]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/block/drbd/drbd_receiver.c
drbd: Ensure that an epoch contains only requests of one kind
[mirror_ubuntu-artful-kernel.git] / drivers / block / drbd / drbd_receiver.c
CommitLineData
b411b363
PR
1/*
2 drbd_receiver.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23 */
24
25
b411b363
PR
26#include <linux/module.h>
27
28#include <asm/uaccess.h>
29#include <net/sock.h>
30
b411b363
PR
31#include <linux/drbd.h>
32#include <linux/fs.h>
33#include <linux/file.h>
34#include <linux/in.h>
35#include <linux/mm.h>
36#include <linux/memcontrol.h>
37#include <linux/mm_inline.h>
38#include <linux/slab.h>
b411b363
PR
39#include <linux/pkt_sched.h>
40#define __KERNEL_SYSCALLS__
41#include <linux/unistd.h>
42#include <linux/vmalloc.h>
43#include <linux/random.h>
b411b363
PR
44#include <linux/string.h>
45#include <linux/scatterlist.h>
46#include "drbd_int.h"
b411b363
PR
47#include "drbd_req.h"
48
49#include "drbd_vli.h"
50
b411b363
PR
51enum finish_epoch {
52 FE_STILL_LIVE,
53 FE_DESTROYED,
54 FE_RECYCLED,
55};
56
57static int drbd_do_handshake(struct drbd_conf *mdev);
58static int drbd_do_auth(struct drbd_conf *mdev);
59
60static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *, struct drbd_epoch *, enum epoch_event);
61static int e_end_block(struct drbd_conf *, struct drbd_work *, int);
62
b411b363
PR
63
64#define GFP_TRY (__GFP_HIGHMEM | __GFP_NOWARN)
65
45bb912b
LE
66/*
67 * some helper functions to deal with single linked page lists,
68 * page->private being our "next" pointer.
69 */
70
71/* If at least n pages are linked at head, get n pages off.
72 * Otherwise, don't modify head, and return NULL.
73 * Locking is the responsibility of the caller.
74 */
75static struct page *page_chain_del(struct page **head, int n)
76{
77 struct page *page;
78 struct page *tmp;
79
80 BUG_ON(!n);
81 BUG_ON(!head);
82
83 page = *head;
23ce4227
PR
84
85 if (!page)
86 return NULL;
87
45bb912b
LE
88 while (page) {
89 tmp = page_chain_next(page);
90 if (--n == 0)
91 break; /* found sufficient pages */
92 if (tmp == NULL)
93 /* insufficient pages, don't use any of them. */
94 return NULL;
95 page = tmp;
96 }
97
98 /* add end of list marker for the returned list */
99 set_page_private(page, 0);
100 /* actual return value, and adjustment of head */
101 page = *head;
102 *head = tmp;
103 return page;
104}
105
106/* may be used outside of locks to find the tail of a (usually short)
107 * "private" page chain, before adding it back to a global chain head
108 * with page_chain_add() under a spinlock. */
109static struct page *page_chain_tail(struct page *page, int *len)
110{
111 struct page *tmp;
112 int i = 1;
113 while ((tmp = page_chain_next(page)))
114 ++i, page = tmp;
115 if (len)
116 *len = i;
117 return page;
118}
119
120static int page_chain_free(struct page *page)
121{
122 struct page *tmp;
123 int i = 0;
124 page_chain_for_each_safe(page, tmp) {
125 put_page(page);
126 ++i;
127 }
128 return i;
129}
130
131static void page_chain_add(struct page **head,
132 struct page *chain_first, struct page *chain_last)
133{
134#if 1
135 struct page *tmp;
136 tmp = page_chain_tail(chain_first, NULL);
137 BUG_ON(tmp != chain_last);
138#endif
139
140 /* add chain to head */
141 set_page_private(chain_last, (unsigned long)*head);
142 *head = chain_first;
143}
144
145static struct page *drbd_pp_first_pages_or_try_alloc(struct drbd_conf *mdev, int number)
b411b363
PR
146{
147 struct page *page = NULL;
45bb912b
LE
148 struct page *tmp = NULL;
149 int i = 0;
b411b363
PR
150
151 /* Yes, testing drbd_pp_vacant outside the lock is racy.
152 * So what. It saves a spin_lock. */
45bb912b 153 if (drbd_pp_vacant >= number) {
b411b363 154 spin_lock(&drbd_pp_lock);
45bb912b
LE
155 page = page_chain_del(&drbd_pp_pool, number);
156 if (page)
157 drbd_pp_vacant -= number;
b411b363 158 spin_unlock(&drbd_pp_lock);
45bb912b
LE
159 if (page)
160 return page;
b411b363 161 }
45bb912b 162
b411b363
PR
163 /* GFP_TRY, because we must not cause arbitrary write-out: in a DRBD
164 * "criss-cross" setup, that might cause write-out on some other DRBD,
165 * which in turn might block on the other node at this very place. */
45bb912b
LE
166 for (i = 0; i < number; i++) {
167 tmp = alloc_page(GFP_TRY);
168 if (!tmp)
169 break;
170 set_page_private(tmp, (unsigned long)page);
171 page = tmp;
172 }
173
174 if (i == number)
175 return page;
176
177 /* Not enough pages immediately available this time.
178 * No need to jump around here, drbd_pp_alloc will retry this
179 * function "soon". */
180 if (page) {
181 tmp = page_chain_tail(page, NULL);
182 spin_lock(&drbd_pp_lock);
183 page_chain_add(&drbd_pp_pool, page, tmp);
184 drbd_pp_vacant += i;
185 spin_unlock(&drbd_pp_lock);
186 }
187 return NULL;
b411b363
PR
188}
189
b411b363
PR
190static void reclaim_net_ee(struct drbd_conf *mdev, struct list_head *to_be_freed)
191{
192 struct drbd_epoch_entry *e;
193 struct list_head *le, *tle;
194
195 /* The EEs are always appended to the end of the list. Since
196 they are sent in order over the wire, they have to finish
197 in order. As soon as we see the first not finished we can
198 stop to examine the list... */
199
200 list_for_each_safe(le, tle, &mdev->net_ee) {
201 e = list_entry(le, struct drbd_epoch_entry, w.list);
45bb912b 202 if (drbd_ee_has_active_page(e))
b411b363
PR
203 break;
204 list_move(le, to_be_freed);
205 }
206}
207
208static void drbd_kick_lo_and_reclaim_net(struct drbd_conf *mdev)
209{
210 LIST_HEAD(reclaimed);
211 struct drbd_epoch_entry *e, *t;
212
b411b363
PR
213 spin_lock_irq(&mdev->req_lock);
214 reclaim_net_ee(mdev, &reclaimed);
215 spin_unlock_irq(&mdev->req_lock);
216
217 list_for_each_entry_safe(e, t, &reclaimed, w.list)
435f0740 218 drbd_free_net_ee(mdev, e);
b411b363
PR
219}
220
221/**
45bb912b 222 * drbd_pp_alloc() - Returns @number pages, retries forever (or until signalled)
b411b363 223 * @mdev: DRBD device.
45bb912b
LE
224 * @number: number of pages requested
225 * @retry: whether to retry, if not enough pages are available right now
226 *
227 * Tries to allocate number pages, first from our own page pool, then from
228 * the kernel, unless this allocation would exceed the max_buffers setting.
229 * Possibly retry until DRBD frees sufficient pages somewhere else.
b411b363 230 *
45bb912b 231 * Returns a page chain linked via page->private.
b411b363 232 */
45bb912b 233static struct page *drbd_pp_alloc(struct drbd_conf *mdev, unsigned number, bool retry)
b411b363
PR
234{
235 struct page *page = NULL;
236 DEFINE_WAIT(wait);
237
45bb912b
LE
238 /* Yes, we may run up to @number over max_buffers. If we
239 * follow it strictly, the admin will get it wrong anyways. */
240 if (atomic_read(&mdev->pp_in_use) < mdev->net_conf->max_buffers)
241 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363 242
45bb912b 243 while (page == NULL) {
b411b363
PR
244 prepare_to_wait(&drbd_pp_wait, &wait, TASK_INTERRUPTIBLE);
245
246 drbd_kick_lo_and_reclaim_net(mdev);
247
248 if (atomic_read(&mdev->pp_in_use) < mdev->net_conf->max_buffers) {
45bb912b 249 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363
PR
250 if (page)
251 break;
252 }
253
254 if (!retry)
255 break;
256
257 if (signal_pending(current)) {
258 dev_warn(DEV, "drbd_pp_alloc interrupted!\n");
259 break;
260 }
261
262 schedule();
263 }
264 finish_wait(&drbd_pp_wait, &wait);
265
45bb912b
LE
266 if (page)
267 atomic_add(number, &mdev->pp_in_use);
b411b363
PR
268 return page;
269}
270
271/* Must not be used from irq, as that may deadlock: see drbd_pp_alloc.
