req;
b411b363 1477
db830c46
AG
1478 peer_req = read_in_block(mdev, ID_SYNCER, sector, data_size);
1479 if (!peer_req)
45bb912b 1480 goto fail;
b411b363
PR
1481
1482 dec_rs_pending(mdev);
1483
b411b363
PR
1484 inc_unacked(mdev);
1485 /* corresponding dec_unacked() in e_end_resync_block()
1486 * respective _drbd_clear_done_ee */
1487
db830c46 1488 peer_req->w.cb = e_end_resync_block;
45bb912b 1489
87eeee41 1490 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 1491 list_add(&peer_req->w.list, &mdev->sync_ee);
87eeee41 1492 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 1493
0f0601f4 1494 atomic_add(data_size >> 9, &mdev->rs_sect_ev);
db830c46 1495 if (drbd_submit_ee(mdev, peer_req, WRITE, DRBD_FAULT_RS_WR) == 0)
81e84650 1496 return true;
b411b363 1497
10f6d992
LE
1498 /* don't care for the reason here */
1499 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 1500 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 1501 list_del(&peer_req->w.list);
87eeee41 1502 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9 1503
db830c46 1504 drbd_free_ee(mdev, peer_req);
45bb912b
LE
1505fail:
1506 put_ldev(mdev);
81e84650 1507 return false;
b411b363
PR
1508}
1509
668eebc6 1510static struct drbd_request *
bc9c5c41
AG
1511find_request(struct drbd_conf *mdev, struct rb_root *root, u64 id,
1512 sector_t sector, bool missing_ok, const char *func)
51624585 1513{
51624585
AG
1514 struct drbd_request *req;
1515
bc9c5c41
AG
1516 /* Request object according to our peer */
1517 req = (struct drbd_request *)(unsigned long)id;
5e472264 1518 if (drbd_contains_interval(root, sector, &req->i) && req->i.local)
668eebc6 1519 return req;
c3afd8f5
AG
1520 if (!missing_ok) {
1521 dev_err(DEV, "%s: failed to find request %lu, sector %llus\n", func,
1522 (unsigned long)id, (unsigned long long)sector);
1523 }
51624585
AG
1524 return NULL;
1525}
1526
d8763023
AG
1527static int receive_DataReply(struct drbd_conf *mdev, enum drbd_packet cmd,
1528 unsigned int data_size)
b411b363
PR
1529{
1530 struct drbd_request *req;
1531 sector_t sector;
b411b363 1532 int ok;
e42325a5 1533 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1534
1535 sector = be64_to_cpu(p->sector);
1536
87eeee41 1537 spin_lock_irq(&mdev->tconn->req_lock);
bc9c5c41 1538 req = find_request(mdev, &mdev->read_requests, p->block_id, sector, false, __func__);
87eeee41 1539 spin_unlock_irq(&mdev->tconn->req_lock);
c3afd8f5 1540 if (unlikely(!req))
81e84650 1541 return false;
b411b363 1542
24c4830c 1543 /* hlist_del(&req->collision) is done in _req_may_be_done, to avoid
b411b363
PR
1544 * special casing it there for the various failure cases.
1545 * still no race with drbd_fail_pending_reads */
1546 ok = recv_dless_read(mdev, req, sector, data_size);
1547
1548 if (ok)
8554df1c 1549 req_mod(req, DATA_RECEIVED);
b411b363
PR
1550 /* else: nothing. handled from drbd_disconnect...
1551 * I don't think we may complete this just yet
1552 * in case we are "on-disconnect: freeze" */
1553
1554 return ok;
1555}
1556
d8763023
AG
1557static int receive_RSDataReply(struct drbd_conf *mdev, enum drbd_packet cmd,
1558 unsigned int data_size)
b411b363
PR
1559{
1560 sector_t sector;
b411b363 1561 int ok;
e42325a5 1562 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1563
1564 sector = be64_to_cpu(p->sector);
1565 D_ASSERT(p->block_id == ID_SYNCER);
1566
1567 if (get_ldev(mdev)) {
1568 /* data is submitted to disk within recv_resync_read.
1569 * corresponding put_ldev done below on error,
9c50842a 1570 * or in drbd_endio_sec. */
b411b363
PR
1571 ok = recv_resync_read(mdev, sector, data_size);
1572 } else {
1573 if (__ratelimit(&drbd_ratelimit_state))
1574 dev_err(DEV, "Can not write resync data to local disk.\n");
1575
1576 ok = drbd_drain_block(mdev, data_size);
1577
2b2bf214 1578 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1579 }
1580
778f271d
PR
1581 atomic_add(data_size >> 9, &mdev->rs_sect_in);
1582
b411b363
PR
1583 return ok;
1584}
1585
1586/* e_end_block() is called via drbd_process_done_ee().
1587 * this means this function only runs in the asender thread
1588 */
1589static int e_end_block(struct drbd_conf *mdev, struct drbd_work *w, int cancel)
1590{
db830c46
AG
1591 struct drbd_peer_request *peer_req = (struct drbd_peer_request *)w;
1592 sector_t sector = peer_req->i.sector;
b411b363
PR
1593 int ok = 1, pcmd;
1594
89e58e75 1595 if (mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C) {
db830c46 1596 if (likely((peer_req->flags & EE_WAS_ERROR) == 0)) {
b411b363
PR
1597 pcmd = (mdev->state.conn >= C_SYNC_SOURCE &&
1598 mdev->state.conn <= C_PAUSED_SYNC_T &&
db830c46 1599 peer_req->flags & EE_MAY_SET_IN_SYNC) ?
b411b363 1600 P_RS_WRITE_ACK : P_WRITE_ACK;
db830c46 1601 ok &= drbd_send_ack(mdev, pcmd, peer_req);
b411b363 1602 if (pcmd == P_RS_WRITE_ACK)
db830c46 1603 drbd_set_in_sync(mdev, sector, peer_req->i.size);
b411b363 1604 } else {
db830c46 1605 ok = drbd_send_ack(mdev, P_NEG_ACK, peer_req);
b411b363
PR
1606 /* we expect it to be marked out of sync anyways...
1607 * maybe assert this? */
1608 }
1609 dec_unacked(mdev);
1610 }
1611 /* we delete from the conflict detection hash _after_ we sent out the
1612 * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right. */
89e58e75 1613 if (mdev->tconn->net_conf->two_primaries) {
87eeee41 1614 spin_lock_irq(&mdev->tconn->req_lock);
db830c46
AG
1615 D_ASSERT(!drbd_interval_empty(&peer_req->i));
1616 drbd_remove_epoch_entry_interval(mdev, peer_req);
87eeee41 1617 spin_unlock_irq(&mdev->tconn->req_lock);
bb3bfe96 1618 } else
db830c46 1619 D_ASSERT(drbd_interval_empty(&peer_req->i));
b411b363 1620
db830c46 1621 drbd_may_finish_epoch(mdev, peer_req->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
b411b363
PR
1622
1623 return ok;
1624}
1625
1626static int e_send_discard_ack(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1627{
db830c46 1628 struct drbd_peer_request *peer_req = (struct drbd_peer_request *)w;
b411b363
PR
1629 int ok = 1;
1630
89e58e75 1631 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
db830c46 1632 ok = drbd_send_ack(mdev, P_DISCARD_ACK, peer_req);
b411b363 1633
87eeee41 1634 spin_lock_irq(&mdev->tconn->req_lock);
db830c46
AG
1635 D_ASSERT(!drbd_interval_empty(&peer_req->i));
1636 drbd_remove_epoch_entry_interval(mdev, peer_req);
87eeee41 1637 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1638
1639 dec_unacked(mdev);
1640
1641 return ok;
1642}
1643
3e394da1
AG
1644static bool seq_greater(u32 a, u32 b)
1645{
1646 /*
1647 * We assume 32-bit wrap-around here.
1648 * For 24-bit wrap-around, we would have to shift:
1649 * a <<= 8; b <<= 8;
1650 */
1651 return (s32)a - (s32)b > 0;
1652}
1653
1654static u32 seq_max(u32 a, u32 b)
1655{
1656 return seq_greater(a, b) ? a : b;
1657}
1658
43ae077d 1659static void update_peer_seq(struct drbd_conf *mdev, unsigned int peer_seq)
3e394da1 1660{
43ae077d 1661 unsigned int old_peer_seq;
3e394da1
AG
1662
1663 spin_lock(&mdev->peer_seq_lock);
43ae077d
AG
1664 old_peer_seq = mdev->peer_seq;
1665 mdev->peer_seq = seq_max(mdev->peer_seq, peer_seq);
3e394da1 1666 spin_unlock(&mdev->peer_seq_lock);
43ae077d 1667 if (old_peer_seq != peer_seq)
3e394da1
AG
1668 wake_up(&mdev->seq_wait);
1669}
1670
b411b363
PR
1671/* Called from receive_Data.
1672 * Synchronize packets on sock with packets on msock.
1673 *
1674 * This is here so even when a P_DATA packet traveling via sock overtook an Ack
1675 * packet traveling on msock, they are still processed in the order they have
1676 * been sent.
1677 *
1678 * Note: we don't care for Ack packets overtaking P_DATA packets.
1679 *
1680 * In case packet_seq is larger than mdev->peer_seq number, there are
1681 * outstanding packets on the msock. We wait for them to arrive.
1682 * In case we are the logically next packet, we update mdev->peer_seq
1683 * ourselves. Correctly handles 32bit wrap around.
1684 *
1685 * Assume we have a 10 GBit connection, that is about 1<<30 byte per second,
1686 * about 1<<21 sectors per second. So "worst" case, we have 1<<3 == 8 seconds
1687 * for the 24bit wrap (historical atomic_t guarantee on some archs), and we have
1688 * 1<<9 == 512 seconds aka ages for the 32bit wrap around...
1689 *
1690 * returns 0 if we may process the packet,
1691 * -ERESTARTSYS if we were interrupted (by disconnect signal). */
1692static int drbd_wait_peer_seq(struct drbd_conf *mdev, const u32 packet_seq)
1693{
1694 DEFINE_WAIT(wait);
1695 unsigned int p_seq;
1696 long timeout;
1697 int ret = 0;
1698 spin_lock(&mdev->peer_seq_lock);
1699 for (;;) {
1700 prepare_to_wait(&mdev->seq_wait, &wait, TASK_INTERRUPTIBLE);
3e394da1 1701 if (!seq_greater(packet_seq, mdev->peer_seq + 1))
b411b363
PR
1702 break;
1703 if (signal_pending(current)) {
1704 ret = -ERESTARTSYS;
1705 break;
1706 }
1707 p_seq = mdev->peer_seq;
1708 spin_unlock(&mdev->peer_seq_lock);
1709 timeout = schedule_timeout(30*HZ);
1710 spin_lock(&mdev->peer_seq_lock);
1711 if (timeout == 0 && p_seq == mdev->peer_seq) {
1712 ret = -ETIMEDOUT;
1713 dev_err(DEV, "ASSERT FAILED waited 30 seconds for sequence update, forcing reconnect\n");
1714 break;
1715 }
1716 }
1717 finish_wait(&mdev->seq_wait, &wait);
1718 if (mdev->peer_seq+1 == packet_seq)
1719 mdev->peer_seq++;
1720 spin_unlock(&mdev->peer_seq_lock);
1721 return ret;
1722}
1723
688593c5
LE
1724/* see also bio_flags_to_wire()
1725 * DRBD_REQ_*, because we need to semantically map the flags to data packet
1726 * flags and back. We may replicate to other kernel versions. */
1727static unsigned long wire_flags_to_bio(struct drbd_conf *mdev, u32 dpf)
76d2e7ec 1728{
688593c5
LE
1729 return (dpf & DP_RW_SYNC ? REQ_SYNC : 0) |
1730 (dpf & DP_FUA ? REQ_FUA : 0) |
1731 (dpf & DP_FLUSH ? REQ_FLUSH : 0) |
1732 (dpf & DP_DISCARD ? REQ_DISCARD : 0);
76d2e7ec
PR
1733}
1734
b411b363 1735/* mirrored write */
d8763023
AG
1736static int receive_Data(struct drbd_conf *mdev, enum drbd_packet cmd,
1737 unsigned int data_size)
b411b363
PR
1738{
1739 sector_t sector;
db830c46 1740 struct drbd_peer_request *peer_req;
e42325a5 1741 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1742 int rw = WRITE;
1743 u32 dp_flags;
1744
b411b363 1745 if (!get_ldev(mdev)) {
b411b363
PR
1746 spin_lock(&mdev->peer_seq_lock);
1747 if (mdev->peer_seq+1 == be32_to_cpu(p->seq_num))
1748 mdev->peer_seq++;
1749 spin_unlock(&mdev->peer_seq_lock);
1750
2b2bf214 1751 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1752 atomic_inc(&mdev->current_epoch->epoch_size);
1753 return drbd_drain_block(mdev, data_size);
1754 }
1755
1756 /* get_ldev(mdev) successful.
1757 * Corresponding put_ldev done either below (on various errors),
9c50842a 1758 * or in drbd_endio_sec, if we successfully submit the data at
b411b363
PR
1759 * the end of this function. */
1760
1761 sector = be64_to_cpu(p->sector);
db830c46
AG
1762 peer_req = read_in_block(mdev, p->block_id, sector, data_size);
1763 if (!peer_req) {
b411b363 1764 put_ldev(mdev);
81e84650 1765 return false;
b411b363
PR
1766 }
1767
db830c46 1768 peer_req->w.cb = e_end_block;
b411b363 1769
688593c5
LE
1770 dp_flags = be32_to_cpu(p->dp_flags);
1771 rw |= wire_flags_to_bio(mdev, dp_flags);
1772
1773 if (dp_flags & DP_MAY_SET_IN_SYNC)
db830c46 1774 peer_req->flags |= EE_MAY_SET_IN_SYNC;
688593c5 1775
b411b363 1776 spin_lock(&mdev->epoch_lock);
db830c46
AG
1777 peer_req->epoch = mdev->current_epoch;
1778 atomic_inc(&peer_req->epoch->epoch_size);
1779 atomic_inc(&peer_req->epoch->active);
b411b363
PR
1780 spin_unlock(&mdev->epoch_lock);
1781
b411b363 1782 /* I'm the receiver, I do hold a net_cnt reference. */
89e58e75 1783 if (!mdev->tconn->net_conf->two_primaries) {
87eeee41 1784 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
1785 } else {
1786 /* don't get the req_lock yet,
1787 * we may sleep in drbd_wait_peer_seq */
db830c46 1788 const int size = peer_req->i.size;
25703f83 1789 const int discard = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363 1790 DEFINE_WAIT(wait);
b411b363
PR
1791 int first;
1792
89e58e75 1793 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
b411b363
PR
1794
1795 /* conflict detection and handling:
1796 * 1. wait on the sequence number,
1797 * in case this data packet overtook ACK packets.
5e472264 1798 * 2. check for conflicting write requests.
b411b363
PR
1799 *
1800 * Note: for two_primaries, we are protocol C,
1801 * so there cannot be any request that is DONE
1802 * but still on the transfer log.
1803 *
b411b363
PR
1804 * if no conflicting request is found:
1805 * submit.
1806 *
1807 * if any conflicting request is found
1808 * that has not yet been acked,
1809 * AND I have the "discard concurrent writes" flag:
1810 * queue (via done_ee) the P_DISCARD_ACK; OUT.
1811 *
1812 * if any conflicting request is found:
1813 * block the receiver, waiting on misc_wait
1814 * until no more conflicting requests are there,
1815 * or we get interrupted (disconnect).
1816 *
1817 * we do not just write after local io completion of those
1818 * requests, but only after req is done completely, i.e.
1819 * we wait for the P_DISCARD_ACK to arrive!
1820 *
1821 * then proceed normally, i.e. submit.
1822 */
1823 if (drbd_wait_peer_seq(mdev, be32_to_cpu(p->seq_num)))
1824 goto out_interrupted;
1825
87eeee41 1826 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 1827
b411b363
PR
1828 first = 1;
1829 for (;;) {
de696716 1830 struct drbd_interval *i;
b411b363
PR
1831 int have_unacked = 0;
1832 int have_conflict = 0;
1833 prepare_to_wait(&mdev->misc_wait, &wait,
1834 TASK_INTERRUPTIBLE);
de696716
AG
1835
1836 i = drbd_find_overlap(&mdev->write_requests, sector, size);
1837 if (i) {
de696716
AG
1838 /* only ALERT on first iteration,
1839 * we may be woken up early... */
1840 if (first)
5e472264 1841 dev_alert(DEV, "%s[%u] Concurrent %s write detected!"
de696716
AG
1842 " new: %llus +%u; pending: %llus +%u\n",
1843 current->comm, current->pid,
5e472264 1844 i->local ? "local" : "remote",
de696716 1845 (unsigned long long)sector, size,
5e472264
AG
1846 (unsigned long long)i->sector, i->size);
1847
1848 if (i->local) {
1849 struct drbd_request *req2;
1850
1851 req2 = container_of(i, struct drbd_request, i);
1852 if (req2->rq_state & RQ_NET_PENDING)
1853 ++have_unacked;
1854 }
de696716 1855 ++have_conflict;
b411b363 1856 }
b411b363
PR
1857 if (!have_conflict)
1858 break;
1859
1860 /* Discard Ack only for the _first_ iteration */
1861 if (first && discard && have_unacked) {
1862 dev_alert(DEV, "Concurrent write! [DISCARD BY FLAG] sec=%llus\n",
1863 (unsigned long long)sector);
1864 inc_unacked(mdev);
db830c46
AG
1865 peer_req->w.cb = e_send_discard_ack;
1866 list_add_tail(&peer_req->w.list, &mdev->done_ee);
b411b363 1867
87eeee41 1868 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1869
1870 /* we could probably send that P_DISCARD_ACK ourselves,
1871 * but I don't like the receiver using the msock */
1872
1873 put_ldev(mdev);
0625ac19 1874 wake_asender(mdev->tconn);
b411b363 1875 finish_wait(&mdev->misc_wait, &wait);
81e84650 1876 return true;
b411b363
PR
1877 }
1878
1879 if (signal_pending(current)) {
87eeee41 1880 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1881 finish_wait(&mdev->misc_wait, &wait);
1882 goto out_interrupted;
1883 }
1884
a500c2ef 1885 /* Indicate to wake up mdev->misc_wait upon completion. */
53840641 1886 i->waiting = true;
a500c2ef 1887
87eeee41 1888 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1889 if (first) {
1890 first = 0;
1891 dev_alert(DEV, "Concurrent write! [W AFTERWARDS] "
1892 "sec=%llus\n", (unsigned long long)sector);
1893 } else if (discard) {
1894 /* we had none on the first iteration.
1895 * there must be none now. */
1896 D_ASSERT(have_unacked == 0);
1897 }
1898 schedule();
87eeee41 1899 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
1900 }
1901 finish_wait(&mdev->misc_wait, &wait);
5e472264 1902
db830c46 1903 drbd_insert_interval(&mdev->write_requests, &peer_req->i);
b411b363
PR
1904 }
1905
db830c46 1906 list_add(&peer_req->w.list, &mdev->active_ee);
87eeee41 1907 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 1908
89e58e75 1909 switch (mdev->tconn->net_conf->wire_protocol) {
b411b363
PR
1910 case DRBD_PROT_C:
1911 inc_unacked(mdev);
1912 /* corresponding dec_unacked() in e_end_block()
1913 * respective _drbd_clear_done_ee */
1914 break;
1915 case DRBD_PROT_B:
1916 /* I really don't like it that the receiver thread
1917 * sends on the msock, but anyways */
db830c46 1918 drbd_send_ack(mdev, P_RECV_ACK, peer_req);
b411b363
PR
1919 break;
1920 case DRBD_PROT_A:
1921 /* nothing to do */
1922 break;
1923 }
1924
6719fb03 1925 if (mdev->state.pdsk < D_INCONSISTENT) {
b411b363 1926 /* In case we have the only disk of the cluster, */
db830c46
AG
1927 drbd_set_out_of_sync(mdev, peer_req->i.sector, peer_req->i.size);
1928 peer_req->flags |= EE_CALL_AL_COMPLETE_IO;
1929 peer_req->flags &= ~EE_MAY_SET_IN_SYNC;
1930 drbd_al_begin_io(mdev, peer_req->i.sector);
b411b363
PR
1931 }
1932
db830c46 1933 if (drbd_submit_ee(mdev, peer_req, rw, DRBD_FAULT_DT_WR) == 0)
81e84650 1934 return true;
b411b363 1935
10f6d992
LE
1936 /* don't care for the reason here */
1937 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 1938 spin_lock_irq(&mdev->tconn->req_lock);
db830c46
AG
1939 list_del(&peer_req->w.list);
1940 drbd_remove_epoch_entry_interval(mdev, peer_req);
87eeee41 1941 spin_unlock_irq(&mdev->tconn->req_lock);
db830c46
AG
1942 if (peer_req->flags & EE_CALL_AL_COMPLETE_IO)
1943 drbd_al_complete_io(mdev, peer_req->i.sector);
22cc37a9 1944
b411b363 1945out_interrupted:
db830c46 1946 drbd_may_finish_epoch(mdev, peer_req->epoch, EV_PUT + EV_CLEANUP);
b411b363 1947 put_ldev(mdev);
db830c46 1948 drbd_free_ee(mdev, peer_req);
81e84650 1949 return false;
b411b363
PR
1950}
1951
0f0601f4
LE
1952/* We may throttle resync, if the lower device seems to be busy,
1953 * and current sync rate is above c_min_rate.
1954 *
1955 * To decide whether or not the lower device is busy, we use a scheme similar
1956 * to MD RAID is_mddev_idle(): if the partition stats reveal "significant"
1957 * (more than 64 sectors) of activity we cannot account for with our own resync
1958 * activity, it obviously is "busy".
1959 *
1960 * The current sync rate used here uses only the most recent two step marks,
1961 * to have a short time average so we can react faster.
1962 */
e3555d85 1963int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
0f0601f4
LE
1964{
1965 struct gendisk *disk = mdev->ldev->backing_bdev->bd_contains->bd_disk;
1966 unsigned long db, dt, dbdt;
e3555d85 1967 struct lc_element *tmp;
0f0601f4
LE
1968 int curr_events;
1969 int throttle = 0;
1970
1971 /* feature disabled? */
1972 if (mdev->sync_conf.c_min_rate == 0)
1973 return 0;
1974
e3555d85
PR
1975 spin_lock_irq(&mdev->al_lock);
1976 tmp = lc_find(mdev->resync, BM_SECT_TO_EXT(sector));
1977 if (tmp) {
1978 struct bm_extent *bm_ext = lc_entry(tmp, struct bm_extent, lce);
1979 if (test_bit(BME_PRIORITY, &bm_ext->flags)) {
1980 spin_unlock_irq(&mdev->al_lock);
1981 return 0;
1982 }
1983 /* Do not slow down if app IO is already waiting for this extent */
1984 }
1985 spin_unlock_irq(&mdev->al_lock);
1986
0f0601f4
LE
1987 curr_events = (int)part_stat_read(&disk->part0, sectors[0]) +
1988 (int)part_stat_read(&disk->part0, sectors[1]) -
1989 atomic_read(&mdev->rs_sect_ev);
e3555d85 1990
0f0601f4
LE
1991 if (!mdev->rs_last_events || curr_events - mdev->rs_last_events > 64) {
1992 unsigned long rs_left;
1993 int i;
1994
1995 mdev->rs_last_events = curr_events;
1996
1997 /* sync speed average over the last 2*DRBD_SYNC_MARK_STEP,
1998 * approx. */
2649f080
LE
1999 i = (mdev->rs_last_mark + DRBD_SYNC_MARKS-1) % DRBD_SYNC_MARKS;
2000
2001 if (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T)
2002 rs_left = mdev->ov_left;
2003 else
2004 rs_left = drbd_bm_total_weight(mdev) - mdev->rs_failed;
0f0601f4
LE
2005
2006 dt = ((long)jiffies - (long)mdev->rs_mark_time[i]) / HZ;
2007 if (!dt)
2008 dt++;
2009 db = mdev->rs_mark_left[i] - rs_left;
2010 dbdt = Bit2KB(db/dt);
2011
2012 if (dbdt > mdev->sync_conf.c_min_rate)
2013 throttle = 1;
2014 }
2015 return throttle;
2016}
2017
2018
d8763023
AG
2019static int receive_DataRequest(struct drbd_conf *mdev, enum drbd_packet cmd,
2020 unsigned int digest_size)
b411b363
PR
2021{
2022 sector_t sector;
2023 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
db830c46 2024 struct drbd_peer_request *peer_req;
b411b363 2025 struct digest_info *di = NULL;
b18b37be 2026 int size, verb;
b411b363 2027 unsigned int fault_type;
e42325a5 2028 struct p_block_req *p = &mdev->tconn->data.rbuf.block_req;
b411b363
PR
2029
2030 sector = be64_to_cpu(p->sector);
2031 size = be32_to_cpu(p->blksize);
2032
1816a2b4 2033 if (size <= 0 || (size & 0x1ff) != 0 || size > DRBD_MAX_BIO_SIZE) {
b411b363
PR
2034 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2035 (unsigned long long)sector, size);
81e84650 2036 return false;
b411b363
PR
2037 }
2038 if (sector + (size>>9) > capacity) {
2039 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2040 (unsigned long long)sector, size);
81e84650 2041 return false;
b411b363
PR
2042 }
2043
2044 if (!get_ldev_if_state(mdev, D_UP_TO_DATE)) {
b18b37be
PR
2045 verb = 1;
2046 switch (cmd) {
2047 case P_DATA_REQUEST:
2048 drbd_send_ack_rp(mdev, P_NEG_DREPLY, p);
2049 break;
2050 case P_RS_DATA_REQUEST:
2051 case P_CSUM_RS_REQUEST:
2052 case P_OV_REQUEST:
2053 drbd_send_ack_rp(mdev, P_NEG_RS_DREPLY , p);
2054 break;
2055 case P_OV_REPLY:
2056 verb = 0;
2057 dec_rs_pending(mdev);
2058 drbd_send_ack_ex(mdev, P_OV_RESULT, sector, size, ID_IN_SYNC);
2059 break;
2060 default:
2061 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
2062 cmdname(cmd));
2063 }
2064 if (verb && __ratelimit(&drbd_ratelimit_state))
b411b363
PR
2065 dev_err(DEV, "Can not satisfy peer's read request, "
2066 "no local data.\n");
b18b37be 2067
a821cc4a
LE
2068 /* drain possibly payload */
2069 return drbd_drain_block(mdev, digest_size);
b411b363
PR
2070 }
2071
2072 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
2073 * "criss-cross" setup, that might cause write-out on some other DRBD,
2074 * which in turn might block on the other node at this very place. */
db830c46
AG
2075 peer_req = drbd_alloc_ee(mdev, p->block_id, sector, size, GFP_NOIO);
2076 if (!peer_req) {
b411b363 2077 put_ldev(mdev);
81e84650 2078 return false;
b411b363
PR
2079 }
2080
02918be2 2081 switch (cmd) {
b411b363 2082 case P_DATA_REQUEST:
db830c46 2083 peer_req->w.cb = w_e_end_data_req;
b411b363 2084 fault_type = DRBD_FAULT_DT_RD;
80a40e43
LE
2085 /* application IO, don't drbd_rs_begin_io */
2086 goto submit;
2087
b411b363 2088 case P_RS_DATA_REQUEST:
db830c46 2089 peer_req->w.cb = w_e_end_rsdata_req;
b411b363 2090 fault_type = DRBD_FAULT_RS_RD;
5f9915bb
LE
2091 /* used in the sector offset progress display */
2092 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
b411b363
PR
2093 break;
2094
2095 case P_OV_REPLY:
2096 case P_CSUM_RS_REQUEST:
2097 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2098 di = kmalloc(sizeof(*di) + digest_size, GFP_NOIO);
2099 if (!di)
2100 goto out_free_e;
2101
2102 di->digest_size = digest_size;
2103 di->digest = (((char *)di)+sizeof(struct digest_info));
2104
db830c46
AG
2105 peer_req->digest = di;
2106 peer_req->flags |= EE_HAS_DIGEST;
c36c3ced 2107
de0ff338 2108 if (drbd_recv(mdev->tconn, di->digest, digest_size) != digest_size)
b411b363
PR
2109 goto out_free_e;
2110
02918be2 2111 if (cmd == P_CSUM_RS_REQUEST) {
31890f4a 2112 D_ASSERT(mdev->tconn->agreed_pro_version >= 89);
db830c46 2113 peer_req->w.cb = w_e_end_csum_rs_req;
5f9915bb
LE
2114 /* used in the sector offset progress display */
2115 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
02918be2 2116 } else if (cmd == P_OV_REPLY) {
2649f080
LE
2117 /* track progress, we may need to throttle */
2118 atomic_add(size >> 9, &mdev->rs_sect_in);
db830c46 2119 peer_req->w.cb = w_e_end_ov_reply;
b411b363 2120 dec_rs_pending(mdev);
0f0601f4
LE
2121 /* drbd_rs_begin_io done when we sent this request,
2122 * but accounting still needs to be done. */
2123 goto submit_for_resync;
b411b363
PR
2124 }
2125 break;
2126
2127 case P_OV_REQUEST:
b411b363 2128 if (mdev->ov_start_sector == ~(sector_t)0 &&
31890f4a 2129 mdev->tconn->agreed_pro_version >= 90) {
de228bba
LE
2130 unsigned long now = jiffies;
2131 int i;
b411b363
PR
2132 mdev->ov_start_sector = sector;
2133 mdev->ov_position = sector;
30b743a2
LE
2134 mdev->ov_left = drbd_bm_bits(mdev) - BM_SECT_TO_BIT(sector);
2135 mdev->rs_total = mdev->ov_left;
de228bba
LE
2136 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
2137 mdev->rs_mark_left[i] = mdev->ov_left;
2138 mdev->rs_mark_time[i] = now;
2139 }
b411b363
PR
2140 dev_info(DEV, "Online Verify start sector: %llu\n",
2141 (unsigned long long)sector);
2142 }
db830c46 2143 peer_req->w.cb = w_e_end_ov_req;
b411b363 2144 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2145 break;
2146
b411b363
PR
2147 default:
2148 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
02918be2 2149 cmdname(cmd));
b411b363 2150 fault_type = DRBD_FAULT_MAX;
80a40e43 2151 goto out_free_e;
b411b363
PR
2152 }
2153
0f0601f4
LE
2154 /* Throttle, drbd_rs_begin_io and submit should become asynchronous
2155 * wrt the receiver, but it is not as straightforward as it may seem.
2156 * Various places in the resync start and stop logic assume resync
2157 * requests are processed in order, requeuing this on the worker thread
2158 * introduces a bunch of new code for synchronization between threads.
2159 *
2160 * Unlimited throttling before drbd_rs_begin_io may stall the resync
2161 * "forever", throttling after drbd_rs_begin_io will lock that extent
2162 * for application writes for the same time. For now, just throttle
2163 * here, where the rest of the code expects the receiver to sleep for
2164 * a while, anyways.
2165 */
2166
2167 /* Throttle before drbd_rs_begin_io, as that locks out application IO;
2168 * this defers syncer requests for some time, before letting at least
2169 * on request through. The resync controller on the receiving side
2170 * will adapt to the incoming rate accordingly.
2171 *
2172 * We cannot throttle here if remote is Primary/SyncTarget:
2173 * we would also throttle its application reads.
2174 * In that case, throttling is done on the SyncTarget only.
2175 */
e3555d85
PR
2176 if (mdev->state.peer != R_PRIMARY && drbd_rs_should_slow_down(mdev, sector))
2177 schedule_timeout_uninterruptible(HZ/10);
2178 if (drbd_rs_begin_io(mdev, sector))
80a40e43 2179 goto out_free_e;
b411b363 2180
0f0601f4
LE
2181submit_for_resync:
2182 atomic_add(size >> 9, &mdev->rs_sect_ev);
2183
80a40e43 2184submit:
b411b363 2185 inc_unacked(mdev);
87eeee41 2186 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 2187 list_add_tail(&peer_req->w.list, &mdev->read_ee);
87eeee41 2188 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 2189
db830c46 2190 if (drbd_submit_ee(mdev, peer_req, READ, fault_type) == 0)
81e84650 2191 return true;
b411b363 2192
10f6d992
LE
2193 /* don't care for the reason here */
2194 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 2195 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 2196 list_del(&peer_req->w.list);
87eeee41 2197 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9
LE
2198 /* no drbd_rs_complete_io(), we are dropping the connection anyways */
2199
b411b363 2200out_free_e:
b411b363 2201 put_ldev(mdev);
db830c46 2202 drbd_free_ee(mdev, peer_req);
81e84650 2203 return false;
b411b363
PR
2204}
2205
2206static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
2207{
2208 int self, peer, rv = -100;
2209 unsigned long ch_self, ch_peer;
2210
2211 self = mdev->ldev->md.uuid[UI_BITMAP] & 1;
2212 peer = mdev->p_uuid[UI_BITMAP] & 1;
2213
2214 ch_peer = mdev->p_uuid[UI_SIZE];
2215 ch_self = mdev->comm_bm_set;
2216
89e58e75 2217 switch (mdev->tconn->net_conf->after_sb_0p) {
b411b363
PR
2218 case ASB_CONSENSUS:
2219 case ASB_DISCARD_SECONDARY:
2220 case ASB_CALL_HELPER:
2221 dev_err(DEV, "Configuration error.\n");
2222 break;
2223 case ASB_DISCONNECT:
2224 break;
2225 case ASB_DISCARD_YOUNGER_PRI:
2226 if (self == 0 && peer == 1) {
2227 rv = -1;
2228 break;
2229 }
2230 if (self == 1 && peer == 0) {
2231 rv = 1;
2232 break;
2233 }
2234 /* Else fall through to one of the other strategies... */
2235 case ASB_DISCARD_OLDER_PRI:
2236 if (self == 0 && peer == 1) {
2237 rv = 1;
2238 break;
2239 }
2240 if (self == 1 && peer == 0) {
2241 rv = -1;
2242 break;
2243 }
2244 /* Else fall through to one of the other strategies... */
ad19bf6e 2245 dev_warn(DEV, "Discard younger/older primary did not find a decision\n"
b411b363
PR
2246 "Using discard-least-changes instead\n");
2247 case ASB_DISCARD_ZERO_CHG:
2248 if (ch_peer == 0 && ch_self == 0) {
25703f83 2249 rv = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags)
b411b363
PR
2250 ? -1 : 1;
2251 break;
2252 } else {
2253 if (ch_peer == 0) { rv = 1; break; }
2254 if (ch_self == 0) { rv = -1; break; }
2255 }
89e58e75 2256 if (mdev->tconn->net_conf->after_sb_0p == ASB_DISCARD_ZERO_CHG)
b411b363
PR
2257 break;
2258 case ASB_DISCARD_LEAST_CHG:
2259 if (ch_self < ch_peer)
2260 rv = -1;
2261 else if (ch_self > ch_peer)
2262 rv = 1;
2263 else /* ( ch_self == ch_peer ) */
2264 /* Well, then use something else. */
25703f83 2265 rv = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags)
b411b363
PR
2266 ? -1 : 1;
2267 break;
2268 case ASB_DISCARD_LOCAL:
2269 rv = -1;
2270 break;
2271 case ASB_DISCARD_REMOTE:
2272 rv = 1;
2273 }
2274
2275 return rv;
2276}
2277
2278static int drbd_asb_recover_1p(struct drbd_conf *mdev) __must_hold(local)
2279{
6184ea21 2280 int hg, rv = -100;
b411b363 2281
89e58e75 2282 switch (mdev->tconn->net_conf->after_sb_1p) {
b411b363
PR
2283 case ASB_DISCARD_YOUNGER_PRI:
2284 case ASB_DISCARD_OLDER_PRI:
2285 case ASB_DISCARD_LEAST_CHG:
2286 case ASB_DISCARD_LOCAL:
2287 case ASB_DISCARD_REMOTE:
2288 dev_err(DEV, "Configuration error.\n");
2289 break;
2290 case ASB_DISCONNECT:
2291 break;
2292 case ASB_CONSENSUS:
2293 hg = drbd_asb_recover_0p(mdev);
2294 if (hg == -1 && mdev->state.role == R_SECONDARY)
2295 rv = hg;
2296 if (hg == 1 && mdev->state.role == R_PRIMARY)
2297 rv = hg;
2298 break;
2299 case ASB_VIOLENTLY:
2300 rv = drbd_asb_recover_0p(mdev);
2301 break;
2302 case ASB_DISCARD_SECONDARY:
2303 return mdev->state.role == R_PRIMARY ? 1 : -1;
2304 case ASB_CALL_HELPER:
2305 hg = drbd_asb_recover_0p(mdev);
2306 if (hg == -1 && mdev->state.role == R_PRIMARY) {
bb437946
AG
2307 enum drbd_state_rv rv2;
2308
2309 drbd_set_role(mdev, R_SECONDARY, 0);
b411b363
PR
2310 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2311 * we might be here in C_WF_REPORT_PARAMS which is transient.