45bb912b
LE
272 * Is also used from inside an other spin_lock_irq(&mdev->req_lock);
273 * Either links the page chain back to the global pool,
274 * or returns all pages to the system. */
435f0740 275static void drbd_pp_free(struct drbd_conf *mdev, struct page *page, int is_net)
b411b363 276{
435f0740 277 atomic_t *a = is_net ? &mdev->pp_in_use_by_net : &mdev->pp_in_use;
b411b363 278 int i;
435f0740 279
1816a2b4 280 if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE)*minor_count)
45bb912b
LE
281 i = page_chain_free(page);
282 else {
283 struct page *tmp;
284 tmp = page_chain_tail(page, &i);
285 spin_lock(&drbd_pp_lock);
286 page_chain_add(&drbd_pp_pool, page, tmp);
287 drbd_pp_vacant += i;
288 spin_unlock(&drbd_pp_lock);
b411b363 289 }
435f0740 290 i = atomic_sub_return(i, a);
45bb912b 291 if (i < 0)
435f0740
LE
292 dev_warn(DEV, "ASSERTION FAILED: %s: %d < 0\n",
293 is_net ? "pp_in_use_by_net" : "pp_in_use", i);
b411b363
PR
294 wake_up(&drbd_pp_wait);
295}
296
297/*
298You need to hold the req_lock:
299 _drbd_wait_ee_list_empty()
300
301You must not have the req_lock:
302 drbd_free_ee()
303 drbd_alloc_ee()
304 drbd_init_ee()
305 drbd_release_ee()
306 drbd_ee_fix_bhs()
307 drbd_process_done_ee()
308 drbd_clear_done_ee()
309 drbd_wait_ee_list_empty()
310*/
311
312struct drbd_epoch_entry *drbd_alloc_ee(struct drbd_conf *mdev,
313 u64 id,
314 sector_t sector,
315 unsigned int data_size,
316 gfp_t gfp_mask) __must_hold(local)
317{
b411b363
PR
318 struct drbd_epoch_entry *e;
319 struct page *page;
45bb912b 320 unsigned nr_pages = (data_size + PAGE_SIZE -1) >> PAGE_SHIFT;
b411b363 321
0cf9d27e 322 if (drbd_insert_fault(mdev, DRBD_FAULT_AL_EE))
b411b363
PR
323 return NULL;
324
325 e = mempool_alloc(drbd_ee_mempool, gfp_mask & ~__GFP_HIGHMEM);
326 if (!e) {
327 if (!(gfp_mask & __GFP_NOWARN))
328 dev_err(DEV, "alloc_ee: Allocation of an EE failed\n");
329 return NULL;
330 }
331
45bb912b
LE
332 page = drbd_pp_alloc(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
333 if (!page)
334 goto fail;
b411b363 335
b411b363
PR
336 INIT_HLIST_NODE(&e->colision);
337 e->epoch = NULL;
45bb912b
LE
338 e->mdev = mdev;
339 e->pages = page;
340 atomic_set(&e->pending_bios, 0);
341 e->size = data_size;
b411b363 342 e->flags = 0;
45bb912b 343 e->sector = sector;
45bb912b 344 e->block_id = id;
b411b363 345
b411b363
PR
346 return e;
347
45bb912b 348 fail:
b411b363 349 mempool_free(e, drbd_ee_mempool);
b411b363
PR
350 return NULL;
351}
352
435f0740 353void drbd_free_some_ee(struct drbd_conf *mdev, struct drbd_epoch_entry *e, int is_net)
b411b363 354{
c36c3ced
LE
355 if (e->flags & EE_HAS_DIGEST)
356 kfree(e->digest);
435f0740 357 drbd_pp_free(mdev, e->pages, is_net);
45bb912b 358 D_ASSERT(atomic_read(&e->pending_bios) == 0);
b411b363
PR
359 D_ASSERT(hlist_unhashed(&e->colision));
360 mempool_free(e, drbd_ee_mempool);
361}
362
363int drbd_release_ee(struct drbd_conf *mdev, struct list_head *list)
364{
365 LIST_HEAD(work_list);
366 struct drbd_epoch_entry *e, *t;
367 int count = 0;
435f0740 368 int is_net = list == &mdev->net_ee;
b411b363
PR
369
370 spin_lock_irq(&mdev->req_lock);
371 list_splice_init(list, &work_list);
372 spin_unlock_irq(&mdev->req_lock);
373
374 list_for_each_entry_safe(e, t, &work_list, w.list) {
435f0740 375 drbd_free_some_ee(mdev, e, is_net);
b411b363
PR
376 count++;
377 }
378 return count;
379}
380
381
382/*
383 * This function is called from _asender only_
384 * but see also comments in _req_mod(,barrier_acked)
385 * and receive_Barrier.
386 *
387 * Move entries from net_ee to done_ee, if ready.
388 * Grab done_ee, call all callbacks, free the entries.
389 * The callbacks typically send out ACKs.
390 */
391static int drbd_process_done_ee(struct drbd_conf *mdev)
392{
393 LIST_HEAD(work_list);
394 LIST_HEAD(reclaimed);
395 struct drbd_epoch_entry *e, *t;
396 int ok = (mdev->state.conn >= C_WF_REPORT_PARAMS);
397
398 spin_lock_irq(&mdev->req_lock);
399 reclaim_net_ee(mdev, &reclaimed);
400 list_splice_init(&mdev->done_ee, &work_list);
401 spin_unlock_irq(&mdev->req_lock);
402
403 list_for_each_entry_safe(e, t, &reclaimed, w.list)
435f0740 404 drbd_free_net_ee(mdev, e);
b411b363
PR
405
406 /* possible callbacks here:
407 * e_end_block, and e_end_resync_block, e_send_discard_ack.
408 * all ignore the last argument.
409 */
410 list_for_each_entry_safe(e, t, &work_list, w.list) {
b411b363
PR
411 /* list_del not necessary, next/prev members not touched */
412 ok = e->w.cb(mdev, &e->w, !ok) && ok;
413 drbd_free_ee(mdev, e);
414 }
415 wake_up(&mdev->ee_wait);
416
417 return ok;
418}
419
420void _drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
421{
422 DEFINE_WAIT(wait);
423
424 /* avoids spin_lock/unlock
425 * and calling prepare_to_wait in the fast path */
426 while (!list_empty(head)) {
427 prepare_to_wait(&mdev->ee_wait, &wait, TASK_UNINTERRUPTIBLE);
428 spin_unlock_irq(&mdev->req_lock);
7eaceacc 429 io_schedule();
b411b363
PR
430 finish_wait(&mdev->ee_wait, &wait);
431 spin_lock_irq(&mdev->req_lock);
432 }
433}
434
435void drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
436{
437 spin_lock_irq(&mdev->req_lock);
438 _drbd_wait_ee_list_empty(mdev, head);
439 spin_unlock_irq(&mdev->req_lock);
440}
441
442/* see also kernel_accept; which is only present since 2.6.18.
443 * also we want to log which part of it failed, exactly */
444static int drbd_accept(struct drbd_conf *mdev, const char **what,
445 struct socket *sock, struct socket **newsock)
446{
447 struct sock *sk = sock->sk;
448 int err = 0;
449
450 *what = "listen";
451 err = sock->ops->listen(sock, 5);
452 if (err < 0)
453 goto out;
454
455 *what = "sock_create_lite";
456 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
457 newsock);
458 if (err < 0)
459 goto out;
460
461 *what = "accept";
462 err = sock->ops->accept(sock, *newsock, 0);
463 if (err < 0) {
464 sock_release(*newsock);
465 *newsock = NULL;
466 goto out;
467 }
468 (*newsock)->ops = sock->ops;
469
470out:
471 return err;
472}
473
474static int drbd_recv_short(struct drbd_conf *mdev, struct socket *sock,
475 void *buf, size_t size, int flags)
476{
477 mm_segment_t oldfs;
478 struct kvec iov = {
479 .iov_base = buf,
480 .iov_len = size,
481 };
482 struct msghdr msg = {
483 .msg_iovlen = 1,
484 .msg_iov = (struct iovec *)&iov,
485 .msg_flags = (flags ? flags : MSG_WAITALL | MSG_NOSIGNAL)
486 };
487 int rv;
488
489 oldfs = get_fs();
490 set_fs(KERNEL_DS);
491 rv = sock_recvmsg(sock, &msg, size, msg.msg_flags);
492 set_fs(oldfs);
493
494 return rv;
495}
496
497static int drbd_recv(struct drbd_conf *mdev, void *buf, size_t size)
498{
499 mm_segment_t oldfs;
500 struct kvec iov = {
501 .iov_base = buf,
502 .iov_len = size,
503 };
504 struct msghdr msg = {
505 .msg_iovlen = 1,
506 .msg_iov = (struct iovec *)&iov,
507 .msg_flags = MSG_WAITALL | MSG_NOSIGNAL
508 };
509 int rv;
510
511 oldfs = get_fs();
512 set_fs(KERNEL_DS);
513
514 for (;;) {
515 rv = sock_recvmsg(mdev->data.socket, &msg, size, msg.msg_flags);
516 if (rv == size)
517 break;
518
519 /* Note:
520 * ECONNRESET other side closed the connection
521 * ERESTARTSYS (on sock) we got a signal
522 */
523
524 if (rv < 0) {
525 if (rv == -ECONNRESET)
526 dev_info(DEV, "sock was reset by peer\n");
527 else if (rv != -ERESTARTSYS)
528 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
529 break;
530 } else if (rv == 0) {
531 dev_info(DEV, "sock was shut down by peer\n");
532 break;
533 } else {
534 /* signal came in, or peer/link went down,
535 * after we read a partial message
536 */
537 /* D_ASSERT(signal_pending(current)); */
538 break;
539 }
540 };
541
542 set_fs(oldfs);
543
544 if (rv != size)
545 drbd_force_state(mdev, NS(conn, C_BROKEN_PIPE));
546
547 return rv;
548}
549
5dbf1673
LE
550/* quoting tcp(7):
551 * On individual connections, the socket buffer size must be set prior to the
552 * listen(2) or connect(2) calls in order to have it take effect.
553 * This is our wrapper to do so.
554 */
555static void drbd_setbufsize(struct socket *sock, unsigned int snd,
556 unsigned int rcv)
557{
558 /* open coded SO_SNDBUF, SO_RCVBUF */
559 if (snd) {
560 sock->sk->sk_sndbuf = snd;
561 sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
562 }
563 if (rcv) {
564 sock->sk->sk_rcvbuf = rcv;
565 sock->sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
566 }
567}
568
b411b363
PR
569static struct socket *drbd_try_connect(struct drbd_conf *mdev)
570{
571 const char *what;
572 struct socket *sock;
573 struct sockaddr_in6 src_in6;
574 int err;
575 int disconnect_on_error = 1;
576
577 if (!get_net_conf(mdev))
578 return NULL;
579
580 what = "sock_create_kern";
581 err = sock_create_kern(((struct sockaddr *)mdev->net_conf->my_addr)->sa_family,
582 SOCK_STREAM, IPPROTO_TCP, &sock);
583 if (err < 0) {
584 sock = NULL;
585 goto out;
586 }
587
588 sock->sk->sk_rcvtimeo =
589 sock->sk->sk_sndtimeo = mdev->net_conf->try_connect_int*HZ;
5dbf1673
LE
590 drbd_setbufsize(sock, mdev->net_conf->sndbuf_size,
591 mdev->net_conf->rcvbuf_size);
b411b363
PR
592
593 /* explicitly bind to the configured IP as source IP
594 * for the outgoing connections.
595 * This is needed for multihomed hosts and to be
596 * able to use lo: interfaces for drbd.
597 * Make sure to use 0 as port number, so linux selects
598 * a free one dynamically.
599 */
600 memcpy(&src_in6, mdev->net_conf->my_addr,
601 min_t(int, mdev->net_conf->my_addr_len, sizeof(src_in6)));
602 if (((struct sockaddr *)mdev->net_conf->my_addr)->sa_family == AF_INET6)
603 src_in6.sin6_port = 0;
604 else
605 ((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
606
607 what = "bind before connect";
608 err = sock->ops->bind(sock,
609 (struct sockaddr *) &src_in6,
610 mdev->net_conf->my_addr_len);
611 if (err < 0)
612 goto out;
613
614 /* connect may fail, peer not yet available.