2312 * we do not need to wait for the after state change work either. */
bb437946
AG
2313 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2314 if (rv2 != SS_SUCCESS) {
b411b363
PR
2315 drbd_khelper(mdev, "pri-lost-after-sb");
2316 } else {
2317 dev_warn(DEV, "Successfully gave up primary role.\n");
2318 rv = hg;
2319 }
2320 } else
2321 rv = hg;
2322 }
2323
2324 return rv;
2325}
2326
2327static int drbd_asb_recover_2p(struct drbd_conf *mdev) __must_hold(local)
2328{
6184ea21 2329 int hg, rv = -100;
b411b363 2330
89e58e75 2331 switch (mdev->tconn->net_conf->after_sb_2p) {
b411b363
PR
2332 case ASB_DISCARD_YOUNGER_PRI:
2333 case ASB_DISCARD_OLDER_PRI:
2334 case ASB_DISCARD_LEAST_CHG:
2335 case ASB_DISCARD_LOCAL:
2336 case ASB_DISCARD_REMOTE:
2337 case ASB_CONSENSUS:
2338 case ASB_DISCARD_SECONDARY:
2339 dev_err(DEV, "Configuration error.\n");
2340 break;
2341 case ASB_VIOLENTLY:
2342 rv = drbd_asb_recover_0p(mdev);
2343 break;
2344 case ASB_DISCONNECT:
2345 break;
2346 case ASB_CALL_HELPER:
2347 hg = drbd_asb_recover_0p(mdev);
2348 if (hg == -1) {
bb437946
AG
2349 enum drbd_state_rv rv2;
2350
b411b363
PR
2351 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2352 * we might be here in C_WF_REPORT_PARAMS which is transient.
2353 * we do not need to wait for the after state change work either. */
bb437946
AG
2354 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2355 if (rv2 != SS_SUCCESS) {
b411b363
PR
2356 drbd_khelper(mdev, "pri-lost-after-sb");
2357 } else {
2358 dev_warn(DEV, "Successfully gave up primary role.\n");
2359 rv = hg;
2360 }
2361 } else
2362 rv = hg;
2363 }
2364
2365 return rv;
2366}
2367
2368static void drbd_uuid_dump(struct drbd_conf *mdev, char *text, u64 *uuid,
2369 u64 bits, u64 flags)
2370{
2371 if (!uuid) {
2372 dev_info(DEV, "%s uuid info vanished while I was looking!\n", text);
2373 return;
2374 }
2375 dev_info(DEV, "%s %016llX:%016llX:%016llX:%016llX bits:%llu flags:%llX\n",
2376 text,
2377 (unsigned long long)uuid[UI_CURRENT],
2378 (unsigned long long)uuid[UI_BITMAP],
2379 (unsigned long long)uuid[UI_HISTORY_START],
2380 (unsigned long long)uuid[UI_HISTORY_END],
2381 (unsigned long long)bits,
2382 (unsigned long long)flags);
2383}
2384
2385/*
2386 100 after split brain try auto recover
2387 2 C_SYNC_SOURCE set BitMap
2388 1 C_SYNC_SOURCE use BitMap
2389 0 no Sync
2390 -1 C_SYNC_TARGET use BitMap
2391 -2 C_SYNC_TARGET set BitMap
2392 -100 after split brain, disconnect
2393-1000 unrelated data
4a23f264
PR
2394-1091 requires proto 91
2395-1096 requires proto 96
b411b363
PR
2396 */
2397static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(local)
2398{
2399 u64 self, peer;
2400 int i, j;
2401
2402 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2403 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2404
2405 *rule_nr = 10;
2406 if (self == UUID_JUST_CREATED && peer == UUID_JUST_CREATED)
2407 return 0;
2408
2409 *rule_nr = 20;
2410 if ((self == UUID_JUST_CREATED || self == (u64)0) &&
2411 peer != UUID_JUST_CREATED)
2412 return -2;
2413
2414 *rule_nr = 30;
2415 if (self != UUID_JUST_CREATED &&
2416 (peer == UUID_JUST_CREATED || peer == (u64)0))
2417 return 2;
2418
2419 if (self == peer) {
2420 int rct, dc; /* roles at crash time */
2421
2422 if (mdev->p_uuid[UI_BITMAP] == (u64)0 && mdev->ldev->md.uuid[UI_BITMAP] != (u64)0) {
2423
31890f4a 2424 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2425 return -1091;
b411b363
PR
2426
2427 if ((mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
2428 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
2429 dev_info(DEV, "was SyncSource, missed the resync finished event, corrected myself:\n");
2430 drbd_uuid_set_bm(mdev, 0UL);
2431
2432 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2433 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2434 *rule_nr = 34;
2435 } else {
2436 dev_info(DEV, "was SyncSource (peer failed to write sync_uuid)\n");
2437 *rule_nr = 36;
2438 }
2439
2440 return 1;
2441 }
2442
2443 if (mdev->ldev->md.uuid[UI_BITMAP] == (u64)0 && mdev->p_uuid[UI_BITMAP] != (u64)0) {
2444
31890f4a 2445 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2446 return -1091;
b411b363
PR
2447
2448 if ((mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_BITMAP] & ~((u64)1)) &&
2449 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1))) {
2450 dev_info(DEV, "was SyncTarget, peer missed the resync finished event, corrected peer:\n");
2451
2452 mdev->p_uuid[UI_HISTORY_START + 1] = mdev->p_uuid[UI_HISTORY_START];
2453 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_BITMAP];
2454 mdev->p_uuid[UI_BITMAP] = 0UL;
2455
2456 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2457 *rule_nr = 35;
2458 } else {
2459 dev_info(DEV, "was SyncTarget (failed to write sync_uuid)\n");
2460 *rule_nr = 37;
2461 }
2462
2463 return -1;
2464 }
2465
2466 /* Common power [off|failure] */
2467 rct = (test_bit(CRASHED_PRIMARY, &mdev->flags) ? 1 : 0) +
2468 (mdev->p_uuid[UI_FLAGS] & 2);
2469 /* lowest bit is set when we were primary,
2470 * next bit (weight 2) is set when peer was primary */
2471 *rule_nr = 40;
2472
2473 switch (rct) {
2474 case 0: /* !self_pri && !peer_pri */ return 0;
2475 case 1: /* self_pri && !peer_pri */ return 1;
2476 case 2: /* !self_pri && peer_pri */ return -1;
2477 case 3: /* self_pri && peer_pri */
25703f83 2478 dc = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363
PR
2479 return dc ? -1 : 1;
2480 }
2481 }
2482
2483 *rule_nr = 50;
2484 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2485 if (self == peer)
2486 return -1;
2487
2488 *rule_nr = 51;
2489 peer = mdev->p_uuid[UI_HISTORY_START] & ~((u64)1);
2490 if (self == peer) {
31890f4a 2491 if (mdev->tconn->agreed_pro_version < 96 ?
4a23f264
PR
2492 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) ==
2493 (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1)) :
2494 peer + UUID_NEW_BM_OFFSET == (mdev->p_uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2495 /* The last P_SYNC_UUID did not get though. Undo the last start of
2496 resync as sync source modifications of the peer's UUIDs. */
2497
31890f4a 2498 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2499 return -1091;
b411b363
PR
2500
2501 mdev->p_uuid[UI_BITMAP] = mdev->p_uuid[UI_HISTORY_START];
2502 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_HISTORY_START + 1];
4a23f264
PR
2503
2504 dev_info(DEV, "Did not got last syncUUID packet, corrected:\n");
2505 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2506
b411b363
PR
2507 return -1;
2508 }
2509 }
2510
2511 *rule_nr = 60;
2512 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2513 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2514 peer = mdev->p_uuid[i] & ~((u64)1);
2515 if (self == peer)
2516 return -2;
2517 }
2518
2519 *rule_nr = 70;
2520 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2521 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2522 if (self == peer)
2523 return 1;
2524
2525 *rule_nr = 71;
2526 self = mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1);
2527 if (self == peer) {
31890f4a 2528 if (mdev->tconn->agreed_pro_version < 96 ?
4a23f264
PR
2529 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) ==
2530 (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) :
2531 self + UUID_NEW_BM_OFFSET == (mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2532 /* The last P_SYNC_UUID did not get though. Undo the last start of
2533 resync as sync source modifications of our UUIDs. */
2534
31890f4a 2535 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2536 return -1091;
b411b363
PR
2537
2538 _drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
2539 _drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
2540
4a23f264 2541 dev_info(DEV, "Last syncUUID did not get through, corrected:\n");
b411b363
PR
2542 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2543 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2544
2545 return 1;
2546 }
2547 }
2548
2549
2550 *rule_nr = 80;
d8c2a36b 2551 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
b411b363
PR
2552 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2553 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2554 if (self == peer)
2555 return 2;
2556 }
2557
2558 *rule_nr = 90;
2559 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2560 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2561 if (self == peer && self != ((u64)0))
2562 return 100;
2563
2564 *rule_nr = 100;
2565 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2566 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2567 for (j = UI_HISTORY_START; j <= UI_HISTORY_END; j++) {
2568 peer = mdev->p_uuid[j] & ~((u64)1);
2569 if (self == peer)
2570 return -100;
2571 }
2572 }
2573
2574 return -1000;
2575}
2576
2577/* drbd_sync_handshake() returns the new conn state on success, or
2578 CONN_MASK (-1) on failure.
2579 */
2580static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_role peer_role,
2581 enum drbd_disk_state peer_disk) __must_hold(local)
2582{
2583 int hg, rule_nr;
2584 enum drbd_conns rv = C_MASK;
2585 enum drbd_disk_state mydisk;
2586
2587 mydisk = mdev->state.disk;
2588 if (mydisk == D_NEGOTIATING)
2589 mydisk = mdev->new_state_tmp.disk;
2590
2591 dev_info(DEV, "drbd_sync_handshake:\n");
2592 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid, mdev->comm_bm_set, 0);
2593 drbd_uuid_dump(mdev, "peer", mdev->p_uuid,
2594 mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2595
2596 hg = drbd_uuid_compare(mdev, &rule_nr);
2597
2598 dev_info(DEV, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
2599
2600 if (hg == -1000) {
2601 dev_alert(DEV, "Unrelated data, aborting!\n");
2602 return C_MASK;
2603 }
4a23f264
PR
2604 if (hg < -1000) {
2605 dev_alert(DEV, "To resolve this both sides have to support at least protocol %d\n", -hg - 1000);
b411b363
PR
2606 return C_MASK;
2607 }
2608
2609 if ((mydisk == D_INCONSISTENT && peer_disk > D_INCONSISTENT) ||
2610 (peer_disk == D_INCONSISTENT && mydisk > D_INCONSISTENT)) {
2611 int f = (hg == -100) || abs(hg) == 2;
2612 hg = mydisk > D_INCONSISTENT ? 1 : -1;
2613 if (f)
2614 hg = hg*2;
2615 dev_info(DEV, "Becoming sync %s due to disk states.\n",
2616 hg > 0 ? "source" : "target");
2617 }
2618
3a11a487
AG
2619 if (abs(hg) == 100)
2620 drbd_khelper(mdev, "initial-split-brain");
2621
89e58e75 2622 if (hg == 100 || (hg == -100 && mdev->tconn->net_conf->always_asbp)) {
b411b363
PR
2623 int pcount = (mdev->state.role == R_PRIMARY)
2624 + (peer_role == R_PRIMARY);
2625 int forced = (hg == -100);
2626
2627 switch (pcount) {
2628 case 0:
2629 hg = drbd_asb_recover_0p(mdev);
2630 break;
2631 case 1:
2632 hg = drbd_asb_recover_1p(mdev);
2633 break;
2634 case 2:
2635 hg = drbd_asb_recover_2p(mdev);
2636 break;
2637 }
2638 if (abs(hg) < 100) {
2639 dev_warn(DEV, "Split-Brain detected, %d primaries, "
2640 "automatically solved. Sync from %s node\n",
2641 pcount, (hg < 0) ? "peer" : "this");
2642 if (forced) {
2643 dev_warn(DEV, "Doing a full sync, since"
2644 " UUIDs where ambiguous.\n");
2645 hg = hg*2;
2646 }
2647 }
2648 }
2649
2650 if (hg == -100) {
89e58e75 2651 if (mdev->tconn->net_conf->want_lose && !(mdev->p_uuid[UI_FLAGS]&1))
b411b363 2652 hg = -1;
89e58e75 2653 if (!mdev->tconn->net_conf->want_lose && (mdev->p_uuid[UI_FLAGS]&1))
b411b363
PR
2654 hg = 1;
2655
2656 if (abs(hg) < 100)
2657 dev_warn(DEV, "Split-Brain detected, manually solved. "
2658 "Sync from %s node\n",
2659 (hg < 0) ? "peer" : "this");
2660 }
2661
2662 if (hg == -100) {
580b9767
LE
2663 /* FIXME this log message is not correct if we end up here
2664 * after an attempted attach on a diskless node.