615 * stay C_WF_CONNECTION, don't go Disconnecting! */
616 disconnect_on_error = 0;
617 what = "connect";
618 err = sock->ops->connect(sock,
619 (struct sockaddr *)mdev->net_conf->peer_addr,
620 mdev->net_conf->peer_addr_len, 0);
621
622out:
623 if (err < 0) {
624 if (sock) {
625 sock_release(sock);
626 sock = NULL;
627 }
628 switch (-err) {
629 /* timeout, busy, signal pending */
630 case ETIMEDOUT: case EAGAIN: case EINPROGRESS:
631 case EINTR: case ERESTARTSYS:
632 /* peer not (yet) available, network problem */
633 case ECONNREFUSED: case ENETUNREACH:
634 case EHOSTDOWN: case EHOSTUNREACH:
635 disconnect_on_error = 0;
636 break;
637 default:
638 dev_err(DEV, "%s failed, err = %d\n", what, err);
639 }
640 if (disconnect_on_error)
641 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
642 }
643 put_net_conf(mdev);
644 return sock;
645}
646
647static struct socket *drbd_wait_for_connect(struct drbd_conf *mdev)
648{
649 int timeo, err;
650 struct socket *s_estab = NULL, *s_listen;
651 const char *what;
652
653 if (!get_net_conf(mdev))
654 return NULL;
655
656 what = "sock_create_kern";
657 err = sock_create_kern(((struct sockaddr *)mdev->net_conf->my_addr)->sa_family,
658 SOCK_STREAM, IPPROTO_TCP, &s_listen);
659 if (err) {
660 s_listen = NULL;
661 goto out;
662 }
663
664 timeo = mdev->net_conf->try_connect_int * HZ;
665 timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
666
667 s_listen->sk->sk_reuse = 1; /* SO_REUSEADDR */
668 s_listen->sk->sk_rcvtimeo = timeo;
669 s_listen->sk->sk_sndtimeo = timeo;
5dbf1673
LE
670 drbd_setbufsize(s_listen, mdev->net_conf->sndbuf_size,
671 mdev->net_conf->rcvbuf_size);
b411b363
PR
672
673 what = "bind before listen";
674 err = s_listen->ops->bind(s_listen,
675 (struct sockaddr *) mdev->net_conf->my_addr,
676 mdev->net_conf->my_addr_len);
677 if (err < 0)
678 goto out;
679
680 err = drbd_accept(mdev, &what, s_listen, &s_estab);
681
682out:
683 if (s_listen)
684 sock_release(s_listen);
685 if (err < 0) {
686 if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
687 dev_err(DEV, "%s failed, err = %d\n", what, err);
688 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
689 }
690 }
691 put_net_conf(mdev);
692
693 return s_estab;
694}
695
696static int drbd_send_fp(struct drbd_conf *mdev,
697 struct socket *sock, enum drbd_packets cmd)
698{
02918be2 699 struct p_header80 *h = &mdev->data.sbuf.header.h80;
b411b363
PR
700
701 return _drbd_send_cmd(mdev, sock, cmd, h, sizeof(*h), 0);
702}
703
704static enum drbd_packets drbd_recv_fp(struct drbd_conf *mdev, struct socket *sock)
705{
02918be2 706 struct p_header80 *h = &mdev->data.rbuf.header.h80;
b411b363
PR
707 int rr;
708
709 rr = drbd_recv_short(mdev, sock, h, sizeof(*h), 0);
710
711 if (rr == sizeof(*h) && h->magic == BE_DRBD_MAGIC)
712 return be16_to_cpu(h->command);
713
714 return 0xffff;
715}
716
717/**
718 * drbd_socket_okay() - Free the socket if its connection is not okay
719 * @mdev: DRBD device.
720 * @sock: pointer to the pointer to the socket.
721 */
722static int drbd_socket_okay(struct drbd_conf *mdev, struct socket **sock)
723{
724 int rr;
725 char tb[4];
726
727 if (!*sock)
81e84650 728 return false;
b411b363
PR
729
730 rr = drbd_recv_short(mdev, *sock, tb, 4, MSG_DONTWAIT | MSG_PEEK);
731
732 if (rr > 0 || rr == -EAGAIN) {
81e84650 733 return true;
b411b363
PR
734 } else {
735 sock_release(*sock);
736 *sock = NULL;
81e84650 737 return false;
b411b363
PR
738 }
739}
740
741/*
742 * return values:
743 * 1 yes, we have a valid connection
744 * 0 oops, did not work out, please try again
745 * -1 peer talks different language,
746 * no point in trying again, please go standalone.
747 * -2 We do not have a network config...
748 */
749static int drbd_connect(struct drbd_conf *mdev)
750{
751 struct socket *s, *sock, *msock;
752 int try, h, ok;
753
754 D_ASSERT(!mdev->data.socket);
755
b411b363
PR
756 if (drbd_request_state(mdev, NS(conn, C_WF_CONNECTION)) < SS_SUCCESS)
757 return -2;
758
759 clear_bit(DISCARD_CONCURRENT, &mdev->flags);
760
761 sock = NULL;
762 msock = NULL;
763
764 do {
765 for (try = 0;;) {
766 /* 3 tries, this should take less than a second! */
767 s = drbd_try_connect(mdev);
768 if (s || ++try >= 3)
769 break;
770 /* give the other side time to call bind() & listen() */
771 __set_current_state(TASK_INTERRUPTIBLE);
772 schedule_timeout(HZ / 10);
773 }
774
775 if (s) {
776 if (!sock) {
777 drbd_send_fp(mdev, s, P_HAND_SHAKE_S);
778 sock = s;
779 s = NULL;
780 } else if (!msock) {
781 drbd_send_fp(mdev, s, P_HAND_SHAKE_M);
782 msock = s;
783 s = NULL;
784 } else {
785 dev_err(DEV, "Logic error in drbd_connect()\n");
786 goto out_release_sockets;
787 }
788 }
789
790 if (sock && msock) {
791 __set_current_state(TASK_INTERRUPTIBLE);
792 schedule_timeout(HZ / 10);
793 ok = drbd_socket_okay(mdev, &sock);
794 ok = drbd_socket_okay(mdev, &msock) && ok;
795 if (ok)
796 break;
797 }
798
799retry:
800 s = drbd_wait_for_connect(mdev);
801 if (s) {
802 try = drbd_recv_fp(mdev, s);
803 drbd_socket_okay(mdev, &sock);
804 drbd_socket_okay(mdev, &msock);
805 switch (try) {
806 case P_HAND_SHAKE_S:
807 if (sock) {
808 dev_warn(DEV, "initial packet S crossed\n");
809 sock_release(sock);
810 }
811 sock = s;
812 break;
813 case P_HAND_SHAKE_M:
814 if (msock) {
815 dev_warn(DEV, "initial packet M crossed\n");
816 sock_release(msock);
817 }
818 msock = s;
819 set_bit(DISCARD_CONCURRENT, &mdev->flags);
820 break;
821 default:
822 dev_warn(DEV, "Error receiving initial packet\n");
823 sock_release(s);
824 if (random32() & 1)
825 goto retry;
826 }
827 }
828
829 if (mdev->state.conn <= C_DISCONNECTING)
830 goto out_release_sockets;
831 if (signal_pending(current)) {
832 flush_signals(current);
833 smp_rmb();
834 if (get_t_state(&mdev->receiver) == Exiting)
835 goto out_release_sockets;
836 }
837
838 if (sock && msock) {
839 ok = drbd_socket_okay(mdev, &sock);
840 ok = drbd_socket_okay(mdev, &msock) && ok;
841 if (ok)
842 break;
843 }
844 } while (1);
845
846 msock->sk->sk_reuse = 1; /* SO_REUSEADDR */
847 sock->sk->sk_reuse = 1; /* SO_REUSEADDR */
848
849 sock->sk->sk_allocation = GFP_NOIO;
850 msock->sk->sk_allocation = GFP_NOIO;
851
852 sock->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
853 msock->sk->sk_priority = TC_PRIO_INTERACTIVE;
854
b411b363
PR
855 /* NOT YET ...
856 * sock->sk->sk_sndtimeo = mdev->net_conf->timeout*HZ/10;
857 * sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
858 * first set it to the P_HAND_SHAKE timeout,
859 * which we set to 4x the configured ping_timeout. */
860 sock->sk->sk_sndtimeo =
861 sock->sk->sk_rcvtimeo = mdev->net_conf->ping_timeo*4*HZ/10;
862
863 msock->sk->sk_sndtimeo = mdev->net_conf->timeout*HZ/10;
864 msock->sk->sk_rcvtimeo = mdev->net_conf->ping_int*HZ;
865
866 /* we don't want delays.