2665 * We just refuse to attach -- well, we drop the "connection"
2666 * to that disk, in a way... */
3a11a487 2667 dev_alert(DEV, "Split-Brain detected but unresolved, dropping connection!\n");
b411b363
PR
2668 drbd_khelper(mdev, "split-brain");
2669 return C_MASK;
2670 }
2671
2672 if (hg > 0 && mydisk <= D_INCONSISTENT) {
2673 dev_err(DEV, "I shall become SyncSource, but I am inconsistent!\n");
2674 return C_MASK;
2675 }
2676
2677 if (hg < 0 && /* by intention we do not use mydisk here. */
2678 mdev->state.role == R_PRIMARY && mdev->state.disk >= D_CONSISTENT) {
89e58e75 2679 switch (mdev->tconn->net_conf->rr_conflict) {
b411b363
PR
2680 case ASB_CALL_HELPER:
2681 drbd_khelper(mdev, "pri-lost");
2682 /* fall through */
2683 case ASB_DISCONNECT:
2684 dev_err(DEV, "I shall become SyncTarget, but I am primary!\n");
2685 return C_MASK;
2686 case ASB_VIOLENTLY:
2687 dev_warn(DEV, "Becoming SyncTarget, violating the stable-data"
2688 "assumption\n");
2689 }
2690 }
2691
89e58e75 2692 if (mdev->tconn->net_conf->dry_run || test_bit(CONN_DRY_RUN, &mdev->flags)) {
cf14c2e9
PR
2693 if (hg == 0)
2694 dev_info(DEV, "dry-run connect: No resync, would become Connected immediately.\n");
2695 else
2696 dev_info(DEV, "dry-run connect: Would become %s, doing a %s resync.",
2697 drbd_conn_str(hg > 0 ? C_SYNC_SOURCE : C_SYNC_TARGET),
2698 abs(hg) >= 2 ? "full" : "bit-map based");
2699 return C_MASK;
2700 }
2701
b411b363
PR
2702 if (abs(hg) >= 2) {
2703 dev_info(DEV, "Writing the whole bitmap, full sync required after drbd_sync_handshake.\n");
20ceb2b2
LE
2704 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from sync_handshake",
2705 BM_LOCKED_SET_ALLOWED))
b411b363
PR
2706 return C_MASK;
2707 }
2708
2709 if (hg > 0) { /* become sync source. */
2710 rv = C_WF_BITMAP_S;
2711 } else if (hg < 0) { /* become sync target */
2712 rv = C_WF_BITMAP_T;
2713 } else {
2714 rv = C_CONNECTED;
2715 if (drbd_bm_total_weight(mdev)) {
2716 dev_info(DEV, "No resync, but %lu bits in bitmap!\n",
2717 drbd_bm_total_weight(mdev));
2718 }
2719 }
2720
2721 return rv;
2722}
2723
2724/* returns 1 if invalid */
2725static int cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self)
2726{
2727 /* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
2728 if ((peer == ASB_DISCARD_REMOTE && self == ASB_DISCARD_LOCAL) ||
2729 (self == ASB_DISCARD_REMOTE && peer == ASB_DISCARD_LOCAL))
2730 return 0;
2731
2732 /* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
2733 if (peer == ASB_DISCARD_REMOTE || peer == ASB_DISCARD_LOCAL ||
2734 self == ASB_DISCARD_REMOTE || self == ASB_DISCARD_LOCAL)
2735 return 1;
2736
2737 /* everything else is valid if they are equal on both sides. */
2738 if (peer == self)
2739 return 0;
2740
2741 /* everything es is invalid. */
2742 return 1;
2743}
2744
d8763023
AG
2745static int receive_protocol(struct drbd_conf *mdev, enum drbd_packet cmd,
2746 unsigned int data_size)
b411b363 2747{
e42325a5 2748 struct p_protocol *p = &mdev->tconn->data.rbuf.protocol;
b411b363 2749 int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
cf14c2e9 2750 int p_want_lose, p_two_primaries, cf;
b411b363
PR
2751 char p_integrity_alg[SHARED_SECRET_MAX] = "";
2752
b411b363
PR
2753 p_proto = be32_to_cpu(p->protocol);
2754 p_after_sb_0p = be32_to_cpu(p->after_sb_0p);
2755 p_after_sb_1p = be32_to_cpu(p->after_sb_1p);
2756 p_after_sb_2p = be32_to_cpu(p->after_sb_2p);
b411b363 2757 p_two_primaries = be32_to_cpu(p->two_primaries);
cf14c2e9
PR
2758 cf = be32_to_cpu(p->conn_flags);
2759 p_want_lose = cf & CF_WANT_LOSE;
2760
2761 clear_bit(CONN_DRY_RUN, &mdev->flags);
2762
2763 if (cf & CF_DRY_RUN)
2764 set_bit(CONN_DRY_RUN, &mdev->flags);
b411b363 2765
89e58e75 2766 if (p_proto != mdev->tconn->net_conf->wire_protocol) {
b411b363
PR
2767 dev_err(DEV, "incompatible communication protocols\n");
2768 goto disconnect;
2769 }
2770
89e58e75 2771 if (cmp_after_sb(p_after_sb_0p, mdev->tconn->net_conf->after_sb_0p)) {
b411b363
PR
2772 dev_err(DEV, "incompatible after-sb-0pri settings\n");
2773 goto disconnect;
2774 }
2775
89e58e75 2776 if (cmp_after_sb(p_after_sb_1p, mdev->tconn->net_conf->after_sb_1p)) {
b411b363
PR
2777 dev_err(DEV, "incompatible after-sb-1pri settings\n");
2778 goto disconnect;
2779 }
2780
89e58e75 2781 if (cmp_after_sb(p_after_sb_2p, mdev->tconn->net_conf->after_sb_2p)) {
b411b363
PR
2782 dev_err(DEV, "incompatible after-sb-2pri settings\n");
2783 goto disconnect;
2784 }
2785
89e58e75 2786 if (p_want_lose && mdev->tconn->net_conf->want_lose) {
b411b363
PR
2787 dev_err(DEV, "both sides have the 'want_lose' flag set\n");
2788 goto disconnect;
2789 }
2790
89e58e75 2791 if (p_two_primaries != mdev->tconn->net_conf->two_primaries) {
b411b363
PR
2792 dev_err(DEV, "incompatible setting of the two-primaries options\n");
2793 goto disconnect;
2794 }
2795
31890f4a 2796 if (mdev->tconn->agreed_pro_version >= 87) {
89e58e75 2797 unsigned char *my_alg = mdev->tconn->net_conf->integrity_alg;
b411b363 2798
de0ff338 2799 if (drbd_recv(mdev->tconn, p_integrity_alg, data_size) != data_size)
81e84650 2800 return false;
b411b363
PR
2801
2802 p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
2803 if (strcmp(p_integrity_alg, my_alg)) {
2804 dev_err(DEV, "incompatible setting of the data-integrity-alg\n");
2805 goto disconnect;
2806 }
2807 dev_info(DEV, "data-integrity-alg: %s\n",
2808 my_alg[0] ? my_alg : (unsigned char *)"<not-used>");
2809 }
2810
81e84650 2811 return true;
b411b363
PR
2812
2813disconnect:
2814 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2815 return false;
b411b363
PR
2816}
2817
2818/* helper function
2819 * input: alg name, feature name
2820 * return: NULL (alg name was "")
2821 * ERR_PTR(error) if something goes wrong
2822 * or the crypto hash ptr, if it worked out ok. */
2823struct crypto_hash *drbd_crypto_alloc_digest_safe(const struct drbd_conf *mdev,
2824 const char *alg, const char *name)
2825{
2826 struct crypto_hash *tfm;
2827
2828 if (!alg[0])
2829 return NULL;
2830
2831 tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC);
2832 if (IS_ERR(tfm)) {
2833 dev_err(DEV, "Can not allocate \"%s\" as %s (reason: %ld)\n",
2834 alg, name, PTR_ERR(tfm));
2835 return tfm;
2836 }
2837 if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
2838 crypto_free_hash(tfm);
2839 dev_err(DEV, "\"%s\" is not a digest (%s)\n", alg, name);
2840 return ERR_PTR(-EINVAL);
2841 }
2842 return tfm;
2843}
2844
d8763023
AG
2845static int receive_SyncParam(struct drbd_conf *mdev, enum drbd_packet cmd,
2846 unsigned int packet_size)
b411b363 2847{
81e84650 2848 int ok = true;
e42325a5 2849 struct p_rs_param_95 *p = &mdev->tconn->data.rbuf.rs_param_95;
b411b363
PR
2850 unsigned int header_size, data_size, exp_max_sz;
2851 struct crypto_hash *verify_tfm = NULL;
2852 struct crypto_hash *csums_tfm = NULL;
31890f4a 2853 const int apv = mdev->tconn->agreed_pro_version;
778f271d
PR
2854 int *rs_plan_s = NULL;
2855 int fifo_size = 0;
b411b363
PR
2856
2857 exp_max_sz = apv <= 87 ? sizeof(struct p_rs_param)
2858 : apv == 88 ? sizeof(struct p_rs_param)
2859 + SHARED_SECRET_MAX
8e26f9cc
PR
2860 : apv <= 94 ? sizeof(struct p_rs_param_89)
2861 : /* apv >= 95 */ sizeof(struct p_rs_param_95);
b411b363 2862
02918be2 2863 if (packet_size > exp_max_sz) {
b411b363 2864 dev_err(DEV, "SyncParam packet too long: received %u, expected <= %u bytes\n",
02918be2 2865 packet_size, exp_max_sz);
81e84650 2866 return false;
b411b363
PR
2867 }
2868
2869 if (apv <= 88) {
257d0af6 2870 header_size = sizeof(struct p_rs_param) - sizeof(struct p_header);
02918be2 2871 data_size = packet_size - header_size;
8e26f9cc 2872 } else if (apv <= 94) {
257d0af6 2873 header_size = sizeof(struct p_rs_param_89) - sizeof(struct p_header);
02918be2 2874 data_size = packet_size - header_size;
b411b363 2875 D_ASSERT(data_size == 0);
8e26f9cc 2876 } else {
257d0af6 2877 header_size = sizeof(struct p_rs_param_95) - sizeof(struct p_header);
02918be2 2878 data_size = packet_size - header_size;
b411b363
PR
2879 D_ASSERT(data_size == 0);
2880 }
2881
2882 /* initialize verify_alg and csums_alg */
2883 memset(p->verify_alg, 0, 2 * SHARED_SECRET_MAX);
2884
de0ff338 2885 if (drbd_recv(mdev->tconn, &p->head.payload, header_size) != header_size)
81e84650 2886 return false;
b411b363
PR
2887
2888 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2889
2890 if (apv >= 88) {
2891 if (apv == 88) {
2892 if (data_size > SHARED_SECRET_MAX) {
2893 dev_err(DEV, "verify-alg too long, "
2894 "peer wants %u, accepting only %u byte\n",
2895 data_size, SHARED_SECRET_MAX);
81e84650 2896 return false;
b411b363
PR
2897 }
2898
de0ff338 2899 if (drbd_recv(mdev->tconn, p->verify_alg, data_size) != data_size)
81e84650 2900 return false;
b411b363
PR
2901
2902 /* we expect NUL terminated string */
2903 /* but just in case someone tries to be evil */
2904 D_ASSERT(p->verify_alg[data_size-1] == 0);
2905 p->verify_alg[data_size-1] = 0;
2906
2907 } else /* apv >= 89 */ {
2908 /* we still expect NUL terminated strings */
2909 /* but just in case someone tries to be evil */
2910 D_ASSERT(p->verify_alg[SHARED_SECRET_MAX-1] == 0);
2911 D_ASSERT(p->csums_alg[SHARED_SECRET_MAX-1] == 0);
2912 p->verify_alg[SHARED_SECRET_MAX-1] = 0;
2913 p->csums_alg[SHARED_SECRET_MAX-1] = 0;
2914 }
2915
2916 if (strcmp(mdev->sync_conf.verify_alg, p->verify_alg)) {
2917 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2918 dev_err(DEV, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
2919 mdev->sync_conf.verify_alg, p->verify_alg);
2920 goto disconnect;
2921 }
2922 verify_tfm = drbd_crypto_alloc_digest_safe(mdev,
2923 p->verify_alg, "verify-alg");
2924 if (IS_ERR(verify_tfm)) {
2925 verify_tfm = NULL;
2926 goto disconnect;
2927 }
2928 }
2929
2930 if (apv >= 89 && strcmp(mdev->sync_conf.csums_alg, p->csums_alg)) {
2931 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2932 dev_err(DEV, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
2933 mdev->sync_conf.csums_alg, p->csums_alg);
2934 goto disconnect;
2935 }
2936 csums_tfm = drbd_crypto_alloc_digest_safe(mdev,
2937 p->csums_alg, "csums-alg");
2938 if (IS_ERR(csums_tfm)) {
2939 csums_tfm = NULL;
2940 goto disconnect;
2941 }
2942 }
2943
8e26f9cc
PR
2944 if (apv > 94) {
2945 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2946 mdev->sync_conf.c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
2947 mdev->sync_conf.c_delay_target = be32_to_cpu(p->c_delay_target);
2948 mdev->sync_conf.c_fill_target = be32_to_cpu(p->c_fill_target);
2949 mdev->sync_conf.c_max_rate = be32_to_cpu(p->c_max_rate);
778f271d
PR
2950
2951 fifo_size = (mdev->sync_conf.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
2952 if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
2953 rs_plan_s = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
2954 if (!rs_plan_s) {
2955 dev_err(DEV, "kmalloc of fifo_buffer failed");
2956 goto disconnect;
2957 }
2958 }
8e26f9cc 2959 }
b411b363
PR
2960
2961 spin_lock(&mdev->peer_seq_lock);
2962 /* lock against drbd_nl_syncer_conf() */
2963 if (verify_tfm) {
2964 strcpy(mdev->sync_conf.verify_alg, p->verify_alg);
2965 mdev->sync_conf.verify_alg_len = strlen(p->verify_alg) + 1;
2966 crypto_free_hash(mdev->verify_tfm);
2967 mdev->verify_tfm = verify_tfm;
2968 dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
2969 }
2970 if (csums_tfm) {
2971 strcpy(mdev->sync_conf.csums_alg, p->csums_alg);
2972 mdev->sync_conf.csums_alg_len = strlen(p->csums_alg) + 1;
2973 crypto_free_hash(mdev->csums_tfm);
2974 mdev->csums_tfm = csums_tfm;
2975 dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
2976 }
778f271d
PR
2977 if (fifo_size != mdev->rs_plan_s.size) {
2978 kfree(mdev->rs_plan_s.values);
2979 mdev->rs_plan_s.values = rs_plan_s;
2980 mdev->rs_plan_s.size = fifo_size;
2981 mdev->rs_planed = 0;
2982 }
b411b363
PR
2983 spin_unlock(&mdev->peer_seq_lock);
2984 }
2985
2986 return ok;
2987disconnect:
2988 /* just for completeness: actually not needed,
2989 * as this is not reached if csums_tfm was ok. */
2990 crypto_free_hash(csums_tfm);
2991 /* but free the verify_tfm again, if csums_tfm did not work out */
2992 crypto_free_hash(verify_tfm);
2993 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2994 return false;
b411b363
PR
2995}
2996
b411b363
PR
2997/* warn if the arguments differ by more than 12.5% */
2998static void warn_if_differ_considerably(struct drbd_conf *mdev,
2999 const char *s, sector_t a, sector_t b)
3000{
3001 sector_t d;
3002 if (a == 0 || b == 0)
3003 return;
3004 d = (a > b) ? (a - b) : (b - a);
3005 if (d > (a>>3) || d > (b>>3))
3006 dev_warn(DEV, "Considerable difference in %s: %llus vs. %llus\n", s,
3007 (unsigned long long)a, (unsigned long long)b);
3008}
3009
d8763023
AG
3010static int receive_sizes(struct drbd_conf *mdev, enum drbd_packet cmd,
3011 unsigned int data_size)
b411b363 3012{
e42325a5 3013 struct p_sizes *p = &mdev->tconn->data.rbuf.sizes;
b411b363 3014 enum determine_dev_size dd = unchanged;
b411b363
PR
3015 sector_t p_size, p_usize, my_usize;
3016 int ldsc = 0; /* local disk size changed */
e89b591c 3017 enum dds_flags ddsf;
b411b363 3018
b411b363
PR
3019 p_size = be64_to_cpu(p->d_size);
3020 p_usize = be64_to_cpu(p->u_size);
3021
3022 if (p_size == 0 && mdev->state.disk == D_DISKLESS) {
3023 dev_err(DEV, "some backing storage is needed\n");
3024 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3025 return false;
b411b363
PR
3026 }
3027
3028 /* just store the peer's disk size for now.
3029 * we still need to figure out whether we accept that. */
3030 mdev->p_size = p_size;
3031
b411b363
PR
3032 if (get_ldev(mdev)) {
3033 warn_if_differ_considerably(mdev, "lower level device sizes",
3034 p_size, drbd_get_max_capacity(mdev->ldev));
3035 warn_if_differ_considerably(mdev, "user requested size",
3036 p_usize, mdev->ldev->dc.disk_size);
3037
3038 /* if this is the first connect, or an otherwise expected
3039 * param exchange, choose the minimum */
3040 if (mdev->state.conn == C_WF_REPORT_PARAMS)
3041 p_usize = min_not_zero((sector_t)mdev->ldev->dc.disk_size,
3042 p_usize);
3043
3044 my_usize = mdev->ldev->dc.disk_size;
3045
3046 if (mdev->ldev->dc.disk_size != p_usize) {
3047 mdev->ldev->dc.disk_size = p_usize;
3048 dev_info(DEV, "Peer sets u_size to %lu sectors\n",
3049 (unsigned long)mdev->ldev->dc.disk_size);
3050 }
3051
3052 /* Never shrink a device with usable data during connect.
3053 But allow online shrinking if we are connected. */
a393db6f 3054 if (drbd_new_dev_size(mdev, mdev->ldev, 0) <
b411b363
PR
3055 drbd_get_capacity(mdev->this_bdev) &&
3056 mdev->state.disk >= D_OUTDATED &&
3057 mdev->state.conn < C_CONNECTED) {
3058 dev_err(DEV, "The peer's disk size is too small!\n");
3059 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
3060 mdev->ldev->dc.disk_size = my_usize;
3061 put_ldev(mdev);
81e84650 3062 return false;
b411b363
PR
3063 }
3064 put_ldev(mdev);
3065 }
b411b363 3066
e89b591c 3067 ddsf = be16_to_cpu(p->dds_flags);
b411b363 3068 if (get_ldev(mdev)) {
24c4830c 3069 dd = drbd_determine_dev_size(mdev, ddsf);
b411b363
PR
3070 put_ldev(mdev);
3071 if (dd == dev_size_error)
81e84650 3072 return false;
b411b363
PR
3073 drbd_md_sync(mdev);
3074 } else {
3075 /* I am diskless, need to accept the peer's size. */
3076 drbd_set_my_capacity(mdev, p_size);
3077 }
3078
99432fcc
PR
3079 mdev->peer_max_bio_size = be32_to_cpu(p->max_bio_size);
3080 drbd_reconsider_max_bio_size(mdev);
3081
b411b363
PR
3082 if (get_ldev(mdev)) {
3083 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) {
3084 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
3085 ldsc = 1;
3086 }
3087
b411b363
PR
3088 put_ldev(mdev);
3089 }
3090
3091 if (mdev->state.conn > C_WF_REPORT_PARAMS) {
3092 if (be64_to_cpu(p->c_size) !=
3093 drbd_get_capacity(mdev->this_bdev) || ldsc) {
3094 /* we have different sizes, probably peer
3095 * needs to know my new size... */
e89b591c 3096 drbd_send_sizes(mdev, 0, ddsf);
b411b363
PR
3097 }
3098 if (test_and_clear_bit(RESIZE_PENDING, &mdev->flags) ||
3099 (dd == grew && mdev->state.conn == C_CONNECTED)) {
3100 if (mdev->state.pdsk >= D_INCONSISTENT &&
e89b591c
PR
3101 mdev->state.disk >= D_INCONSISTENT) {
3102 if (ddsf & DDSF_NO_RESYNC)
3103 dev_info(DEV, "Resync of new storage suppressed with --assume-clean\n");
3104 else
3105 resync_after_online_grow(mdev);
3106 } else
b411b363
PR
3107 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
3108 }
3109 }
3110
81e84650 3111 return true;
b411b363
PR
3112}
3113
d8763023
AG
3114static int receive_uuids(struct drbd_conf *mdev, enum drbd_packet cmd,
3115 unsigned int data_size)
b411b363 3116{
e42325a5 3117 struct p_uuids *p = &mdev->tconn->data.rbuf.uuids;
b411b363 3118 u64 *p_uuid;
62b0da3a 3119 int i, updated_uuids = 0;
b411b363 3120
b411b363
PR
3121 p_uuid = kmalloc(sizeof(u64)*UI_EXTENDED_SIZE, GFP_NOIO);
3122
3123 for (i = UI_CURRENT; i < UI_EXTENDED_SIZE; i++)
3124 p_uuid[i] = be64_to_cpu(p->uuid[i]);
3125
3126 kfree(mdev->p_uuid);
3127 mdev->p_uuid = p_uuid;
3128
3129 if (mdev->state.conn < C_CONNECTED &&
3130 mdev->state.disk < D_INCONSISTENT &&
3131 mdev->state.role == R_PRIMARY &&
3132 (mdev->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) {
3133 dev_err(DEV, "Can only connect to data with current UUID=%016llX\n",
3134 (unsigned long long)mdev->ed_uuid);
3135 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3136 return false;
b411b363
PR
3137 }
3138
3139 if (get_ldev(mdev)) {
3140 int skip_initial_sync =
3141 mdev->state.conn == C_CONNECTED &&
31890f4a 3142 mdev->tconn->agreed_pro_version >= 90 &&
b411b363
PR
3143 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED &&
3144 (p_uuid[UI_FLAGS] & 8);
3145 if (skip_initial_sync) {
3146 dev_info(DEV, "Accepted new current UUID, preparing to skip initial sync\n");
3147 drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
20ceb2b2
LE
3148 "clear_n_write from receive_uuids",
3149 BM_LOCKED_TEST_ALLOWED);
b411b363
PR
3150 _drbd_uuid_set(mdev, UI_CURRENT, p_uuid[UI_CURRENT]);
3151 _drbd_uuid_set(mdev, UI_BITMAP, 0);
3152 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
3153 CS_VERBOSE, NULL);
3154 drbd_md_sync(mdev);
62b0da3a 3155 updated_uuids = 1;
b411b363
PR
3156 }
3157 put_ldev(mdev);
18a50fa2
PR
3158 } else if (mdev->state.disk < D_INCONSISTENT &&
3159 mdev->state.role == R_PRIMARY) {
3160 /* I am a diskless primary, the peer just created a new current UUID
3161 for me. */
62b0da3a 3162 updated_uuids = drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
b411b363
PR
3163 }
3164
3165 /* Before we test for the disk state, we should wait until an eventually
3166 ongoing cluster wide state change is finished. That is important if
3167 we are primary and are detaching from our disk. We need to see the
3168 new disk state... */
3169 wait_event(mdev->misc_wait, !test_bit(CLUSTER_ST_CHANGE, &mdev->flags));
3170 if (mdev->state.conn >= C_CONNECTED && mdev->state.disk < D_INCONSISTENT)
62b0da3a
LE
3171 updated_uuids |= drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
3172
3173 if (updated_uuids)
3174 drbd_print_uuids(mdev, "receiver updated UUIDs to");
b411b363 3175
81e84650 3176 return true;
b411b363
PR
3177}
3178
3179/**
3180 * convert_state() - Converts the peer's view of the cluster state to our point of view
3181 * @ps: The state as seen by the peer.