867 * we use TCP_CORK where apropriate, though */
868 drbd_tcp_nodelay(sock);
869 drbd_tcp_nodelay(msock);
870
871 mdev->data.socket = sock;
872 mdev->meta.socket = msock;
873 mdev->last_received = jiffies;
874
875 D_ASSERT(mdev->asender.task == NULL);
876
877 h = drbd_do_handshake(mdev);
878 if (h <= 0)
879 return h;
880
881 if (mdev->cram_hmac_tfm) {
882 /* drbd_request_state(mdev, NS(conn, WFAuth)); */
b10d96cb
JT
883 switch (drbd_do_auth(mdev)) {
884 case -1:
b411b363
PR
885 dev_err(DEV, "Authentication of peer failed\n");
886 return -1;
b10d96cb
JT
887 case 0:
888 dev_err(DEV, "Authentication of peer failed, trying again.\n");
889 return 0;
b411b363
PR
890 }
891 }
892
893 if (drbd_request_state(mdev, NS(conn, C_WF_REPORT_PARAMS)) < SS_SUCCESS)
894 return 0;
895
896 sock->sk->sk_sndtimeo = mdev->net_conf->timeout*HZ/10;
897 sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
898
899 atomic_set(&mdev->packet_seq, 0);
900 mdev->peer_seq = 0;
901
902 drbd_thread_start(&mdev->asender);
903
d5373389
PR
904 if (mdev->agreed_pro_version < 95 && get_ldev(mdev)) {
905 drbd_setup_queue_param(mdev, DRBD_MAX_SIZE_H80_PACKET);
906 put_ldev(mdev);
907 }
908
148efa16 909 if (drbd_send_protocol(mdev) == -1)
7e2455c1 910 return -1;
b411b363 911 drbd_send_sync_param(mdev, &mdev->sync_conf);
e89b591c 912 drbd_send_sizes(mdev, 0, 0);
b411b363
PR
913 drbd_send_uuids(mdev);
914 drbd_send_state(mdev);
915 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
916 clear_bit(RESIZE_PENDING, &mdev->flags);
917
918 return 1;
919
920out_release_sockets:
921 if (sock)
922 sock_release(sock);
923 if (msock)
924 sock_release(msock);
925 return -1;
926}
927
02918be2 928static int drbd_recv_header(struct drbd_conf *mdev, enum drbd_packets *cmd, unsigned int *packet_size)
b411b363 929{
02918be2 930 union p_header *h = &mdev->data.rbuf.header;
b411b363
PR
931 int r;
932
933 r = drbd_recv(mdev, h, sizeof(*h));
b411b363
PR
934 if (unlikely(r != sizeof(*h))) {
935 dev_err(DEV, "short read expecting header on sock: r=%d\n", r);
81e84650 936 return false;
02918be2
PR
937 }
938
939 if (likely(h->h80.magic == BE_DRBD_MAGIC)) {
940 *cmd = be16_to_cpu(h->h80.command);
941 *packet_size = be16_to_cpu(h->h80.length);
942 } else if (h->h95.magic == BE_DRBD_MAGIC_BIG) {
943 *cmd = be16_to_cpu(h->h95.command);
944 *packet_size = be32_to_cpu(h->h95.length);
945 } else {
004352fa
LE
946 dev_err(DEV, "magic?? on data m: 0x%08x c: %d l: %d\n",
947 be32_to_cpu(h->h80.magic),
948 be16_to_cpu(h->h80.command),
949 be16_to_cpu(h->h80.length));
81e84650 950 return false;
b411b363
PR
951 }
952 mdev->last_received = jiffies;
953
81e84650 954 return true;
b411b363
PR
955}
956
2451fc3b 957static void drbd_flush(struct drbd_conf *mdev)
b411b363
PR
958{
959 int rv;
960
961 if (mdev->write_ordering >= WO_bdev_flush && get_ldev(mdev)) {
fbd9b09a 962 rv = blkdev_issue_flush(mdev->ldev->backing_bdev, GFP_KERNEL,
dd3932ed 963 NULL);
b411b363
PR
964 if (rv) {
965 dev_err(DEV, "local disk flush failed with status %d\n", rv);
966 /* would rather check on EOPNOTSUPP, but that is not reliable.
967 * don't try again for ANY return value != 0
968 * if (rv == -EOPNOTSUPP) */
969 drbd_bump_write_ordering(mdev, WO_drain_io);
970 }
971 put_ldev(mdev);
972 }
b411b363
PR
973}
974
975/**
976 * drbd_may_finish_epoch() - Applies an epoch_event to the epoch's state, eventually finishes it.
977 * @mdev: DRBD device.
978 * @epoch: Epoch object.
979 * @ev: Epoch event.
980 */
981static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
982 struct drbd_epoch *epoch,
983 enum epoch_event ev)
984{
2451fc3b 985 int epoch_size;
b411b363 986 struct drbd_epoch *next_epoch;
b411b363
PR
987 enum finish_epoch rv = FE_STILL_LIVE;
988
989 spin_lock(&mdev->epoch_lock);
990 do {
991 next_epoch = NULL;
b411b363
PR
992
993 epoch_size = atomic_read(&epoch->epoch_size);
994
995 switch (ev & ~EV_CLEANUP) {
996 case EV_PUT:
997 atomic_dec(&epoch->active);
998 break;
999 case EV_GOT_BARRIER_NR:
1000 set_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags);
b411b363
PR
1001 break;
1002 case EV_BECAME_LAST:
1003 /* nothing to do*/
1004 break;
1005 }
1006
b411b363
PR
1007 if (epoch_size != 0 &&
1008 atomic_read(&epoch->active) == 0 &&
2451fc3b 1009 test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags)) {
b411b363
PR
1010 if (!(ev & EV_CLEANUP)) {
1011 spin_unlock(&mdev->epoch_lock);
1012 drbd_send_b_ack(mdev, epoch->barrier_nr, epoch_size);
1013 spin_lock(&mdev->epoch_lock);
1014 }
1015 dec_unacked(mdev);
1016
1017 if (mdev->current_epoch != epoch) {
1018 next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
1019 list_del(&epoch->list);
1020 ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
1021 mdev->epochs--;
b411b363
PR
1022 kfree(epoch);
1023
1024 if (rv == FE_STILL_LIVE)
1025 rv = FE_DESTROYED;
1026 } else {
1027 epoch->flags = 0;
1028 atomic_set(&epoch->epoch_size, 0);
698f9315 1029 /* atomic_set(&epoch->active, 0); is already zero */
b411b363
PR
1030 if (rv == FE_STILL_LIVE)
1031 rv = FE_RECYCLED;
2451fc3b 1032 wake_up(&mdev->ee_wait);
b411b363
PR
1033 }
1034 }
1035
1036 if (!next_epoch)
1037 break;
1038
1039 epoch = next_epoch;
1040 } while (1);
1041
1042 spin_unlock(&mdev->epoch_lock);
1043
b411b363
PR
1044 return rv;
1045}
1046
1047/**
1048 * drbd_bump_write_ordering() - Fall back to an other write ordering method
1049 * @mdev: DRBD device.
1050 * @wo: Write ordering method to try.
1051 */
1052void drbd_bump_write_ordering(struct drbd_conf *mdev, enum write_ordering_e wo) __must_hold(local)
1053{
1054 enum write_ordering_e pwo;
1055 static char *write_ordering_str[] = {
1056 [WO_none] = "none",
1057 [WO_drain_io] = "drain",
1058 [WO_bdev_flush] = "flush",
b411b363
PR
1059 };
1060
1061 pwo = mdev->write_ordering;
1062 wo = min(pwo, wo);
b411b363
PR
1063 if (wo == WO_bdev_flush && mdev->ldev->dc.no_disk_flush)
1064 wo = WO_drain_io;
1065 if (wo == WO_drain_io && mdev->ldev->dc.no_disk_drain)
1066 wo = WO_none;
1067 mdev->write_ordering = wo;
2451fc3b 1068 if (pwo != mdev->write_ordering || wo == WO_bdev_flush)
b411b363
PR
1069 dev_info(DEV, "Method to ensure write ordering: %s\n", write_ordering_str[mdev->write_ordering]);
1070}
1071
45bb912b
LE
1072/**
1073 * drbd_submit_ee()
1074 * @mdev: DRBD device.
1075 * @e: epoch entry
1076 * @rw: flag field, see bio->bi_rw
1077 */
1078/* TODO allocate from our own bio_set. */
1079int drbd_submit_ee(struct drbd_conf *mdev, struct drbd_epoch_entry *e,
1080 const unsigned rw, const int fault_type)
1081{
1082 struct bio *bios = NULL;
1083 struct bio *bio;
1084 struct page *page = e->pages;
1085 sector_t sector = e->sector;
1086 unsigned ds = e->size;
1087 unsigned n_bios = 0;
1088 unsigned nr_pages = (ds + PAGE_SIZE -1) >> PAGE_SHIFT;
1089
1090 /* In most cases, we will only need one bio. But in case the lower
1091 * level restrictions happen to be different at this offset on this
1092 * side than those of the sending peer, we may need to submit the
1093 * request in more than one bio. */
1094next_bio:
1095 bio = bio_alloc(GFP_NOIO, nr_pages);
1096 if (!bio) {
1097 dev_err(DEV, "submit_ee: Allocation of a bio failed\n");
1098 goto fail;
1099 }
1100 /* > e->sector, unless this is the first bio */
1101 bio->bi_sector = sector;
1102 bio->bi_bdev = mdev->ldev->backing_bdev;
45bb912b
LE
1103 bio->bi_rw = rw;
1104 bio->bi_private = e;
1105 bio->bi_end_io = drbd_endio_sec;
1106
1107 bio->bi_next = bios;
1108 bios = bio;
1109 ++n_bios;
1110
1111 page_chain_for_each(page) {
1112 unsigned len = min_t(unsigned, ds, PAGE_SIZE);
1113 if (!bio_add_page(bio, page, len, 0)) {
1114 /* a single page must always be possible! */
1115 BUG_ON(bio->bi_vcnt == 0);
1116 goto next_bio;
1117 }
1118 ds -= len;
1119 sector += len >> 9;
1120 --nr_pages;
1121 }
1122 D_ASSERT(page == NULL);
1123 D_ASSERT(ds == 0);
1124
1125 atomic_set(&e->pending_bios, n_bios);
1126 do {
1127 bio = bios;
1128 bios = bios->bi_next;
1129 bio->bi_next = NULL;
1130
45bb912b 1131 drbd_generic_make_request(mdev, fault_type, bio);
45bb912b 1132 } while (bios);
45bb912b
LE
1133 return 0;
1134
1135fail:
1136 while (bios) {
1137 bio = bios;
1138 bios = bios->bi_next;
1139 bio_put(bio);
1140 }
1141 return -ENOMEM;
1142}
1143
02918be2 1144static int receive_Barrier(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 1145{
2451fc3b 1146 int rv;
02918be2 1147 struct p_barrier *p = &mdev->data.rbuf.barrier;
b411b363
PR
1148 struct drbd_epoch *epoch;
1149
b411b363
PR
1150 inc_unacked(mdev);
1151
b411b363
PR
1152 mdev->current_epoch->barrier_nr = p->barrier;
1153 rv = drbd_may_finish_epoch(mdev, mdev->current_epoch, EV_GOT_BARRIER_NR);
1154
1155 /* P_BARRIER_ACK may imply that the corresponding extent is dropped from
1156 * the activity log, which means it would not be resynced in case the
1157 * R_PRIMARY crashes now.
1158 * Therefore we must send the barrier_ack after the barrier request was
1159 * completed. */
1160 switch (mdev->write_ordering) {
b411b363
PR
1161 case WO_none:
1162 if (rv == FE_RECYCLED)
81e84650 1163 return true;
2451fc3b
PR
1164
1165 /* receiver context, in the writeout path of the other node.