3182 */
3183static union drbd_state convert_state(union drbd_state ps)
3184{
3185 union drbd_state ms;
3186
3187 static enum drbd_conns c_tab[] = {
3188 [C_CONNECTED] = C_CONNECTED,
3189
3190 [C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
3191 [C_STARTING_SYNC_T] = C_STARTING_SYNC_S,
3192 [C_DISCONNECTING] = C_TEAR_DOWN, /* C_NETWORK_FAILURE, */
3193 [C_VERIFY_S] = C_VERIFY_T,
3194 [C_MASK] = C_MASK,
3195 };
3196
3197 ms.i = ps.i;
3198
3199 ms.conn = c_tab[ps.conn];
3200 ms.peer = ps.role;
3201 ms.role = ps.peer;
3202 ms.pdsk = ps.disk;
3203 ms.disk = ps.pdsk;
3204 ms.peer_isp = (ps.aftr_isp | ps.user_isp);
3205
3206 return ms;
3207}
3208
d8763023
AG
3209static int receive_req_state(struct drbd_conf *mdev, enum drbd_packet cmd,
3210 unsigned int data_size)
b411b363 3211{
e42325a5 3212 struct p_req_state *p = &mdev->tconn->data.rbuf.req_state;
b411b363 3213 union drbd_state mask, val;
bf885f8a 3214 enum drbd_state_rv rv;
b411b363 3215
b411b363
PR
3216 mask.i = be32_to_cpu(p->mask);
3217 val.i = be32_to_cpu(p->val);
3218
25703f83 3219 if (test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags) &&
b411b363
PR
3220 test_bit(CLUSTER_ST_CHANGE, &mdev->flags)) {
3221 drbd_send_sr_reply(mdev, SS_CONCURRENT_ST_CHG);
81e84650 3222 return true;
b411b363
PR
3223 }
3224
3225 mask = convert_state(mask);
3226 val = convert_state(val);
3227
3228 rv = drbd_change_state(mdev, CS_VERBOSE, mask, val);
3229
3230 drbd_send_sr_reply(mdev, rv);
3231 drbd_md_sync(mdev);
3232
81e84650 3233 return true;
b411b363
PR
3234}
3235
d8763023
AG
3236static int receive_state(struct drbd_conf *mdev, enum drbd_packet cmd,
3237 unsigned int data_size)
b411b363 3238{
e42325a5 3239 struct p_state *p = &mdev->tconn->data.rbuf.state;
4ac4aada 3240 union drbd_state os, ns, peer_state;
b411b363 3241 enum drbd_disk_state real_peer_disk;
65d922c3 3242 enum chg_state_flags cs_flags;
b411b363
PR
3243 int rv;
3244
b411b363
PR
3245 peer_state.i = be32_to_cpu(p->state);
3246
3247 real_peer_disk = peer_state.disk;
3248 if (peer_state.disk == D_NEGOTIATING) {
3249 real_peer_disk = mdev->p_uuid[UI_FLAGS] & 4 ? D_INCONSISTENT : D_CONSISTENT;
3250 dev_info(DEV, "real peer disk state = %s\n", drbd_disk_str(real_peer_disk));
3251 }
3252
87eeee41 3253 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 3254 retry:
4ac4aada 3255 os = ns = mdev->state;
87eeee41 3256 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 3257
e9ef7bb6
LE
3258 /* peer says his disk is uptodate, while we think it is inconsistent,
3259 * and this happens while we think we have a sync going on. */
3260 if (os.pdsk == D_INCONSISTENT && real_peer_disk == D_UP_TO_DATE &&
3261 os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
3262 /* If we are (becoming) SyncSource, but peer is still in sync
3263 * preparation, ignore its uptodate-ness to avoid flapping, it
3264 * will change to inconsistent once the peer reaches active
3265 * syncing states.
3266 * It may have changed syncer-paused flags, however, so we
3267 * cannot ignore this completely. */
3268 if (peer_state.conn > C_CONNECTED &&
3269 peer_state.conn < C_SYNC_SOURCE)
3270 real_peer_disk = D_INCONSISTENT;
3271
3272 /* if peer_state changes to connected at the same time,
3273 * it explicitly notifies us that it finished resync.
3274 * Maybe we should finish it up, too? */
3275 else if (os.conn >= C_SYNC_SOURCE &&
3276 peer_state.conn == C_CONNECTED) {
3277 if (drbd_bm_total_weight(mdev) <= mdev->rs_failed)
3278 drbd_resync_finished(mdev);
81e84650 3279 return true;
e9ef7bb6
LE
3280 }
3281 }
3282
3283 /* peer says his disk is inconsistent, while we think it is uptodate,
3284 * and this happens while the peer still thinks we have a sync going on,
3285 * but we think we are already done with the sync.
3286 * We ignore this to avoid flapping pdsk.
3287 * This should not happen, if the peer is a recent version of drbd. */
3288 if (os.pdsk == D_UP_TO_DATE && real_peer_disk == D_INCONSISTENT &&
3289 os.conn == C_CONNECTED && peer_state.conn > C_SYNC_SOURCE)
3290 real_peer_disk = D_UP_TO_DATE;
3291
4ac4aada
LE
3292 if (ns.conn == C_WF_REPORT_PARAMS)
3293 ns.conn = C_CONNECTED;
b411b363 3294
67531718
PR
3295 if (peer_state.conn == C_AHEAD)
3296 ns.conn = C_BEHIND;
3297
b411b363
PR
3298 if (mdev->p_uuid && peer_state.disk >= D_NEGOTIATING &&
3299 get_ldev_if_state(mdev, D_NEGOTIATING)) {
3300 int cr; /* consider resync */
3301
3302 /* if we established a new connection */
4ac4aada 3303 cr = (os.conn < C_CONNECTED);
b411b363
PR
3304 /* if we had an established connection
3305 * and one of the nodes newly attaches a disk */
4ac4aada 3306 cr |= (os.conn == C_CONNECTED &&
b411b363 3307 (peer_state.disk == D_NEGOTIATING ||
4ac4aada 3308 os.disk == D_NEGOTIATING));
b411b363
PR
3309 /* if we have both been inconsistent, and the peer has been
3310 * forced to be UpToDate with --overwrite-data */
3311 cr |= test_bit(CONSIDER_RESYNC, &mdev->flags);
3312 /* if we had been plain connected, and the admin requested to
3313 * start a sync by "invalidate" or "invalidate-remote" */
4ac4aada 3314 cr |= (os.conn == C_CONNECTED &&
b411b363
PR
3315 (peer_state.conn >= C_STARTING_SYNC_S &&
3316 peer_state.conn <= C_WF_BITMAP_T));
3317
3318 if (cr)
4ac4aada 3319 ns.conn = drbd_sync_handshake(mdev, peer_state.role, real_peer_disk);
b411b363
PR
3320
3321 put_ldev(mdev);
4ac4aada
LE
3322 if (ns.conn == C_MASK) {
3323 ns.conn = C_CONNECTED;
b411b363 3324 if (mdev->state.disk == D_NEGOTIATING) {
82f59cc6 3325 drbd_force_state(mdev, NS(disk, D_FAILED));
b411b363
PR
3326 } else if (peer_state.disk == D_NEGOTIATING) {
3327 dev_err(DEV, "Disk attach process on the peer node was aborted.\n");
3328 peer_state.disk = D_DISKLESS;
580b9767 3329 real_peer_disk = D_DISKLESS;
b411b363 3330 } else {
cf14c2e9 3331 if (test_and_clear_bit(CONN_DRY_RUN, &mdev->flags))
81e84650 3332 return false;
4ac4aada 3333 D_ASSERT(os.conn == C_WF_REPORT_PARAMS);
b411b363 3334 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3335 return false;
b411b363
PR
3336 }
3337 }
3338 }
3339
87eeee41 3340 spin_lock_irq(&mdev->tconn->req_lock);
4ac4aada 3341 if (mdev->state.i != os.i)
b411b363
PR
3342 goto retry;
3343 clear_bit(CONSIDER_RESYNC, &mdev->flags);
b411b363
PR
3344 ns.peer = peer_state.role;
3345 ns.pdsk = real_peer_disk;
3346 ns.peer_isp = (peer_state.aftr_isp | peer_state.user_isp);
4ac4aada 3347 if ((ns.conn == C_CONNECTED || ns.conn == C_WF_BITMAP_S) && ns.disk == D_NEGOTIATING)
b411b363 3348 ns.disk = mdev->new_state_tmp.disk;
4ac4aada
LE
3349 cs_flags = CS_VERBOSE + (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED ? 0 : CS_HARD);
3350 if (ns.pdsk == D_CONSISTENT && is_susp(ns) && ns.conn == C_CONNECTED && os.conn < C_CONNECTED &&
481c6f50 3351 test_bit(NEW_CUR_UUID, &mdev->flags)) {
8554df1c 3352 /* Do not allow tl_restart(RESEND) for a rebooted peer. We can only allow this
481c6f50 3353 for temporal network outages! */
87eeee41 3354 spin_unlock_irq(&mdev->tconn->req_lock);
481c6f50
PR
3355 dev_err(DEV, "Aborting Connect, can not thaw IO with an only Consistent peer\n");
3356 tl_clear(mdev);
3357 drbd_uuid_new_current(mdev);
3358 clear_bit(NEW_CUR_UUID, &mdev->flags);
3359 drbd_force_state(mdev, NS2(conn, C_PROTOCOL_ERROR, susp, 0));
81e84650 3360 return false;
481c6f50 3361 }
65d922c3 3362 rv = _drbd_set_state(mdev, ns, cs_flags, NULL);
b411b363 3363 ns = mdev->state;
87eeee41 3364 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3365
3366 if (rv < SS_SUCCESS) {
3367 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3368 return false;
b411b363
PR
3369 }
3370
4ac4aada
LE
3371 if (os.conn > C_WF_REPORT_PARAMS) {
3372 if (ns.conn > C_CONNECTED && peer_state.conn <= C_CONNECTED &&
b411b363
PR
3373 peer_state.disk != D_NEGOTIATING ) {
3374 /* we want resync, peer has not yet decided to sync... */
3375 /* Nowadays only used when forcing a node into primary role and
3376 setting its disk to UpToDate with that */
3377 drbd_send_uuids(mdev);
3378 drbd_send_state(mdev);
3379 }
3380 }
3381
89e58e75 3382 mdev->tconn->net_conf->want_lose = 0;
b411b363
PR
3383
3384 drbd_md_sync(mdev); /* update connected indicator, la_size, ... */
3385
81e84650 3386 return true;
b411b363
PR
3387}
3388
d8763023
AG
3389static int receive_sync_uuid(struct drbd_conf *mdev, enum drbd_packet cmd,
3390 unsigned int data_size)
b411b363 3391{
e42325a5 3392 struct p_rs_uuid *p = &mdev->tconn->data.rbuf.rs_uuid;
b411b363
PR
3393
3394 wait_event(mdev->misc_wait,
3395 mdev->state.conn == C_WF_SYNC_UUID ||
c4752ef1 3396 mdev->state.conn == C_BEHIND ||
b411b363
PR
3397 mdev->state.conn < C_CONNECTED ||
3398 mdev->state.disk < D_NEGOTIATING);
3399
3400 /* D_ASSERT( mdev->state.conn == C_WF_SYNC_UUID ); */
3401
b411b363
PR
3402 /* Here the _drbd_uuid_ functions are right, current should
3403 _not_ be rotated into the history */
3404 if (get_ldev_if_state(mdev, D_NEGOTIATING)) {
3405 _drbd_uuid_set(mdev, UI_CURRENT, be64_to_cpu(p->uuid));
3406 _drbd_uuid_set(mdev, UI_BITMAP, 0UL);
3407
62b0da3a 3408 drbd_print_uuids(mdev, "updated sync uuid");
b411b363
PR
3409 drbd_start_resync(mdev, C_SYNC_TARGET);
3410
3411 put_ldev(mdev);
3412 } else
3413 dev_err(DEV, "Ignoring SyncUUID packet!\n");
3414
81e84650 3415 return true;
b411b363
PR
3416}
3417
2c46407d
AG
3418/**
3419 * receive_bitmap_plain
3420 *
3421 * Return 0 when done, 1 when another iteration is needed, and a negative error
3422 * code upon failure.
3423 */
3424static int
02918be2
PR
3425receive_bitmap_plain(struct drbd_conf *mdev, unsigned int data_size,
3426 unsigned long *buffer, struct bm_xfer_ctx *c)
b411b363
PR
3427{
3428 unsigned num_words = min_t(size_t, BM_PACKET_WORDS, c->bm_words - c->word_offset);
3429 unsigned want = num_words * sizeof(long);
2c46407d 3430 int err;
b411b363 3431
02918be2
PR
3432 if (want != data_size) {
3433 dev_err(DEV, "%s:want (%u) != data_size (%u)\n", __func__, want, data_size);
2c46407d 3434 return -EIO;
b411b363
PR
3435 }
3436 if (want == 0)
2c46407d 3437 return 0;
de0ff338 3438 err = drbd_recv(mdev->tconn, buffer, want);
2c46407d
AG
3439 if (err != want) {
3440 if (err >= 0)
3441 err = -EIO;
3442 return err;
3443 }
b411b363
PR
3444
3445 drbd_bm_merge_lel(mdev, c->word_offset, num_words, buffer);
3446
3447 c->word_offset += num_words;
3448 c->bit_offset = c->word_offset * BITS_PER_LONG;
3449 if (c->bit_offset > c->bm_bits)
3450 c->bit_offset = c->bm_bits;
3451
2c46407d 3452 return 1;
b411b363
PR
3453}
3454
2c46407d
AG
3455/**
3456 * recv_bm_rle_bits
3457 *
3458 * Return 0 when done, 1 when another iteration is needed, and a negative error
3459 * code upon failure.
3460 */
3461static int
b411b363
PR
3462recv_bm_rle_bits(struct drbd_conf *mdev,
3463 struct p_compressed_bm *p,
c6d25cfe
PR
3464 struct bm_xfer_ctx *c,
3465 unsigned int len)
b411b363
PR
3466{
3467 struct bitstream bs;
3468 u64 look_ahead;
3469 u64 rl;
3470 u64 tmp;
3471 unsigned long s = c->bit_offset;
3472 unsigned long e;
b411b363
PR
3473 int toggle = DCBP_get_start(p);
3474 int have;
3475 int bits;
3476
3477 bitstream_init(&bs, p->code, len, DCBP_get_pad_bits(p));
3478
3479 bits = bitstream_get_bits(&bs, &look_ahead, 64);
3480 if (bits < 0)
2c46407d 3481 return -EIO;
b411b363
PR
3482
3483 for (have = bits; have > 0; s += rl, toggle = !toggle) {
3484 bits = vli_decode_bits(&rl, look_ahead);
3485 if (bits <= 0)
2c46407d 3486 return -EIO;
b411b363
PR
3487
3488 if (toggle) {
3489 e = s + rl -1;
3490 if (e >= c->bm_bits) {
3491 dev_err(DEV, "bitmap overflow (e:%lu) while decoding bm RLE packet\n", e);
2c46407d 3492 return -EIO;
b411b363
PR
3493 }
3494 _drbd_bm_set_bits(mdev, s, e);
3495 }
3496
3497 if (have < bits) {
3498 dev_err(DEV, "bitmap decoding error: h:%d b:%d la:0x%08llx l:%u/%u\n",
3499 have, bits, look_ahead,
3500 (unsigned int)(bs.cur.b - p->code),
3501 (unsigned int)bs.buf_len);
2c46407d 3502 return -EIO;
b411b363
PR
3503 }
3504 look_ahead >>= bits;
3505 have -= bits;
3506
3507 bits = bitstream_get_bits(&bs, &tmp, 64 - have);
3508 if (bits < 0)
2c46407d 3509 return -EIO;
b411b363
PR
3510 look_ahead |= tmp << have;
3511 have += bits;
3512 }
3513
3514 c->bit_offset = s;
3515 bm_xfer_ctx_bit_to_word_offset(c);
3516
2c46407d 3517 return (s != c->bm_bits);
b411b363
PR
3518}
3519
2c46407d
AG
3520/**
3521 * decode_bitmap_c
3522 *
3523 * Return 0 when done, 1 when another iteration is needed, and a negative error
3524 * code upon failure.
3525 */
3526static int
b411b363
PR
3527decode_bitmap_c(struct drbd_conf *mdev,
3528 struct p_compressed_bm *p,
c6d25cfe
PR
3529 struct bm_xfer_ctx *c,
3530 unsigned int len)
b411b363
PR
3531{
3532 if (DCBP_get_code(p) == RLE_VLI_Bits)
c6d25cfe 3533 return recv_bm_rle_bits(mdev, p, c, len);
b411b363
PR
3534
3535 /* other variants had been implemented for evaluation,
3536 * but have been dropped as this one turned out to be "best"
3537 * during all our tests. */
3538
3539 dev_err(DEV, "receive_bitmap_c: unknown encoding %u\n", p->encoding);
3540 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
2c46407d 3541 return -EIO;
b411b363
PR
3542}
3543
3544void INFO_bm_xfer_stats(struct drbd_conf *mdev,
3545 const char *direction, struct bm_xfer_ctx *c)
3546{
3547 /* what would it take to transfer it "plaintext" */
c012949a 3548 unsigned plain = sizeof(struct p_header) *
b411b363
PR
3549 ((c->bm_words+BM_PACKET_WORDS-1)/BM_PACKET_WORDS+1)
3550 + c->bm_words * sizeof(long);
3551 unsigned total = c->bytes[0] + c->bytes[1];
3552 unsigned r;
3553
3554 /* total can not be zero. but just in case: */
3555 if (total == 0)
3556 return;
3557
3558 /* don't report if not compressed */
3559 if (total >= plain)
3560 return;
3561
3562 /* total < plain. check for overflow, still */
3563 r = (total > UINT_MAX/1000) ? (total / (plain/1000))
3564 : (1000 * total / plain);
3565
3566 if (r > 1000)
3567 r = 1000;
3568
3569 r = 1000 - r;
3570 dev_info(DEV, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), "
3571 "total %u; compression: %u.%u%%\n",
3572 direction,
3573 c->bytes[1], c->packets[1],
3574 c->bytes[0], c->packets[0],
3575 total, r/10, r % 10);
3576}
3577
3578/* Since we are processing the bitfield from lower addresses to higher,
3579 it does not matter if the process it in 32 bit chunks or 64 bit
3580 chunks as long as it is little endian. (Understand it as byte stream,
3581 beginning with the lowest byte...) If we would use big endian
3582 we would need to process it from the highest address to the lowest,
3583 in order to be agnostic to the 32 vs 64 bits issue.
3584
3585 returns 0 on failure, 1 if we successfully received it. */
d8763023
AG
3586static int receive_bitmap(struct drbd_conf *mdev, enum drbd_packet cmd,
3587 unsigned int data_size)
b411b363
PR
3588{
3589 struct bm_xfer_ctx c;
3590 void *buffer;
2c46407d 3591 int err;
81e84650 3592 int ok = false;
257d0af6 3593 struct p_header *h = &mdev->tconn->data.rbuf.header;
77351055 3594 struct packet_info pi;
b411b363 3595
20ceb2b2
LE
3596 drbd_bm_lock(mdev, "receive bitmap", BM_LOCKED_SET_ALLOWED);
3597 /* you are supposed to send additional out-of-sync information
3598 * if you actually set bits during this phase */
b411b363
PR
3599
3600 /* maybe we should use some per thread scratch page,
3601 * and allocate that during initial device creation? */
3602 buffer = (unsigned long *) __get_free_page(GFP_NOIO);
3603 if (!buffer) {
3604 dev_err(DEV, "failed to allocate one page buffer in %s\n", __func__);
3605 goto out;
3606 }
3607
3608 c = (struct bm_xfer_ctx) {
3609 .bm_bits = drbd_bm_bits(mdev),
3610 .bm_words = drbd_bm_words(mdev),
3611 };
3612
2c46407d 3613 for(;;) {
02918be2 3614 if (cmd == P_BITMAP) {
2c46407d 3615 err = receive_bitmap_plain(mdev, data_size, buffer, &c);
02918be2 3616 } else if (cmd == P_COMPRESSED_BITMAP) {
b411b363
PR
3617 /* MAYBE: sanity check that we speak proto >= 90,
3618 * and the feature is enabled! */
3619 struct p_compressed_bm *p;
3620
02918be2 3621 if (data_size > BM_PACKET_PAYLOAD_BYTES) {
b411b363
PR
3622 dev_err(DEV, "ReportCBitmap packet too large\n");
3623 goto out;
3624 }
3625 /* use the page buff */
3626 p = buffer;
3627 memcpy(p, h, sizeof(*h));
de0ff338 3628 if (drbd_recv(mdev->tconn, p->head.payload, data_size) != data_size)
b411b363 3629 goto out;
004352fa
LE
3630 if (data_size <= (sizeof(*p) - sizeof(p->head))) {
3631 dev_err(DEV, "ReportCBitmap packet too small (l:%u)\n", data_size);
78fcbdae 3632 goto out;
b411b363 3633 }
c6d25cfe 3634 err = decode_bitmap_c(mdev, p, &c, data_size);
b411b363 3635 } else {
02918be2 3636 dev_warn(DEV, "receive_bitmap: cmd neither ReportBitMap nor ReportCBitMap (is 0x%x)", cmd);
b411b363
PR
3637 goto out;
3638 }
3639
02918be2 3640 c.packets[cmd == P_BITMAP]++;
257d0af6 3641 c.bytes[cmd == P_BITMAP] += sizeof(struct p_header) + data_size;
b411b363 3642
2c46407d
AG
3643 if (err <= 0) {
3644 if (err < 0)
3645 goto out;
b411b363 3646 break;
2c46407d 3647 }
9ba7aa00 3648 if (!drbd_recv_header(mdev->tconn, &pi))
b411b363 3649 goto out;
77351055
PR
3650 cmd = pi.cmd;
3651 data_size = pi.size;
2c46407d 3652 }
b411b363
PR
3653
3654 INFO_bm_xfer_stats(mdev, "receive", &c);
3655
3656 if (mdev->state.conn == C_WF_BITMAP_T) {
de1f8e4a
AG
3657 enum drbd_state_rv rv;
3658
b411b363
PR
3659 ok = !drbd_send_bitmap(mdev);
3660 if (!ok)
3661 goto out;
3662 /* Omit CS_ORDERED with this state transition to avoid deadlocks. */
de1f8e4a
AG
3663 rv = _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
3664 D_ASSERT(rv == SS_SUCCESS);
b411b363
PR
3665 } else if (mdev->state.conn != C_WF_BITMAP_S) {
3666 /* admin may have requested C_DISCONNECTING,
3667 * other threads may have noticed network errors */
3668 dev_info(DEV, "unexpected cstate (%s) in receive_bitmap\n",
3669 drbd_conn_str(mdev->state.conn));
3670 }
3671
81e84650 3672 ok = true;
b411b363 3673 out:
20ceb2b2 3674 drbd_bm_unlock(mdev);
b411b363
PR
3675 if (ok && mdev->state.conn == C_WF_BITMAP_S)
3676 drbd_start_resync(mdev, C_SYNC_SOURCE);
3677 free_page((unsigned long) buffer);
3678 return ok;
3679}
3680
d8763023
AG
3681static int receive_skip(struct drbd_conf *mdev, enum drbd_packet cmd,
3682 unsigned int data_size)
b411b363
PR
3683{
3684 /* TODO zero copy sink :) */
3685 static char sink[128];
3686 int size, want, r;
3687
02918be2
PR
3688 dev_warn(DEV, "skipping unknown optional packet type %d, l: %d!\n",
3689 cmd, data_size);
b411b363 3690
02918be2 3691 size = data_size;
b411b363
PR
3692 while (size > 0) {
3693 want = min_t(int, size, sizeof(sink));
de0ff338 3694 r = drbd_recv(mdev->tconn, sink, want);
841ce241
AG
3695 if (!expect(r > 0))
3696 break;
b411b363
PR
3697 size -= r;
3698 }
3699 return size == 0;
3700}
3701
d8763023
AG
3702static int receive_UnplugRemote(struct drbd_conf *mdev, enum drbd_packet cmd,
3703 unsigned int data_size)
0ced55a3 3704{
e7f52dfb
LE
3705 /* Make sure we've acked all the TCP data associated
3706 * with the data requests being unplugged */
e42325a5 3707 drbd_tcp_quickack(mdev->tconn->data.socket);
0ced55a3 3708
81e84650 3709 return true;
0ced55a3
PR
3710}
3711
d8763023
AG
3712static int receive_out_of_sync(struct drbd_conf *mdev, enum drbd_packet cmd,
3713 unsigned int data_size)
73a01a18 3714{
e42325a5 3715 struct p_block_desc *p = &mdev->tconn->data.rbuf.block_desc;
73a01a18 3716
f735e363
LE
3717 switch (mdev->state.conn) {
3718 case C_WF_SYNC_UUID:
3719 case C_WF_BITMAP_T:
3720 case C_BEHIND:
3721 break;
3722 default:
3723 dev_err(DEV, "ASSERT FAILED cstate = %s, expected: WFSyncUUID|WFBitMapT|Behind\n",
3724 drbd_conn_str(mdev->state.conn));
3725 }
3726
73a01a18
PR
3727 drbd_set_out_of_sync(mdev, be64_to_cpu(p->sector), be32_to_cpu(p->blksize));
3728
81e84650 3729 return true;
73a01a18
PR
3730}
3731
d8763023
AG
3732typedef int (*drbd_cmd_handler_f)(struct drbd_conf *, enum drbd_packet cmd,
3733 unsigned int to_receive);
02918be2
PR
3734
3735struct data_cmd {
3736 int expect_payload;
3737 size_t pkt_size;
3738 drbd_cmd_handler_f function;
3739};
3740
3741static struct data_cmd drbd_cmd_handler[] = {
3742 [P_DATA] = { 1, sizeof(struct p_data), receive_Data },
3743 [P_DATA_REPLY] = { 1, sizeof(struct p_data), receive_DataReply },
3744 [P_RS_DATA_REPLY] = { 1, sizeof(struct p_data), receive_RSDataReply } ,
3745 [P_BARRIER] = { 0, sizeof(struct p_barrier), receive_Barrier } ,
257d0af6
PR
3746 [P_BITMAP] = { 1, sizeof(struct p_header), receive_bitmap } ,
3747 [P_COMPRESSED_BITMAP] = { 1, sizeof(struct p_header), receive_bitmap } ,
3748 [P_UNPLUG_REMOTE] = { 0, sizeof(struct p_header), receive_UnplugRemote },
02918be2
PR
3749 [P_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3750 [P_RS_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
257d0af6
PR
3751 [P_SYNC_PARAM] = { 1, sizeof(struct p_header), receive_SyncParam },
3752 [P_SYNC_PARAM89] = { 1, sizeof(struct p_header), receive_SyncParam },
02918be2
PR
3753 [P_PROTOCOL] = { 1, sizeof(struct p_protocol), receive_protocol },
3754 [P_UUIDS] = { 0, sizeof(struct p_uuids), receive_uuids },
3755 [P_SIZES] = { 0, sizeof(struct p_sizes), receive_sizes },
3756 [P_STATE] = { 0, sizeof(struct p_state), receive_state },
3757 [P_STATE_CHG_REQ] = { 0, sizeof(struct p_req_state), receive_req_state },
3758 [P_SYNC_UUID] = { 0, sizeof(struct p_rs_uuid), receive_sync_uuid },
3759 [P_OV_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3760 [P_OV_REPLY] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3761 [P_CSUM_RS_REQUEST] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3762 [P_DELAY_PROBE] = { 0, sizeof(struct p_delay_probe93), receive_skip },
73a01a18 3763 [P_OUT_OF_SYNC] = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
b411b363
PR
3764 /* anything missing from this table is in
3765 * the asender_tbl, see get_asender_cmd */
02918be2 3766 [P_MAX_CMD] = { 0, 0, NULL },
b411b363
PR
3767};
3768
02918be2 3769/* All handler functions that expect a sub-header get that sub-heder in
e42325a5 3770 mdev->tconn->data.rbuf.header.head.payload.
02918be2 3771
e42325a5 3772 Usually in mdev->tconn->data.rbuf.header.head the callback can find the usual
02918be2
PR
3773 p_header, but they may not rely on that. Since there is also p_header95 !
3774 */
b411b363 3775
eefc2f7d 3776static void drbdd(struct drbd_tconn *tconn)
b411b363 3777{
eefc2f7d 3778 struct p_header *header = &tconn->data.rbuf.header;
77351055 3779 struct packet_info pi;
02918be2
PR
3780 size_t shs; /* sub header size */
3781 int rv;
b411b363 3782
eefc2f7d
PR
3783 while (get_t_state(&tconn->receiver) == RUNNING) {
3784 drbd_thread_current_set_cpu(&tconn->receiver);
3785 if (!drbd_recv_header(tconn, &pi))
02918be2 3786 goto err_out;
b411b363 3787
77351055 3788 if (unlikely(pi.cmd >= P_MAX_CMD || !drbd_cmd_handler[pi.cmd].function)) {
eefc2f7d 3789 conn_err(tconn, "unknown packet type %d, l: %d!\n", pi.cmd, pi.size);
02918be2 3790 goto err_out;
0b33a916 3791 }
b411b363 3792
77351055
PR
3793 shs = drbd_cmd_handler[pi.cmd].pkt_size - sizeof(struct p_header);
3794 if (pi.size - shs > 0 && !drbd_cmd_handler[pi.cmd].expect_payload) {
eefc2f7d 3795 conn_err(tconn, "No payload expected %s l:%d\n", cmdname(pi.cmd), pi.size);
02918be2 3796 goto err_out;
b411b363 3797 }
b411b363 3798
c13f7e1a 3799 if (shs) {
eefc2f7d 3800 rv = drbd_recv(tconn, &header->payload, shs);
c13f7e1a 3801 if (unlikely(rv != shs)) {
0ddc5549 3802 if (!signal_pending(current))
eefc2f7d 3803 conn_warn(tconn, "short read while reading sub header: rv=%d\n", rv);
c13f7e1a
LE
3804 goto err_out;
3805 }
3806 }
3807
eefc2f7d 3808 rv = drbd_cmd_handler[pi.cmd].function(vnr_to_mdev(tconn, pi.vnr), pi.cmd, pi.size - shs);
b411b363 3809
02918be2 3810 if (unlikely(!rv)) {
eefc2f7d 3811 conn_err(tconn, "error receiving %s, l: %d!\n",
77351055 3812 cmdname(pi.cmd), pi.size);
02918be2 3813 goto err_out;
b411b363
PR
3814 }
3815 }
b411b363 3816
02918be2
PR
3817 if (0) {
3818 err_out:
eefc2f7d 3819 drbd_force_state(tconn->volume0, NS(conn, C_PROTOCOL_ERROR));
02918be2 3820 }
b411b363
PR
3821}
3822
a21e9298 3823void drbd_flush_workqueue(struct drbd_conf *mdev)
b411b363
PR
3824{
3825 struct drbd_wq_barrier barr;
3826
3827 barr.w.cb = w_prev_work_done;
a21e9298 3828 barr.w.mdev = mdev;
b411b363 3829 init_completion(&barr.done);
a21e9298 3830 drbd_queue_work(&mdev->tconn->data.work, &barr.w);
b411b363
PR
3831 wait_for_completion(&barr.done);
3832}
3833
360cc740 3834static void drbd_disconnect(struct drbd_tconn *tconn)
b411b363 3835{
b411b363
PR
3836 union drbd_state os, ns;
3837 int rv = SS_UNKNOWN_ERROR;
b411b363 3838
360cc740 3839 if (tconn->volume0->state.conn == C_STANDALONE)
b411b363 3840 return;
b411b363
PR
3841
3842 /* asender does not clean up anything. it must not interfere, either */
360cc740
PR
3843 drbd_thread_stop(&tconn->asender);
3844 drbd_free_sock(tconn);
3845
3846 idr_for_each(&tconn->volumes, drbd_disconnected, tconn);
3847
3848 conn_info(tconn, "Connection closed\n");
3849
3850 spin_lock_irq(&tconn->req_lock);
3851 os = tconn->volume0->state;
3852 if (os.conn >= C_UNCONNECTED) {
3853 /* Do not restart in case we are C_DISCONNECTING */
3854 ns.i = os.i;
3855 ns.conn = C_UNCONNECTED;
3856 rv = _drbd_set_state(tconn->volume0, ns, CS_VERBOSE, NULL);
3857 }
3858 spin_unlock_irq(&tconn->req_lock);
3859
3860 if (os.conn == C_DISCONNECTING) {
3861 wait_event(tconn->net_cnt_wait, atomic_read(&tconn->net_cnt) == 0);
3862
3863 crypto_free_hash(tconn->cram_hmac_tfm);
3864 tconn->cram_hmac_tfm = NULL;
3865
3866 kfree(tconn->net_conf);
3867 tconn->net_conf = NULL;
3868 drbd_request_state(tconn->volume0, NS(conn, C_STANDALONE));
3869 }
3870}
3871
3872static int drbd_disconnected(int vnr, void *p, void *data)
3873{
3874 struct drbd_conf *mdev = (struct drbd_conf *)p;
3875 enum drbd_fencing_p fp;
3876 unsigned int i;
b411b363 3877
85719573 3878 /* wait for current activity to cease. */
87eeee41 3879 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
3880 _drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
3881 _drbd_wait_ee_list_empty(mdev, &mdev->sync_ee);
3882 _drbd_wait_ee_list_empty(mdev, &mdev->read_ee);
87eeee41 3883 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3884
3885 /* We do not have data structures that would allow us to
3886 * get the rs_pending_cnt down to 0 again.