1166 * avoid potential distributed deadlock */
1167 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1168 if (epoch)
1169 break;
1170 else
1171 dev_warn(DEV, "Allocation of an epoch failed, slowing down\n");
1172 /* Fall through */
b411b363
PR
1173
1174 case WO_bdev_flush:
1175 case WO_drain_io:
b411b363 1176 drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
2451fc3b
PR
1177 drbd_flush(mdev);
1178
1179 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1180 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1181 if (epoch)
1182 break;
b411b363
PR
1183 }
1184
2451fc3b
PR
1185 epoch = mdev->current_epoch;
1186 wait_event(mdev->ee_wait, atomic_read(&epoch->epoch_size) == 0);
1187
1188 D_ASSERT(atomic_read(&epoch->active) == 0);
1189 D_ASSERT(epoch->flags == 0);
b411b363 1190
81e84650 1191 return true;
2451fc3b
PR
1192 default:
1193 dev_err(DEV, "Strangeness in mdev->write_ordering %d\n", mdev->write_ordering);
81e84650 1194 return false;
b411b363
PR
1195 }
1196
1197 epoch->flags = 0;
1198 atomic_set(&epoch->epoch_size, 0);
1199 atomic_set(&epoch->active, 0);
1200
1201 spin_lock(&mdev->epoch_lock);
1202 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1203 list_add(&epoch->list, &mdev->current_epoch->list);
1204 mdev->current_epoch = epoch;
1205 mdev->epochs++;
b411b363
PR
1206 } else {
1207 /* The current_epoch got recycled while we allocated this one... */
1208 kfree(epoch);
1209 }
1210 spin_unlock(&mdev->epoch_lock);
1211
81e84650 1212 return true;
b411b363
PR
1213}
1214
1215/* used from receive_RSDataReply (recv_resync_read)
1216 * and from receive_Data */
1217static struct drbd_epoch_entry *
1218read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector, int data_size) __must_hold(local)
1219{
6666032a 1220 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
b411b363 1221 struct drbd_epoch_entry *e;
b411b363 1222 struct page *page;
45bb912b 1223 int dgs, ds, rr;
b411b363
PR
1224 void *dig_in = mdev->int_dig_in;
1225 void *dig_vv = mdev->int_dig_vv;
6b4388ac 1226 unsigned long *data;
b411b363
PR
1227
1228 dgs = (mdev->agreed_pro_version >= 87 && mdev->integrity_r_tfm) ?
1229 crypto_hash_digestsize(mdev->integrity_r_tfm) : 0;
1230
1231 if (dgs) {
1232 rr = drbd_recv(mdev, dig_in, dgs);
1233 if (rr != dgs) {
1234 dev_warn(DEV, "short read receiving data digest: read %d expected %d\n",
1235 rr, dgs);
1236 return NULL;
1237 }
1238 }
1239
1240 data_size -= dgs;
1241
1242 ERR_IF(data_size & 0x1ff) return NULL;
1816a2b4 1243 ERR_IF(data_size > DRBD_MAX_BIO_SIZE) return NULL;
b411b363 1244
6666032a
LE
1245 /* even though we trust out peer,
1246 * we sometimes have to double check. */
1247 if (sector + (data_size>>9) > capacity) {
1248 dev_err(DEV, "capacity: %llus < sector: %llus + size: %u\n",
1249 (unsigned long long)capacity,
1250 (unsigned long long)sector, data_size);
1251 return NULL;
1252 }
1253
b411b363
PR
1254 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1255 * "criss-cross" setup, that might cause write-out on some other DRBD,
1256 * which in turn might block on the other node at this very place. */
1257 e = drbd_alloc_ee(mdev, id, sector, data_size, GFP_NOIO);
1258 if (!e)
1259 return NULL;
45bb912b 1260
b411b363 1261 ds = data_size;
45bb912b
LE
1262 page = e->pages;
1263 page_chain_for_each(page) {
1264 unsigned len = min_t(int, ds, PAGE_SIZE);
6b4388ac 1265 data = kmap(page);
45bb912b 1266 rr = drbd_recv(mdev, data, len);
0cf9d27e 1267 if (drbd_insert_fault(mdev, DRBD_FAULT_RECEIVE)) {
6b4388ac
PR
1268 dev_err(DEV, "Fault injection: Corrupting data on receive\n");
1269 data[0] = data[0] ^ (unsigned long)-1;
1270 }
b411b363 1271 kunmap(page);
45bb912b 1272 if (rr != len) {
b411b363
PR
1273 drbd_free_ee(mdev, e);
1274 dev_warn(DEV, "short read receiving data: read %d expected %d\n",
45bb912b 1275 rr, len);
b411b363
PR
1276 return NULL;
1277 }
1278 ds -= rr;
1279 }
1280
1281 if (dgs) {
45bb912b 1282 drbd_csum_ee(mdev, mdev->integrity_r_tfm, e, dig_vv);
b411b363 1283 if (memcmp(dig_in, dig_vv, dgs)) {
470be44a
LE
1284 dev_err(DEV, "Digest integrity check FAILED: %llus +%u\n",
1285 (unsigned long long)sector, data_size);
b411b363
PR
1286 drbd_bcast_ee(mdev, "digest failed",
1287 dgs, dig_in, dig_vv, e);
1288 drbd_free_ee(mdev, e);
1289 return NULL;
1290 }
1291 }
1292 mdev->recv_cnt += data_size>>9;
1293 return e;
1294}
1295
1296/* drbd_drain_block() just takes a data block
1297 * out of the socket input buffer, and discards it.
1298 */
1299static int drbd_drain_block(struct drbd_conf *mdev, int data_size)
1300{
1301 struct page *page;
1302 int rr, rv = 1;
1303 void *data;
1304
c3470cde 1305 if (!data_size)
81e84650 1306 return true;
c3470cde 1307
45bb912b 1308 page = drbd_pp_alloc(mdev, 1, 1);
b411b363
PR
1309
1310 data = kmap(page);
1311 while (data_size) {
1312 rr = drbd_recv(mdev, data, min_t(int, data_size, PAGE_SIZE));
1313 if (rr != min_t(int, data_size, PAGE_SIZE)) {
1314 rv = 0;
1315 dev_warn(DEV, "short read receiving data: read %d expected %d\n",
1316 rr, min_t(int, data_size, PAGE_SIZE));
1317 break;
1318 }
1319 data_size -= rr;
1320 }
1321 kunmap(page);
435f0740 1322 drbd_pp_free(mdev, page, 0);
b411b363
PR
1323 return rv;
1324}
1325
1326static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
1327 sector_t sector, int data_size)
1328{
1329 struct bio_vec *bvec;
1330 struct bio *bio;
1331 int dgs, rr, i, expect;
1332 void *dig_in = mdev->int_dig_in;
1333 void *dig_vv = mdev->int_dig_vv;
1334
1335 dgs = (mdev->agreed_pro_version >= 87 && mdev->integrity_r_tfm) ?
1336 crypto_hash_digestsize(mdev->integrity_r_tfm) : 0;
1337
1338 if (dgs) {
1339 rr = drbd_recv(mdev, dig_in, dgs);
1340 if (rr != dgs) {
1341 dev_warn(DEV, "short read receiving data reply digest: read %d expected %d\n",
1342 rr, dgs);
1343 return 0;
1344 }
1345 }
1346
1347 data_size -= dgs;
1348
1349 /* optimistically update recv_cnt. if receiving fails below,
1350 * we disconnect anyways, and counters will be reset. */
1351 mdev->recv_cnt += data_size>>9;
1352
1353 bio = req->master_bio;
1354 D_ASSERT(sector == bio->bi_sector);
1355
1356 bio_for_each_segment(bvec, bio, i) {
1357 expect = min_t(int, data_size, bvec->bv_len);
1358 rr = drbd_recv(mdev,
1359 kmap(bvec->bv_page)+bvec->bv_offset,
1360 expect);
1361 kunmap(bvec->bv_page);
1362 if (rr != expect) {
1363 dev_warn(DEV, "short read receiving data reply: "
1364 "read %d expected %d\n",
1365 rr, expect);
1366 return 0;
1367 }
1368 data_size -= rr;
1369 }
1370
1371 if (dgs) {
45bb912b 1372 drbd_csum_bio(mdev, mdev->integrity_r_tfm, bio, dig_vv);
b411b363
PR
1373 if (memcmp(dig_in, dig_vv, dgs)) {
1374 dev_err(DEV, "Digest integrity check FAILED. Broken NICs?\n");
1375 return 0;
1376 }
1377 }
1378
1379 D_ASSERT(data_size == 0);
1380 return 1;
1381}
1382
1383/* e_end_resync_block() is called via
1384 * drbd_process_done_ee() by asender only */
1385static int e_end_resync_block(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1386{
1387 struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1388 sector_t sector = e->sector;
1389 int ok;
1390
1391 D_ASSERT(hlist_unhashed(&e->colision));
1392
45bb912b 1393 if (likely((e->flags & EE_WAS_ERROR) == 0)) {
b411b363
PR
1394 drbd_set_in_sync(mdev, sector, e->size);
1395 ok = drbd_send_ack(mdev, P_RS_WRITE_ACK, e);
1396 } else {
1397 /* Record failure to sync */
1398 drbd_rs_failed_io(mdev, sector, e->size);
1399
1400 ok = drbd_send_ack(mdev, P_NEG_ACK, e);
1401 }
1402 dec_unacked(mdev);
1403
1404 return ok;
1405}
1406
1407static int recv_resync_read(struct drbd_conf *mdev, sector_t sector, int data_size) __releases(local)
1408{
1409 struct drbd_epoch_entry *e;
1410
1411 e = read_in_block(mdev, ID_SYNCER, sector, data_size);
45bb912b
LE
1412 if (!e)
1413 goto fail;
b411b363
PR
1414
1415 dec_rs_pending(mdev);
1416
b411b363
PR
1417 inc_unacked(mdev);
1418 /* corresponding dec_unacked() in e_end_resync_block()
1419 * respective _drbd_clear_done_ee */
1420
45bb912b
LE
1421 e->w.cb = e_end_resync_block;
1422
b411b363
PR
1423 spin_lock_irq(&mdev->req_lock);
1424 list_add(&e->w.list, &mdev->sync_ee);
1425 spin_unlock_irq(&mdev->req_lock);
1426
0f0601f4 1427 atomic_add(data_size >> 9, &mdev->rs_sect_ev);
45bb912b 1428 if (drbd_submit_ee(mdev, e, WRITE, DRBD_FAULT_RS_WR) == 0)
81e84650 1429 return true;
b411b363 1430
22cc37a9
LE
1431 /* drbd_submit_ee currently fails for one reason only:
1432 * not being able to allocate enough bios.