3887 * * On C_SYNC_TARGET we do not have any data structures describing
3888 * the pending RSDataRequest's we have sent.
3889 * * On C_SYNC_SOURCE there is no data structure that tracks
3890 * the P_RS_DATA_REPLY blocks that we sent to the SyncTarget.
3891 * And no, it is not the sum of the reference counts in the
3892 * resync_LRU. The resync_LRU tracks the whole operation including
3893 * the disk-IO, while the rs_pending_cnt only tracks the blocks
3894 * on the fly. */
3895 drbd_rs_cancel_all(mdev);
3896 mdev->rs_total = 0;
3897 mdev->rs_failed = 0;
3898 atomic_set(&mdev->rs_pending_cnt, 0);
3899 wake_up(&mdev->misc_wait);
3900
7fde2be9
PR
3901 del_timer(&mdev->request_timer);
3902
b411b363
PR
3903 /* make sure syncer is stopped and w_resume_next_sg queued */
3904 del_timer_sync(&mdev->resync_timer);
b411b363
PR
3905 resync_timer_fn((unsigned long)mdev);
3906
b411b363
PR
3907 /* wait for all w_e_end_data_req, w_e_end_rsdata_req, w_send_barrier,
3908 * w_make_resync_request etc. which may still be on the worker queue
3909 * to be "canceled" */
a21e9298 3910 drbd_flush_workqueue(mdev);
b411b363
PR
3911
3912 /* This also does reclaim_net_ee(). If we do this too early, we might
3913 * miss some resync ee and pages.*/
3914 drbd_process_done_ee(mdev);
3915
3916 kfree(mdev->p_uuid);
3917 mdev->p_uuid = NULL;
3918
fb22c402 3919 if (!is_susp(mdev->state))
b411b363
PR
3920 tl_clear(mdev);
3921
b411b363
PR
3922 drbd_md_sync(mdev);
3923
3924 fp = FP_DONT_CARE;
3925 if (get_ldev(mdev)) {
3926 fp = mdev->ldev->dc.fencing;
3927 put_ldev(mdev);
3928 }
3929
87f7be4c
PR
3930 if (mdev->state.role == R_PRIMARY && fp >= FP_RESOURCE && mdev->state.pdsk >= D_UNKNOWN)
3931 drbd_try_outdate_peer_async(mdev);
b411b363 3932
20ceb2b2
LE
3933 /* serialize with bitmap writeout triggered by the state change,
3934 * if any. */
3935 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
3936
b411b363
PR
3937 /* tcp_close and release of sendpage pages can be deferred. I don't
3938 * want to use SO_LINGER, because apparently it can be deferred for
3939 * more than 20 seconds (longest time I checked).
3940 *
3941 * Actually we don't care for exactly when the network stack does its
3942 * put_page(), but release our reference on these pages right here.
3943 */
3944 i = drbd_release_ee(mdev, &mdev->net_ee);
3945 if (i)
3946 dev_info(DEV, "net_ee not empty, killed %u entries\n", i);
435f0740
LE
3947 i = atomic_read(&mdev->pp_in_use_by_net);
3948 if (i)
3949 dev_info(DEV, "pp_in_use_by_net = %d, expected 0\n", i);
b411b363
PR
3950 i = atomic_read(&mdev->pp_in_use);
3951 if (i)
45bb912b 3952 dev_info(DEV, "pp_in_use = %d, expected 0\n", i);
b411b363
PR
3953
3954 D_ASSERT(list_empty(&mdev->read_ee));
3955 D_ASSERT(list_empty(&mdev->active_ee));
3956 D_ASSERT(list_empty(&mdev->sync_ee));
3957 D_ASSERT(list_empty(&mdev->done_ee));
3958
3959 /* ok, no more ee's on the fly, it is safe to reset the epoch_size */
3960 atomic_set(&mdev->current_epoch->epoch_size, 0);
3961 D_ASSERT(list_empty(&mdev->current_epoch->list));
360cc740
PR
3962
3963 return 0;
b411b363
PR
3964}
3965
3966/*
3967 * We support PRO_VERSION_MIN to PRO_VERSION_MAX. The protocol version
3968 * we can agree on is stored in agreed_pro_version.
3969 *
3970 * feature flags and the reserved array should be enough room for future
3971 * enhancements of the handshake protocol, and possible plugins...
3972 *
3973 * for now, they are expected to be zero, but ignored.
3974 */
8a22cccc 3975static int drbd_send_handshake(struct drbd_tconn *tconn)
b411b363 3976{
e6b3ea83 3977 /* ASSERT current == mdev->tconn->receiver ... */
8a22cccc 3978 struct p_handshake *p = &tconn->data.sbuf.handshake;
b411b363
PR
3979 int ok;
3980
8a22cccc
PR
3981 if (mutex_lock_interruptible(&tconn->data.mutex)) {
3982 conn_err(tconn, "interrupted during initial handshake\n");
b411b363
PR
3983 return 0; /* interrupted. not ok. */
3984 }
3985
8a22cccc
PR
3986 if (tconn->data.socket == NULL) {
3987 mutex_unlock(&tconn->data.mutex);
b411b363
PR
3988 return 0;
3989 }
3990
3991 memset(p, 0, sizeof(*p));
3992 p->protocol_min = cpu_to_be32(PRO_VERSION_MIN);
3993 p->protocol_max = cpu_to_be32(PRO_VERSION_MAX);
8a22cccc
PR
3994 ok = _conn_send_cmd(tconn, 0, tconn->data.socket, P_HAND_SHAKE,
3995 &p->head, sizeof(*p), 0);
3996 mutex_unlock(&tconn->data.mutex);
b411b363
PR
3997 return ok;
3998}
3999
4000/*
4001 * return values:
4002 * 1 yes, we have a valid connection
4003 * 0 oops, did not work out, please try again
4004 * -1 peer talks different language,
4005 * no point in trying again, please go standalone.
4006 */
65d11ed6 4007static int drbd_do_handshake(struct drbd_tconn *tconn)
b411b363 4008{
65d11ed6
PR
4009 /* ASSERT current == tconn->receiver ... */
4010 struct p_handshake *p = &tconn->data.rbuf.handshake;
02918be2 4011 const int expect = sizeof(struct p_handshake) - sizeof(struct p_header80);
77351055 4012 struct packet_info pi;
b411b363
PR
4013 int rv;
4014
65d11ed6 4015 rv = drbd_send_handshake(tconn);
b411b363
PR
4016 if (!rv)
4017 return 0;
4018
65d11ed6 4019 rv = drbd_recv_header(tconn, &pi);
b411b363
PR
4020 if (!rv)
4021 return 0;
4022
77351055 4023 if (pi.cmd != P_HAND_SHAKE) {
65d11ed6 4024 conn_err(tconn, "expected HandShake packet, received: %s (0x%04x)\n",
77351055 4025 cmdname(pi.cmd), pi.cmd);
b411b363
PR
4026 return -1;
4027 }
4028
77351055 4029 if (pi.size != expect) {
65d11ed6 4030 conn_err(tconn, "expected HandShake length: %u, received: %u\n",
77351055 4031 expect, pi.size);
b411b363
PR
4032 return -1;
4033 }
4034
65d11ed6 4035 rv = drbd_recv(tconn, &p->head.payload, expect);
b411b363
PR
4036
4037 if (rv != expect) {
0ddc5549 4038 if (!signal_pending(current))
65d11ed6 4039 conn_warn(tconn, "short read receiving handshake packet: l=%u\n", rv);
b411b363
PR
4040 return 0;
4041 }
4042
b411b363
PR
4043 p->protocol_min = be32_to_cpu(p->protocol_min);
4044 p->protocol_max = be32_to_cpu(p->protocol_max);
4045 if (p->protocol_max == 0)
4046 p->protocol_max = p->protocol_min;
4047
4048 if (PRO_VERSION_MAX < p->protocol_min ||
4049 PRO_VERSION_MIN > p->protocol_max)
4050 goto incompat;
4051
65d11ed6 4052 tconn->agreed_pro_version = min_t(int, PRO_VERSION_MAX, p->protocol_max);
b411b363 4053
65d11ed6
PR
4054 conn_info(tconn, "Handshake successful: "
4055 "Agreed network protocol version %d\n", tconn->agreed_pro_version);
b411b363
PR
4056
4057 return 1;
4058
4059 incompat:
65d11ed6 4060 conn_err(tconn, "incompatible DRBD dialects: "
b411b363
PR
4061 "I support %d-%d, peer supports %d-%d\n",
4062 PRO_VERSION_MIN, PRO_VERSION_MAX,
4063 p->protocol_min, p->protocol_max);
4064 return -1;
4065}
4066
4067#if !defined(CONFIG_CRYPTO_HMAC) && !defined(CONFIG_CRYPTO_HMAC_MODULE)
13e6037d 4068static int drbd_do_auth(struct drbd_tconn *tconn)
b411b363
PR
4069{
4070 dev_err(DEV, "This kernel was build without CONFIG_CRYPTO_HMAC.\n");
4071 dev_err(DEV, "You need to disable 'cram-hmac-alg' in drbd.conf.\n");
b10d96cb 4072 return -1;
b411b363
PR
4073}
4074#else
4075#define CHALLENGE_LEN 64
b10d96cb
JT
4076
4077/* Return value:
4078 1 - auth succeeded,
4079 0 - failed, try again (network error),
4080 -1 - auth failed, don't try again.
4081*/
4082
13e6037d 4083static int drbd_do_auth(struct drbd_tconn *tconn)
b411b363
PR
4084{
4085 char my_challenge[CHALLENGE_LEN]; /* 64 Bytes... */
4086 struct scatterlist sg;
4087 char *response = NULL;
4088 char *right_response = NULL;
4089 char *peers_ch = NULL;
13e6037d 4090 unsigned int key_len = strlen(tconn->net_conf->shared_secret);
b411b363
PR
4091 unsigned int resp_size;
4092 struct hash_desc desc;
77351055 4093 struct packet_info pi;
b411b363
PR
4094 int rv;
4095
13e6037d 4096 desc.tfm = tconn->cram_hmac_tfm;
b411b363
PR
4097 desc.flags = 0;
4098
13e6037d
PR
4099 rv = crypto_hash_setkey(tconn->cram_hmac_tfm,
4100 (u8 *)tconn->net_conf->shared_secret, key_len);
b411b363 4101 if (rv) {
13e6037d 4102 conn_err(tconn, "crypto_hash_setkey() failed with %d\n", rv);
b10d96cb 4103 rv = -1;
b411b363
PR
4104 goto fail;
4105 }
4106
4107 get_random_bytes(my_challenge, CHALLENGE_LEN);
4108
13e6037d 4109 rv = conn_send_cmd2(tconn, P_AUTH_CHALLENGE, my_challenge, CHALLENGE_LEN);
b411b363
PR
4110 if (!rv)
4111 goto fail;
4112
13e6037d 4113 rv = drbd_recv_header(tconn, &pi);
b411b363
PR
4114 if (!rv)
4115 goto fail;
4116
77351055 4117 if (pi.cmd != P_AUTH_CHALLENGE) {
13e6037d 4118 conn_err(tconn, "expected AuthChallenge packet, received: %s (0x%04x)\n",
77351055 4119 cmdname(pi.cmd), pi.cmd);
b411b363
PR
4120 rv = 0;
4121 goto fail;
4122 }
4123
77351055 4124 if (pi.size > CHALLENGE_LEN * 2) {
13e6037d 4125 conn_err(tconn, "expected AuthChallenge payload too big.\n");
b10d96cb 4126 rv = -1;
b411b363
PR
4127 goto fail;
4128 }
4129
77351055 4130 peers_ch = kmalloc(pi.size, GFP_NOIO);
b411b363 4131 if (peers_ch == NULL) {
13e6037d 4132 conn_err(tconn, "kmalloc of peers_ch failed\n");
b10d96cb 4133 rv = -1;
b411b363
PR
4134 goto fail;
4135 }
4136
13e6037d 4137 rv = drbd_recv(tconn, peers_ch, pi.size);
b411b363 4138
77351055 4139 if (rv != pi.size) {
0ddc5549 4140 if (!signal_pending(current))
13e6037d 4141 conn_warn(tconn, "short read AuthChallenge: l=%u\n", rv);
b411b363
PR
4142 rv = 0;
4143 goto fail;
4144 }
4145
13e6037d 4146 resp_size = crypto_hash_digestsize(tconn->cram_hmac_tfm);
b411b363
PR
4147 response = kmalloc(resp_size, GFP_NOIO);
4148 if (response == NULL) {
13e6037d 4149 conn_err(tconn, "kmalloc of response failed\n");
b10d96cb 4150 rv = -1;
b411b363
PR
4151 goto fail;
4152 }
4153
4154 sg_init_table(&sg, 1);
77351055 4155 sg_set_buf(&sg, peers_ch, pi.size);
b411b363
PR
4156
4157 rv = crypto_hash_digest(&desc, &sg, sg.length, response);
4158 if (rv) {
13e6037d 4159 conn_err(tconn, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4160 rv = -1;
b411b363
PR
4161 goto fail;
4162 }
4163
13e6037d 4164 rv = conn_send_cmd2(tconn, P_AUTH_RESPONSE, response, resp_size);
b411b363
PR
4165 if (!rv)
4166 goto fail;
4167
13e6037d 4168 rv = drbd_recv_header(tconn, &pi);
b411b363
PR
4169 if (!rv)
4170 goto fail;
4171
77351055 4172 if (pi.cmd != P_AUTH_RESPONSE) {
13e6037d 4173 conn_err(tconn, "expected AuthResponse packet, received: %s (0x%04x)\n",
77351055 4174 cmdname(pi.cmd), pi.cmd);
b411b363
PR
4175 rv = 0;
4176 goto fail;
4177 }
4178
77351055 4179 if (pi.size != resp_size) {
13e6037d 4180 conn_err(tconn, "expected AuthResponse payload of wrong size\n");
b411b363
PR
4181 rv = 0;
4182 goto fail;
4183 }
4184
13e6037d 4185 rv = drbd_recv(tconn, response , resp_size);
b411b363
PR
4186
4187 if (rv != resp_size) {
0ddc5549 4188 if (!signal_pending(current))
13e6037d 4189 conn_warn(tconn, "short read receiving AuthResponse: l=%u\n", rv);
b411b363
PR
4190 rv = 0;
4191 goto fail;
4192 }
4193
4194 right_response = kmalloc(resp_size, GFP_NOIO);
2d1ee87d 4195 if (right_response == NULL) {
13e6037d 4196 conn_err(tconn, "kmalloc of right_response failed\n");
b10d96cb 4197 rv = -1;
b411b363
PR
4198 goto fail;
4199 }
4200
4201 sg_set_buf(&sg, my_challenge, CHALLENGE_LEN);
4202
4203 rv = crypto_hash_digest(&desc, &sg, sg.length, right_response);
4204 if (rv) {
13e6037d 4205 conn_err(tconn, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4206 rv = -1;
b411b363
PR
4207 goto fail;
4208 }
4209
4210 rv = !memcmp(response, right_response, resp_size);
4211
4212 if (rv)
13e6037d
PR
4213 conn_info(tconn, "Peer authenticated using %d bytes of '%s' HMAC\n",
4214 resp_size, tconn->net_conf->cram_hmac_alg);
b10d96cb
JT
4215 else
4216 rv = -1;
b411b363
PR
4217
4218 fail:
4219 kfree(peers_ch);
4220 kfree(response);
4221 kfree(right_response);
4222
4223 return rv;
4224}
4225#endif
4226
4227int drbdd_init(struct drbd_thread *thi)
4228{
4d641dd7 4229 struct drbd_tconn *tconn = thi->mdev->tconn;
b411b363
PR
4230 int h;
4231
4d641dd7 4232 conn_info(tconn, "receiver (re)started\n");
b411b363
PR
4233
4234 do {
4d641dd7 4235 h = drbd_connect(tconn);
b411b363 4236 if (h == 0) {
4d641dd7 4237 drbd_disconnect(tconn);
20ee6390 4238 schedule_timeout_interruptible(HZ);
b411b363
PR
4239 }
4240 if (h == -1) {
4d641dd7
PR
4241 conn_warn(tconn, "Discarding network configuration.\n");
4242 drbd_force_state(tconn->volume0, NS(conn, C_DISCONNECTING));
b411b363
PR
4243 }
4244 } while (h == 0);
4245
4246 if (h > 0) {
4d641dd7
PR
4247 if (get_net_conf(tconn)) {
4248 drbdd(tconn);
4249 put_net_conf(tconn);
b411b363
PR
4250 }
4251 }
4252
4d641dd7 4253 drbd_disconnect(tconn);
b411b363 4254
4d641dd7 4255 conn_info(tconn, "receiver terminated\n");
b411b363
PR
4256 return 0;
4257}
4258
4259/* ********* acknowledge sender ******** */
4260
d8763023 4261static int got_RqSReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4262{
257d0af6 4263 struct p_req_state_reply *p = &mdev->tconn->meta.rbuf.req_state_reply;
b411b363
PR
4264
4265 int retcode = be32_to_cpu(p->retcode);
4266
4267 if (retcode >= SS_SUCCESS) {
4268 set_bit(CL_ST_CHG_SUCCESS, &mdev->flags);
4269 } else {
4270 set_bit(CL_ST_CHG_FAIL, &mdev->flags);
4271 dev_err(DEV, "Requested state change failed by peer: %s (%d)\n",
4272 drbd_set_st_err_str(retcode), retcode);
4273 }
4274 wake_up(&mdev->state_wait);
4275
81e84650 4276 return true;
b411b363
PR
4277}
4278
d8763023 4279static int got_Ping(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4280{
4281 return drbd_send_ping_ack(mdev);
4282
4283}
4284
d8763023 4285static int got_PingAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4286{
4287 /* restore idle timeout */
e42325a5 4288 mdev->tconn->meta.socket->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_int*HZ;
309d1608
PR
4289 if (!test_and_set_bit(GOT_PING_ACK, &mdev->flags))
4290 wake_up(&mdev->misc_wait);
b411b363 4291
81e84650 4292 return true;
b411b363
PR
4293}
4294
d8763023 4295static int got_IsInSync(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4296{
257d0af6 4297 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4298 sector_t sector = be64_to_cpu(p->sector);
4299 int blksize = be32_to_cpu(p->blksize);
4300
31890f4a 4301 D_ASSERT(mdev->tconn->agreed_pro_version >= 89);
b411b363
PR
4302
4303 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4304
1d53f09e
LE
4305 if (get_ldev(mdev)) {
4306 drbd_rs_complete_io(mdev, sector);
4307 drbd_set_in_sync(mdev, sector, blksize);
4308 /* rs_same_csums is supposed to count in units of BM_BLOCK_SIZE */
4309 mdev->rs_same_csum += (blksize >> BM_BLOCK_SHIFT);
4310 put_ldev(mdev);
4311 }
b411b363 4312 dec_rs_pending(mdev);
778f271d 4313 atomic_add(blksize >> 9, &mdev->rs_sect_in);
b411b363 4314
81e84650 4315 return true;
b411b363
PR
4316}
4317
bc9c5c41
AG
4318static int
4319validate_req_change_req_state(struct drbd_conf *mdev, u64 id, sector_t sector,
4320 struct rb_root *root, const char *func,
4321 enum drbd_req_event what, bool missing_ok)
b411b363
PR
4322{
4323 struct drbd_request *req;
4324 struct bio_and_error m;
4325
87eeee41 4326 spin_lock_irq(&mdev->tconn->req_lock);
bc9c5c41 4327 req = find_request(mdev, root, id, sector, missing_ok, func);
b411b363 4328 if (unlikely(!req)) {
87eeee41 4329 spin_unlock_irq(&mdev->tconn->req_lock);
81e84650 4330 return false;
b411b363
PR
4331 }
4332 __req_mod(req, what, &m);
87eeee41 4333 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
4334
4335 if (m.bio)
4336 complete_master_bio(mdev, &m);
81e84650 4337 return true;
b411b363
PR
4338}
4339
d8763023 4340static int got_BlockAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4341{
257d0af6 4342 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4343 sector_t sector = be64_to_cpu(p->sector);
4344 int blksize = be32_to_cpu(p->blksize);
4345 enum drbd_req_event what;
4346
4347 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4348
579b57ed 4349 if (p->block_id == ID_SYNCER) {
b411b363
PR
4350 drbd_set_in_sync(mdev, sector, blksize);
4351 dec_rs_pending(mdev);
81e84650 4352 return true;
b411b363 4353 }
257d0af6 4354 switch (cmd) {
b411b363 4355 case P_RS_WRITE_ACK:
89e58e75 4356 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4357 what = WRITE_ACKED_BY_PEER_AND_SIS;
b411b363
PR
4358 break;
4359 case P_WRITE_ACK:
89e58e75 4360 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4361 what = WRITE_ACKED_BY_PEER;
b411b363
PR
4362 break;
4363 case P_RECV_ACK:
89e58e75 4364 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_B);
8554df1c 4365 what = RECV_ACKED_BY_PEER;
b411b363
PR
4366 break;
4367 case P_DISCARD_ACK:
89e58e75 4368 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4369 what = CONFLICT_DISCARDED_BY_PEER;
b411b363
PR
4370 break;
4371 default:
4372 D_ASSERT(0);
81e84650 4373 return false;
b411b363
PR
4374 }
4375
4376 return validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41
AG
4377 &mdev->write_requests, __func__,
4378 what, false);
b411b363
PR
4379}
4380
d8763023 4381static int got_NegAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4382{
257d0af6 4383 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363 4384 sector_t sector = be64_to_cpu(p->sector);
2deb8336 4385 int size = be32_to_cpu(p->blksize);
89e58e75
PR
4386 bool missing_ok = mdev->tconn->net_conf->wire_protocol == DRBD_PROT_A ||
4387 mdev->tconn->net_conf->wire_protocol == DRBD_PROT_B;
c3afd8f5 4388 bool found;
b411b363
PR
4389
4390 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4391
579b57ed 4392 if (p->block_id == ID_SYNCER) {
b411b363
PR
4393 dec_rs_pending(mdev);
4394 drbd_rs_failed_io(mdev, sector, size);
81e84650 4395 return true;
b411b363 4396 }
2deb8336 4397
c3afd8f5 4398 found = validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41 4399 &mdev->write_requests, __func__,
8554df1c 4400 NEG_ACKED, missing_ok);
c3afd8f5
AG
4401 if (!found) {
4402 /* Protocol A has no P_WRITE_ACKs, but has P_NEG_ACKs.