1433 * Is dropping the connection going to help? */
1434 spin_lock_irq(&mdev->req_lock);
1435 list_del(&e->w.list);
1436 spin_unlock_irq(&mdev->req_lock);
1437
45bb912b
LE
1438 drbd_free_ee(mdev, e);
1439fail:
1440 put_ldev(mdev);
81e84650 1441 return false;
b411b363
PR
1442}
1443
02918be2 1444static int receive_DataReply(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363
PR
1445{
1446 struct drbd_request *req;
1447 sector_t sector;
b411b363 1448 int ok;
02918be2 1449 struct p_data *p = &mdev->data.rbuf.data;
b411b363
PR
1450
1451 sector = be64_to_cpu(p->sector);
1452
1453 spin_lock_irq(&mdev->req_lock);
1454 req = _ar_id_to_req(mdev, p->block_id, sector);
1455 spin_unlock_irq(&mdev->req_lock);
1456 if (unlikely(!req)) {
1457 dev_err(DEV, "Got a corrupt block_id/sector pair(1).\n");
81e84650 1458 return false;
b411b363
PR
1459 }
1460
1461 /* hlist_del(&req->colision) is done in _req_may_be_done, to avoid
1462 * special casing it there for the various failure cases.
1463 * still no race with drbd_fail_pending_reads */
1464 ok = recv_dless_read(mdev, req, sector, data_size);
1465
1466 if (ok)
1467 req_mod(req, data_received);
1468 /* else: nothing. handled from drbd_disconnect...
1469 * I don't think we may complete this just yet
1470 * in case we are "on-disconnect: freeze" */
1471
1472 return ok;
1473}
1474
02918be2 1475static int receive_RSDataReply(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363
PR
1476{
1477 sector_t sector;
b411b363 1478 int ok;
02918be2 1479 struct p_data *p = &mdev->data.rbuf.data;
b411b363
PR
1480
1481 sector = be64_to_cpu(p->sector);
1482 D_ASSERT(p->block_id == ID_SYNCER);
1483
1484 if (get_ldev(mdev)) {
1485 /* data is submitted to disk within recv_resync_read.
1486 * corresponding put_ldev done below on error,
1487 * or in drbd_endio_write_sec. */
1488 ok = recv_resync_read(mdev, sector, data_size);
1489 } else {
1490 if (__ratelimit(&drbd_ratelimit_state))
1491 dev_err(DEV, "Can not write resync data to local disk.\n");
1492
1493 ok = drbd_drain_block(mdev, data_size);
1494
2b2bf214 1495 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1496 }
1497
778f271d
PR
1498 atomic_add(data_size >> 9, &mdev->rs_sect_in);
1499
b411b363
PR
1500 return ok;
1501}
1502
1503/* e_end_block() is called via drbd_process_done_ee().
1504 * this means this function only runs in the asender thread
1505 */
1506static int e_end_block(struct drbd_conf *mdev, struct drbd_work *w, int cancel)
1507{
1508 struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1509 sector_t sector = e->sector;
b411b363
PR
1510 int ok = 1, pcmd;
1511
b411b363 1512 if (mdev->net_conf->wire_protocol == DRBD_PROT_C) {
45bb912b 1513 if (likely((e->flags & EE_WAS_ERROR) == 0)) {
b411b363
PR
1514 pcmd = (mdev->state.conn >= C_SYNC_SOURCE &&
1515 mdev->state.conn <= C_PAUSED_SYNC_T &&
1516 e->flags & EE_MAY_SET_IN_SYNC) ?
1517 P_RS_WRITE_ACK : P_WRITE_ACK;
1518 ok &= drbd_send_ack(mdev, pcmd, e);
1519 if (pcmd == P_RS_WRITE_ACK)
1520 drbd_set_in_sync(mdev, sector, e->size);
1521 } else {
1522 ok = drbd_send_ack(mdev, P_NEG_ACK, e);
1523 /* we expect it to be marked out of sync anyways...
1524 * maybe assert this? */
1525 }
1526 dec_unacked(mdev);
1527 }
1528 /* we delete from the conflict detection hash _after_ we sent out the
1529 * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right. */
1530 if (mdev->net_conf->two_primaries) {
1531 spin_lock_irq(&mdev->req_lock);
1532 D_ASSERT(!hlist_unhashed(&e->colision));
1533 hlist_del_init(&e->colision);
1534 spin_unlock_irq(&mdev->req_lock);
1535 } else {
1536 D_ASSERT(hlist_unhashed(&e->colision));
1537 }
1538
1539 drbd_may_finish_epoch(mdev, e->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
1540
1541 return ok;
1542}
1543
1544static int e_send_discard_ack(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1545{
1546 struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1547 int ok = 1;
1548
1549 D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
1550 ok = drbd_send_ack(mdev, P_DISCARD_ACK, e);
1551
1552 spin_lock_irq(&mdev->req_lock);
1553 D_ASSERT(!hlist_unhashed(&e->colision));
1554 hlist_del_init(&e->colision);
1555 spin_unlock_irq(&mdev->req_lock);
1556
1557 dec_unacked(mdev);
1558
1559 return ok;
1560}
1561
1562/* Called from receive_Data.
1563 * Synchronize packets on sock with packets on msock.
1564 *
1565 * This is here so even when a P_DATA packet traveling via sock overtook an Ack
1566 * packet traveling on msock, they are still processed in the order they have
1567 * been sent.
1568 *
1569 * Note: we don't care for Ack packets overtaking P_DATA packets.
1570 *
1571 * In case packet_seq is larger than mdev->peer_seq number, there are
1572 * outstanding packets on the msock. We wait for them to arrive.
1573 * In case we are the logically next packet, we update mdev->peer_seq
1574 * ourselves. Correctly handles 32bit wrap around.
1575 *
1576 * Assume we have a 10 GBit connection, that is about 1<<30 byte per second,
1577 * about 1<<21 sectors per second. So "worst" case, we have 1<<3 == 8 seconds
1578 * for the 24bit wrap (historical atomic_t guarantee on some archs), and we have
1579 * 1<<9 == 512 seconds aka ages for the 32bit wrap around...
1580 *
1581 * returns 0 if we may process the packet,
1582 * -ERESTARTSYS if we were interrupted (by disconnect signal). */
1583static int drbd_wait_peer_seq(struct drbd_conf *mdev, const u32 packet_seq)
1584{
1585 DEFINE_WAIT(wait);
1586 unsigned int p_seq;
1587 long timeout;
1588 int ret = 0;
1589 spin_lock(&mdev->peer_seq_lock);
1590 for (;;) {
1591 prepare_to_wait(&mdev->seq_wait, &wait, TASK_INTERRUPTIBLE);
1592 if (seq_le(packet_seq, mdev->peer_seq+1))
1593 break;
1594 if (signal_pending(current)) {
1595 ret = -ERESTARTSYS;
1596 break;
1597 }
1598 p_seq = mdev->peer_seq;
1599 spin_unlock(&mdev->peer_seq_lock);
1600 timeout = schedule_timeout(30*HZ);
1601 spin_lock(&mdev->peer_seq_lock);
1602 if (timeout == 0 && p_seq == mdev->peer_seq) {
1603 ret = -ETIMEDOUT;
1604 dev_err(DEV, "ASSERT FAILED waited 30 seconds for sequence update, forcing reconnect\n");
1605 break;
1606 }
1607 }
1608 finish_wait(&mdev->seq_wait, &wait);
1609 if (mdev->peer_seq+1 == packet_seq)
1610 mdev->peer_seq++;
1611 spin_unlock(&mdev->peer_seq_lock);
1612 return ret;
1613}
1614
688593c5
LE
1615/* see also bio_flags_to_wire()
1616 * DRBD_REQ_*, because we need to semantically map the flags to data packet
1617 * flags and back. We may replicate to other kernel versions. */
1618static unsigned long wire_flags_to_bio(struct drbd_conf *mdev, u32 dpf)
76d2e7ec 1619{
688593c5
LE
1620 return (dpf & DP_RW_SYNC ? REQ_SYNC : 0) |
1621 (dpf & DP_FUA ? REQ_FUA : 0) |
1622 (dpf & DP_FLUSH ? REQ_FLUSH : 0) |
1623 (dpf & DP_DISCARD ? REQ_DISCARD : 0);
76d2e7ec
PR
1624}
1625
b411b363 1626/* mirrored write */
02918be2 1627static int receive_Data(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363
PR
1628{
1629 sector_t sector;
1630 struct drbd_epoch_entry *e;
02918be2 1631 struct p_data *p = &mdev->data.rbuf.data;
b411b363
PR
1632 int rw = WRITE;
1633 u32 dp_flags;
1634
b411b363 1635 if (!get_ldev(mdev)) {
b411b363
PR
1636 spin_lock(&mdev->peer_seq_lock);
1637 if (mdev->peer_seq+1 == be32_to_cpu(p->seq_num))
1638 mdev->peer_seq++;
1639 spin_unlock(&mdev->peer_seq_lock);
1640
2b2bf214 1641 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1642 atomic_inc(&mdev->current_epoch->epoch_size);
1643 return drbd_drain_block(mdev, data_size);
1644 }
1645
1646 /* get_ldev(mdev) successful.
1647 * Corresponding put_ldev done either below (on various errors),
1648 * or in drbd_endio_write_sec, if we successfully submit the data at
1649 * the end of this function. */
1650
1651 sector = be64_to_cpu(p->sector);
1652 e = read_in_block(mdev, p->block_id, sector, data_size);
1653 if (!e) {
1654 put_ldev(mdev);
81e84650 1655 return false;
b411b363
PR
1656 }
1657
b411b363
PR
1658 e->w.cb = e_end_block;
1659
688593c5
LE
1660 dp_flags = be32_to_cpu(p->dp_flags);
1661 rw |= wire_flags_to_bio(mdev, dp_flags);
1662
1663 if (dp_flags & DP_MAY_SET_IN_SYNC)
1664 e->flags |= EE_MAY_SET_IN_SYNC;
1665
b411b363
PR
1666 spin_lock(&mdev->epoch_lock);
1667 e->epoch = mdev->current_epoch;
1668 atomic_inc(&e->epoch->epoch_size);
1669 atomic_inc(&e->epoch->active);
b411b363
PR
1670 spin_unlock(&mdev->epoch_lock);
1671
b411b363
PR
1672 /* I'm the receiver, I do hold a net_cnt reference. */
1673 if (!mdev->net_conf->two_primaries) {
1674 spin_lock_irq(&mdev->req_lock);
1675 } else {
1676 /* don't get the req_lock yet,
1677 * we may sleep in drbd_wait_peer_seq */
1678 const int size = e->size;
1679 const int discard = test_bit(DISCARD_CONCURRENT, &mdev->flags);
1680 DEFINE_WAIT(wait);
1681 struct drbd_request *i;
1682 struct hlist_node *n;
1683 struct hlist_head *slot;
1684 int first;
1685
1686 D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
1687 BUG_ON(mdev->ee_hash == NULL);
1688 BUG_ON(mdev->tl_hash == NULL);
1689
1690 /* conflict detection and handling:
1691 * 1. wait on the sequence number,
1692 * in case this data packet overtook ACK packets.