4403 The master bio might already be completed, therefore the
4404 request is no longer in the collision hash. */
4405 /* In Protocol B we might already have got a P_RECV_ACK
4406 but then get a P_NEG_ACK afterwards. */
4407 if (!missing_ok)
2deb8336 4408 return false;
c3afd8f5 4409 drbd_set_out_of_sync(mdev, sector, size);
2deb8336 4410 }
2deb8336 4411 return true;
b411b363
PR
4412}
4413
d8763023 4414static int got_NegDReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4415{
257d0af6 4416 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4417 sector_t sector = be64_to_cpu(p->sector);
4418
4419 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4420 dev_err(DEV, "Got NegDReply; Sector %llus, len %u; Fail original request.\n",
4421 (unsigned long long)sector, be32_to_cpu(p->blksize));
4422
4423 return validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41 4424 &mdev->read_requests, __func__,
8554df1c 4425 NEG_ACKED, false);
b411b363
PR
4426}
4427
d8763023 4428static int got_NegRSDReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4429{
4430 sector_t sector;
4431 int size;
257d0af6 4432 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4433
4434 sector = be64_to_cpu(p->sector);
4435 size = be32_to_cpu(p->blksize);
b411b363
PR
4436
4437 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4438
4439 dec_rs_pending(mdev);
4440
4441 if (get_ldev_if_state(mdev, D_FAILED)) {
4442 drbd_rs_complete_io(mdev, sector);
257d0af6 4443 switch (cmd) {
d612d309
PR
4444 case P_NEG_RS_DREPLY:
4445 drbd_rs_failed_io(mdev, sector, size);
4446 case P_RS_CANCEL:
4447 break;
4448 default:
4449 D_ASSERT(0);
4450 put_ldev(mdev);
4451 return false;
4452 }
b411b363
PR
4453 put_ldev(mdev);
4454 }
4455
81e84650 4456 return true;
b411b363
PR
4457}
4458
d8763023 4459static int got_BarrierAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4460{
257d0af6 4461 struct p_barrier_ack *p = &mdev->tconn->meta.rbuf.barrier_ack;
b411b363
PR
4462
4463 tl_release(mdev, p->barrier, be32_to_cpu(p->set_size));
4464
c4752ef1
PR
4465 if (mdev->state.conn == C_AHEAD &&
4466 atomic_read(&mdev->ap_in_flight) == 0 &&
370a43e7
PR
4467 !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->current_epoch->flags)) {
4468 mdev->start_resync_timer.expires = jiffies + HZ;
4469 add_timer(&mdev->start_resync_timer);
c4752ef1
PR
4470 }
4471
81e84650 4472 return true;
b411b363
PR
4473}
4474
d8763023 4475static int got_OVResult(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4476{
257d0af6 4477 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4478 struct drbd_work *w;
4479 sector_t sector;
4480 int size;
4481
4482 sector = be64_to_cpu(p->sector);
4483 size = be32_to_cpu(p->blksize);
4484
4485 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4486
4487 if (be64_to_cpu(p->block_id) == ID_OUT_OF_SYNC)
4488 drbd_ov_oos_found(mdev, sector, size);
4489 else
4490 ov_oos_print(mdev);
4491
1d53f09e 4492 if (!get_ldev(mdev))
81e84650 4493 return true;
1d53f09e 4494
b411b363
PR
4495 drbd_rs_complete_io(mdev, sector);
4496 dec_rs_pending(mdev);
4497
ea5442af
LE
4498 --mdev->ov_left;
4499
4500 /* let's advance progress step marks only for every other megabyte */
4501 if ((mdev->ov_left & 0x200) == 0x200)
4502 drbd_advance_rs_marks(mdev, mdev->ov_left);
4503
4504 if (mdev->ov_left == 0) {
b411b363
PR
4505 w = kmalloc(sizeof(*w), GFP_NOIO);
4506 if (w) {
4507 w->cb = w_ov_finished;
a21e9298 4508 w->mdev = mdev;
e42325a5 4509 drbd_queue_work_front(&mdev->tconn->data.work, w);
b411b363
PR
4510 } else {
4511 dev_err(DEV, "kmalloc(w) failed.");
4512 ov_oos_print(mdev);
4513 drbd_resync_finished(mdev);
4514 }
4515 }
1d53f09e 4516 put_ldev(mdev);
81e84650 4517 return true;
b411b363
PR
4518}
4519
d8763023 4520static int got_skip(struct drbd_conf *mdev, enum drbd_packet cmd)
0ced55a3 4521{
81e84650 4522 return true;
0ced55a3
PR
4523}
4524
b411b363
PR
4525struct asender_cmd {
4526 size_t pkt_size;
d8763023 4527 int (*process)(struct drbd_conf *mdev, enum drbd_packet cmd);
b411b363
PR
4528};
4529
4530static struct asender_cmd *get_asender_cmd(int cmd)
4531{
4532 static struct asender_cmd asender_tbl[] = {
4533 /* anything missing from this table is in
4534 * the drbd_cmd_handler (drbd_default_handler) table,
4535 * see the beginning of drbdd() */
257d0af6
PR
4536 [P_PING] = { sizeof(struct p_header), got_Ping },
4537 [P_PING_ACK] = { sizeof(struct p_header), got_PingAck },
b411b363
PR
4538 [P_RECV_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4539 [P_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4540 [P_RS_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4541 [P_DISCARD_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4542 [P_NEG_ACK] = { sizeof(struct p_block_ack), got_NegAck },
4543 [P_NEG_DREPLY] = { sizeof(struct p_block_ack), got_NegDReply },
4544 [P_NEG_RS_DREPLY] = { sizeof(struct p_block_ack), got_NegRSDReply},
4545 [P_OV_RESULT] = { sizeof(struct p_block_ack), got_OVResult },
4546 [P_BARRIER_ACK] = { sizeof(struct p_barrier_ack), got_BarrierAck },
4547 [P_STATE_CHG_REPLY] = { sizeof(struct p_req_state_reply), got_RqSReply },
4548 [P_RS_IS_IN_SYNC] = { sizeof(struct p_block_ack), got_IsInSync },
02918be2 4549 [P_DELAY_PROBE] = { sizeof(struct p_delay_probe93), got_skip },
d612d309 4550 [P_RS_CANCEL] = { sizeof(struct p_block_ack), got_NegRSDReply},
b411b363
PR
4551 [P_MAX_CMD] = { 0, NULL },
4552 };
4553 if (cmd > P_MAX_CMD || asender_tbl[cmd].process == NULL)
4554 return NULL;
4555 return &asender_tbl[cmd];
4556}
4557
4558int drbd_asender(struct drbd_thread *thi)
4559{
4560 struct drbd_conf *mdev = thi->mdev;
257d0af6 4561 struct p_header *h = &mdev->tconn->meta.rbuf.header;
b411b363 4562 struct asender_cmd *cmd = NULL;
77351055 4563 struct packet_info pi;
b411b363 4564
257d0af6 4565 int rv;
b411b363
PR
4566 void *buf = h;
4567 int received = 0;
257d0af6 4568 int expect = sizeof(struct p_header);
f36af18c 4569 int ping_timeout_active = 0;
77351055 4570 int empty;
b411b363 4571
b411b363
PR
4572 current->policy = SCHED_RR; /* Make this a realtime task! */
4573 current->rt_priority = 2; /* more important than all other tasks */
4574
e77a0a5c 4575 while (get_t_state(thi) == RUNNING) {
80822284 4576 drbd_thread_current_set_cpu(thi);
e43ef195 4577 if (test_and_clear_bit(SEND_PING, &mdev->tconn->flags)) {
841ce241
AG
4578 if (!drbd_send_ping(mdev)) {
4579 dev_err(DEV, "drbd_send_ping has failed\n");
4580 goto reconnect;
4581 }
e42325a5 4582 mdev->tconn->meta.socket->sk->sk_rcvtimeo =
89e58e75 4583 mdev->tconn->net_conf->ping_timeo*HZ/10;
f36af18c 4584 ping_timeout_active = 1;
b411b363
PR
4585 }
4586
4587 /* conditionally cork;
4588 * it may hurt latency if we cork without much to send */
89e58e75 4589 if (!mdev->tconn->net_conf->no_cork &&
b411b363 4590 3 < atomic_read(&mdev->unacked_cnt))
e42325a5 4591 drbd_tcp_cork(mdev->tconn->meta.socket);
b411b363 4592 while (1) {
808e37b8 4593 clear_bit(SIGNAL_ASENDER, &mdev->tconn->flags);
b411b363 4594 flush_signals(current);
0f8488e1 4595 if (!drbd_process_done_ee(mdev))
b411b363 4596 goto reconnect;
b411b363 4597 /* to avoid race with newly queued ACKs */
808e37b8 4598 set_bit(SIGNAL_ASENDER, &mdev->tconn->flags);
87eeee41 4599 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 4600 empty = list_empty(&mdev->done_ee);
87eeee41 4601 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
4602 /* new ack may have been queued right here,
4603 * but then there is also a signal pending,
4604 * and we start over... */
4605 if (empty)
4606 break;
4607 }
4608 /* but unconditionally uncork unless disabled */
89e58e75 4609 if (!mdev->tconn->net_conf->no_cork)
e42325a5 4610 drbd_tcp_uncork(mdev->tconn->meta.socket);
b411b363
PR
4611
4612 /* short circuit, recv_msg would return EINTR anyways. */
4613 if (signal_pending(current))
4614 continue;
4615
dbd9eea0 4616 rv = drbd_recv_short(mdev->tconn->meta.socket, buf, expect-received, 0);
808e37b8 4617 clear_bit(SIGNAL_ASENDER, &mdev->tconn->flags);
b411b363
PR
4618
4619 flush_signals(current);
4620
4621 /* Note:
4622 * -EINTR (on meta) we got a signal
4623 * -EAGAIN (on meta) rcvtimeo expired
4624 * -ECONNRESET other side closed the connection
4625 * -ERESTARTSYS (on data) we got a signal
4626 * rv < 0 other than above: unexpected error!
4627 * rv == expected: full header or command
4628 * rv < expected: "woken" by signal during receive
4629 * rv == 0 : "connection shut down by peer"
4630 */
4631 if (likely(rv > 0)) {
4632 received += rv;
4633 buf += rv;
4634 } else if (rv == 0) {
4635 dev_err(DEV, "meta connection shut down by peer.\n");
4636 goto reconnect;
4637 } else if (rv == -EAGAIN) {
cb6518cb
LE
4638 /* If the data socket received something meanwhile,
4639 * that is good enough: peer is still alive. */
31890f4a 4640 if (time_after(mdev->tconn->last_received,
e42325a5 4641 jiffies - mdev->tconn->meta.socket->sk->sk_rcvtimeo))
cb6518cb 4642 continue;
f36af18c 4643 if (ping_timeout_active) {
b411b363
PR
4644 dev_err(DEV, "PingAck did not arrive in time.\n");
4645 goto reconnect;
4646 }
e43ef195 4647 set_bit(SEND_PING, &mdev->tconn->flags);
b411b363
PR
4648 continue;
4649 } else if (rv == -EINTR) {
4650 continue;
4651 } else {
4652 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
4653 goto reconnect;
4654 }
4655
4656 if (received == expect && cmd == NULL) {
ce243853 4657 if (!decode_header(mdev->tconn, h, &pi))
b411b363 4658 goto reconnect;
77351055 4659 cmd = get_asender_cmd(pi.cmd);
b411b363 4660 if (unlikely(cmd == NULL)) {
257d0af6 4661 dev_err(DEV, "unknown command %d on meta (l: %d)\n",
77351055 4662 pi.cmd, pi.size);
b411b363
PR
4663 goto disconnect;
4664 }
4665 expect = cmd->pkt_size;
77351055 4666 if (pi.size != expect - sizeof(struct p_header)) {
257d0af6 4667 dev_err(DEV, "Wrong packet size on meta (c: %d, l: %d)\n",
77351055 4668 pi.cmd, pi.size);
b411b363 4669 goto reconnect;
257d0af6 4670 }
b411b363
PR
4671 }
4672 if (received == expect) {
31890f4a 4673 mdev->tconn->last_received = jiffies;
b411b363 4674 D_ASSERT(cmd != NULL);
77351055 4675 if (!cmd->process(mdev, pi.cmd))
b411b363
PR
4676 goto reconnect;
4677
f36af18c
LE
4678 /* the idle_timeout (ping-int)
4679 * has been restored in got_PingAck() */
4680 if (cmd == get_asender_cmd(P_PING_ACK))
4681 ping_timeout_active = 0;
4682
b411b363
PR
4683 buf = h;
4684 received = 0;
257d0af6 4685 expect = sizeof(struct p_header);
b411b363
PR
4686 cmd = NULL;
4687 }
4688 }
4689
4690 if (0) {
4691reconnect:
4692 drbd_force_state(mdev, NS(conn, C_NETWORK_FAILURE));
856c50c7 4693 drbd_md_sync(mdev);
b411b363
PR
4694 }
4695 if (0) {
4696disconnect:
4697 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
856c50c7 4698 drbd_md_sync(mdev);
b411b363 4699 }
808e37b8 4700 clear_bit(SIGNAL_ASENDER, &mdev->tconn->flags);
b411b363
PR
4701
4702 D_ASSERT(mdev->state.conn < C_CONNECTED);
4703 dev_info(DEV, "asender terminated\n");
4704
4705 return 0;
4706}