1693 * 2. check our hash tables for conflicting requests.
1694 * we only need to walk the tl_hash, since an ee can not
1695 * have a conflict with an other ee: on the submitting
1696 * node, the corresponding req had already been conflicting,
1697 * and a conflicting req is never sent.
1698 *
1699 * Note: for two_primaries, we are protocol C,
1700 * so there cannot be any request that is DONE
1701 * but still on the transfer log.
1702 *
1703 * unconditionally add to the ee_hash.
1704 *
1705 * if no conflicting request is found:
1706 * submit.
1707 *
1708 * if any conflicting request is found
1709 * that has not yet been acked,
1710 * AND I have the "discard concurrent writes" flag:
1711 * queue (via done_ee) the P_DISCARD_ACK; OUT.
1712 *
1713 * if any conflicting request is found:
1714 * block the receiver, waiting on misc_wait
1715 * until no more conflicting requests are there,
1716 * or we get interrupted (disconnect).
1717 *
1718 * we do not just write after local io completion of those
1719 * requests, but only after req is done completely, i.e.
1720 * we wait for the P_DISCARD_ACK to arrive!
1721 *
1722 * then proceed normally, i.e. submit.
1723 */
1724 if (drbd_wait_peer_seq(mdev, be32_to_cpu(p->seq_num)))
1725 goto out_interrupted;
1726
1727 spin_lock_irq(&mdev->req_lock);
1728
1729 hlist_add_head(&e->colision, ee_hash_slot(mdev, sector));
1730
1731#define OVERLAPS overlaps(i->sector, i->size, sector, size)
1732 slot = tl_hash_slot(mdev, sector);
1733 first = 1;
1734 for (;;) {
1735 int have_unacked = 0;
1736 int have_conflict = 0;
1737 prepare_to_wait(&mdev->misc_wait, &wait,
1738 TASK_INTERRUPTIBLE);
1739 hlist_for_each_entry(i, n, slot, colision) {
1740 if (OVERLAPS) {
1741 /* only ALERT on first iteration,
1742 * we may be woken up early... */
1743 if (first)
1744 dev_alert(DEV, "%s[%u] Concurrent local write detected!"
1745 " new: %llus +%u; pending: %llus +%u\n",
1746 current->comm, current->pid,
1747 (unsigned long long)sector, size,
1748 (unsigned long long)i->sector, i->size);
1749 if (i->rq_state & RQ_NET_PENDING)
1750 ++have_unacked;
1751 ++have_conflict;
1752 }
1753 }
1754#undef OVERLAPS
1755 if (!have_conflict)
1756 break;
1757
1758 /* Discard Ack only for the _first_ iteration */
1759 if (first && discard && have_unacked) {
1760 dev_alert(DEV, "Concurrent write! [DISCARD BY FLAG] sec=%llus\n",
1761 (unsigned long long)sector);
1762 inc_unacked(mdev);
1763 e->w.cb = e_send_discard_ack;
1764 list_add_tail(&e->w.list, &mdev->done_ee);
1765
1766 spin_unlock_irq(&mdev->req_lock);
1767
1768 /* we could probably send that P_DISCARD_ACK ourselves,
1769 * but I don't like the receiver using the msock */
1770
1771 put_ldev(mdev);
1772 wake_asender(mdev);
1773 finish_wait(&mdev->misc_wait, &wait);
81e84650 1774 return true;
b411b363
PR
1775 }
1776
1777 if (signal_pending(current)) {
1778 hlist_del_init(&e->colision);
1779
1780 spin_unlock_irq(&mdev->req_lock);
1781
1782 finish_wait(&mdev->misc_wait, &wait);
1783 goto out_interrupted;
1784 }
1785
1786 spin_unlock_irq(&mdev->req_lock);
1787 if (first) {
1788 first = 0;
1789 dev_alert(DEV, "Concurrent write! [W AFTERWARDS] "
1790 "sec=%llus\n", (unsigned long long)sector);
1791 } else if (discard) {
1792 /* we had none on the first iteration.
1793 * there must be none now. */
1794 D_ASSERT(have_unacked == 0);
1795 }
1796 schedule();
1797 spin_lock_irq(&mdev->req_lock);
1798 }
1799 finish_wait(&mdev->misc_wait, &wait);
1800 }
1801
1802 list_add(&e->w.list, &mdev->active_ee);
1803 spin_unlock_irq(&mdev->req_lock);
1804
1805 switch (mdev->net_conf->wire_protocol) {
1806 case DRBD_PROT_C:
1807 inc_unacked(mdev);
1808 /* corresponding dec_unacked() in e_end_block()
1809 * respective _drbd_clear_done_ee */
1810 break;
1811 case DRBD_PROT_B:
1812 /* I really don't like it that the receiver thread
1813 * sends on the msock, but anyways */
1814 drbd_send_ack(mdev, P_RECV_ACK, e);
1815 break;
1816 case DRBD_PROT_A:
1817 /* nothing to do */
1818 break;
1819 }
1820
6719fb03 1821 if (mdev->state.pdsk < D_INCONSISTENT) {
b411b363
PR
1822 /* In case we have the only disk of the cluster, */
1823 drbd_set_out_of_sync(mdev, e->sector, e->size);
1824 e->flags |= EE_CALL_AL_COMPLETE_IO;
6719fb03 1825 e->flags &= ~EE_MAY_SET_IN_SYNC;
b411b363
PR
1826 drbd_al_begin_io(mdev, e->sector);
1827 }
1828
45bb912b 1829 if (drbd_submit_ee(mdev, e, rw, DRBD_FAULT_DT_WR) == 0)
81e84650 1830 return true;
b411b363 1831
22cc37a9
LE
1832 /* drbd_submit_ee currently fails for one reason only:
1833 * not being able to allocate enough bios.
1834 * Is dropping the connection going to help? */
1835 spin_lock_irq(&mdev->req_lock);
1836 list_del(&e->w.list);
1837 hlist_del_init(&e->colision);
1838 spin_unlock_irq(&mdev->req_lock);
1839 if (e->flags & EE_CALL_AL_COMPLETE_IO)
1840 drbd_al_complete_io(mdev, e->sector);
1841
b411b363
PR
1842out_interrupted:
1843 /* yes, the epoch_size now is imbalanced.
1844 * but we drop the connection anyways, so we don't have a chance to
1845 * receive a barrier... atomic_inc(&mdev->epoch_size); */
1846 put_ldev(mdev);
1847 drbd_free_ee(mdev, e);
81e84650 1848 return false;
b411b363
PR
1849}
1850
0f0601f4
LE
1851/* We may throttle resync, if the lower device seems to be busy,
1852 * and current sync rate is above c_min_rate.
1853 *
1854 * To decide whether or not the lower device is busy, we use a scheme similar
1855 * to MD RAID is_mddev_idle(): if the partition stats reveal "significant"
1856 * (more than 64 sectors) of activity we cannot account for with our own resync
1857 * activity, it obviously is "busy".
1858 *
1859 * The current sync rate used here uses only the most recent two step marks,
1860 * to have a short time average so we can react faster.
1861 */
e3555d85 1862int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
0f0601f4
LE
1863{
1864 struct gendisk *disk = mdev->ldev->backing_bdev->bd_contains->bd_disk;
1865 unsigned long db, dt, dbdt;
e3555d85 1866 struct lc_element *tmp;
0f0601f4
LE
1867 int curr_events;
1868 int throttle = 0;
1869
1870 /* feature disabled? */
1871 if (mdev->sync_conf.c_min_rate == 0)
1872 return 0;
1873
e3555d85
PR
1874 spin_lock_irq(&mdev->al_lock);
1875 tmp = lc_find(mdev->resync, BM_SECT_TO_EXT(sector));
1876 if (tmp) {
1877 struct bm_extent *bm_ext = lc_entry(tmp, struct bm_extent, lce);
1878 if (test_bit(BME_PRIORITY, &bm_ext->flags)) {
1879 spin_unlock_irq(&mdev->al_lock);
1880 return 0;
1881 }
1882 /* Do not slow down if app IO is already waiting for this extent */
1883 }
1884 spin_unlock_irq(&mdev->al_lock);
1885
0f0601f4
LE
1886 curr_events = (int)part_stat_read(&disk->part0, sectors[0]) +
1887 (int)part_stat_read(&disk->part0, sectors[1]) -
1888 atomic_read(&mdev->rs_sect_ev);
e3555d85 1889
0f0601f4
LE
1890 if (!mdev->rs_last_events || curr_events - mdev->rs_last_events > 64) {
1891 unsigned long rs_left;
1892 int i;
1893
1894 mdev->rs_last_events = curr_events;
1895
1896 /* sync speed average over the last 2*DRBD_SYNC_MARK_STEP,
1897 * approx. */
2649f080
LE
1898 i = (mdev->rs_last_mark + DRBD_SYNC_MARKS-1) % DRBD_SYNC_MARKS;
1899
1900 if (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T)
1901 rs_left = mdev->ov_left;
1902 else
1903 rs_left = drbd_bm_total_weight(mdev) - mdev->rs_failed;
0f0601f4
LE
1904
1905 dt = ((long)jiffies - (long)mdev->rs_mark_time[i]) / HZ;
1906 if (!dt)
1907 dt++;
1908 db = mdev->rs_mark_left[i] - rs_left;
1909 dbdt = Bit2KB(db/dt);
1910
1911 if (dbdt > mdev->sync_conf.c_min_rate)
1912 throttle = 1;
1913 }
1914 return throttle;
1915}
1916
1917
02918be2 1918static int receive_DataRequest(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int digest_size)
b411b363
PR
1919{
1920 sector_t sector;
1921 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
1922 struct drbd_epoch_entry *e;
1923 struct digest_info *di = NULL;
b18b37be 1924 int size, verb;
b411b363 1925 unsigned int fault_type;
02918be2 1926 struct p_block_req *p = &mdev->data.rbuf.block_req;
b411b363
PR
1927
1928 sector = be64_to_cpu(p->sector);
1929 size = be32_to_cpu(p->blksize);
1930
1816a2b4 1931 if (size <= 0 || (size & 0x1ff) != 0 || size > DRBD_MAX_BIO_SIZE) {
b411b363
PR
1932 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
1933 (unsigned long long)sector, size);
81e84650 1934 return false;
b411b363
PR
1935 }
1936 if (sector + (size>>9) > capacity) {
1937 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
1938 (unsigned long long)sector, size);
81e84650 1939 return false;
b411b363
PR
1940 }
1941
1942 if (!get_ldev_if_state(mdev, D_UP_TO_DATE)) {
b18b37be
PR
1943 verb = 1;
1944 switch (cmd) {
1945 case P_DATA_REQUEST:
1946 drbd_send_ack_rp(mdev, P_NEG_DREPLY, p);
1947 break;
1948 case P_RS_DATA_REQUEST:
1949 case P_CSUM_RS_REQUEST:
1950 case P_OV_REQUEST:
1951 drbd_send_ack_rp(mdev, P_NEG_RS_DREPLY , p);
1952 break;
1953 case P_OV_REPLY:
1954 verb = 0;
1955 dec_rs_pending(mdev);
1956 drbd_send_ack_ex(mdev, P_OV_RESULT, sector, size, ID_IN_SYNC);
1957 break;
1958 default:
1959 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
1960 cmdname(cmd));
1961 }
1962 if (verb && __ratelimit(&drbd_ratelimit_state))
b411b363
PR
1963 dev_err(DEV, "Can not satisfy peer's read request, "
1964 "no local data.\n");
b18b37be 1965
a821cc4a
LE
1966 /* drain possibly payload */
1967 return drbd_drain_block(mdev, digest_size);
b411b363
PR
1968 }
1969
1970 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1971 * "criss-cross" setup, that might cause write-out on some other DRBD,
1972 * which in turn might block on the other node at this very place. */
1973 e = drbd_alloc_ee(mdev, p->block_id, sector, size, GFP_NOIO);
1974 if (!e) {
1975 put_ldev(mdev);
81e84650 1976 return false;
b411b363
PR
1977 }
1978
02918be2 1979 switch (cmd) {
b411b363
PR
1980 case P_DATA_REQUEST:
1981 e->w.cb = w_e_end_data_req;
1982 fault_type = DRBD_FAULT_DT_RD;
80a40e43
LE
1983 /* application IO, don't drbd_rs_begin_io */
1984 goto submit;
1985
b411b363
PR
1986 case P_RS_DATA_REQUEST:
1987 e->w.cb = w_e_end_rsdata_req;
1988 fault_type = DRBD_FAULT_RS_RD;
5f9915bb
LE
1989 /* used in the sector offset progress display */
1990 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
b411b363
PR
1991 break;
1992
1993 case P_OV_REPLY:
1994 case P_CSUM_RS_REQUEST:
1995 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
1996 di = kmalloc(sizeof(*di) + digest_size, GFP_NOIO);
1997 if (!di)
1998 goto out_free_e;
1999
2000 di->digest_size = digest_size;
2001 di->digest = (((char *)di)+sizeof(struct digest_info));
2002
c36c3ced
LE
2003 e->digest = di;
2004 e->flags |= EE_HAS_DIGEST;
2005
b411b363
PR
2006 if (drbd_recv(mdev, di->digest, digest_size) != digest_size)
2007 goto out_free_e;
2008
02918be2 2009 if (cmd == P_CSUM_RS_REQUEST) {
b411b363
PR
2010 D_ASSERT(mdev->agreed_pro_version >= 89);
2011 e->w.cb = w_e_end_csum_rs_req;
5f9915bb
LE
2012 /* used in the sector offset progress display */
2013 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
02918be2 2014 } else if (cmd == P_OV_REPLY) {
2649f080
LE
2015 /* track progress, we may need to throttle */
2016 atomic_add(size >> 9, &mdev->rs_sect_in);
b411b363
PR
2017 e->w.cb = w_e_end_ov_reply;
2018 dec_rs_pending(mdev);
0f0601f4
LE
2019 /* drbd_rs_begin_io done when we sent this request,
2020 * but accounting still needs to be done. */
2021 goto submit_for_resync;
b411b363
PR
2022 }
2023 break;
2024
2025 case P_OV_REQUEST:
b411b363
PR
2026 if (mdev->ov_start_sector == ~(sector_t)0 &&
2027 mdev->agreed_pro_version >= 90) {
de228bba
LE
2028 unsigned long now = jiffies;
2029 int i;
b411b363
PR
2030 mdev->ov_start_sector = sector;
2031 mdev->ov_position = sector;
30b743a2
LE
2032 mdev->ov_left = drbd_bm_bits(mdev) - BM_SECT_TO_BIT(sector);
2033 mdev->rs_total = mdev->ov_left;
de228bba
LE
2034 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
2035 mdev->rs_mark_left[i] = mdev->ov_left;
2036 mdev->rs_mark_time[i] = now;
2037 }
b411b363
PR
2038 dev_info(DEV, "Online Verify start sector: %llu\n",
2039 (unsigned long long)sector);
2040 }
2041 e->w.cb = w_e_end_ov_req;
2042 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2043 break;
2044
b411b363
PR
2045 default:
2046 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
02918be2 2047 cmdname(cmd));
b411b363 2048 fault_type = DRBD_FAULT_MAX;
80a40e43 2049 goto out_free_e;
b411b363
PR
2050 }
2051
0f0601f4
LE
2052 /* Throttle, drbd_rs_begin_io and submit should become asynchronous
2053 * wrt the receiver, but it is not as straightforward as it may seem.
2054 * Various places in the resync start and stop logic assume resync
2055 * requests are processed in order, requeuing this on the worker thread
2056 * introduces a bunch of new code for synchronization between threads.
2057 *
2058 * Unlimited throttling before drbd_rs_begin_io may stall the resync
2059 * "forever", throttling after drbd_rs_begin_io will lock that extent
2060 * for application writes for the same time. For now, just throttle
2061 * here, where the rest of the code expects the receiver to sleep for
2062 * a while, anyways.
2063 */
2064
2065 /* Throttle before drbd_rs_begin_io, as that locks out application IO;
2066 * this defers syncer requests for some time, before letting at least
2067 * on request through. The resync controller on the receiving side
2068 * will adapt to the incoming rate accordingly.
2069 *
2070 * We cannot throttle here if remote is Primary/SyncTarget:
2071 * we would also throttle its application reads.
2072 * In that case, throttling is done on the SyncTarget only.
2073 */
e3555d85
PR
2074 if (mdev->state.peer != R_PRIMARY && drbd_rs_should_slow_down(mdev, sector))
2075 schedule_timeout_uninterruptible(HZ/10);
2076 if (drbd_rs_begin_io(mdev, sector))
80a40e43 2077 goto out_free_e;
b411b363 2078
0f0601f4
LE
2079submit_for_resync:
2080 atomic_add(size >> 9, &mdev->rs_sect_ev);
2081
80a40e43 2082submit:
b411b363 2083 inc_unacked(mdev);
80a40e43
LE
2084 spin_lock_irq(&mdev->req_lock);
2085 list_add_tail(&e->w.list, &mdev->read_ee);
2086 spin_unlock_irq(&mdev->req_lock);
b411b363 2087
45bb912b 2088 if (drbd_submit_ee(mdev, e, READ, fault_type) == 0)
81e84650 2089 return true;
b411b363 2090
22cc37a9
LE
2091 /* drbd_submit_ee currently fails for one reason only:
2092 * not being able to allocate enough bios.
2093 * Is dropping the connection going to help? */
2094 spin_lock_irq(&mdev->req_lock);
2095 list_del(&e->w.list);
2096 spin_unlock_irq(&mdev->req_lock);
2097 /* no drbd_rs_complete_io(), we are dropping the connection anyways */
2098
b411b363 2099out_free_e:
b411b363
PR
2100 put_ldev(mdev);
2101 drbd_free_ee(mdev, e);
81e84650 2102 return false;
b411b363
PR
2103}
2104
2105static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
2106{
2107 int self, peer, rv = -100;
2108 unsigned long ch_self, ch_peer;
2109
2110 self = mdev->ldev->md.uuid[UI_BITMAP] & 1;
2111 peer = mdev->p_uuid[UI_BITMAP] & 1;
2112
2113 ch_peer = mdev->p_uuid[UI_SIZE];
2114 ch_self = mdev->comm_bm_set;
2115
2116 switch (mdev->net_conf->after_sb_0p) {
2117 case ASB_CONSENSUS:
2118 case ASB_DISCARD_SECONDARY:
2119 case ASB_CALL_HELPER:
2120 dev_err(DEV, "Configuration error.\n");
2121 break;
2122 case ASB_DISCONNECT:
2123 break;
2124 case ASB_DISCARD_YOUNGER_PRI:
2125 if (self == 0 && peer == 1) {
2126 rv = -1;
2127 break;
2128 }
2129 if (self == 1 && peer == 0) {
2130 rv = 1;
2131 break;
2132 }
2133 /* Else fall through to one of the other strategies... */
2134 case ASB_DISCARD_OLDER_PRI:
2135 if (self == 0 && peer == 1) {
2136 rv = 1;
2137 break;
2138 }
2139 if (self == 1 && peer == 0) {
2140 rv = -1;
2141 break;
2142 }
2143 /* Else fall through to one of the other strategies... */
ad19bf6e 2144 dev_warn(DEV, "Discard younger/older primary did not find a decision\n"
b411b363
PR
2145 "Using discard-least-changes instead\n");
2146 case ASB_DISCARD_ZERO_CHG:
2147 if (ch_peer == 0 && ch_self == 0) {
2148 rv = test_bit(DISCARD_CONCURRENT, &mdev->flags)
2149 ? -1 : 1;
2150 break;
2151 } else {
2152 if (ch_peer == 0) { rv = 1; break; }
2153 if (ch_self == 0) { rv = -1; break; }
2154 }
2155 if (mdev->net_conf->after_sb_0p == ASB_DISCARD_ZERO_CHG)
2156 break;
2157 case ASB_DISCARD_LEAST_CHG:
2158 if (ch_self < ch_peer)
2159 rv = -1;
2160 else if (ch_self > ch_peer)
2161 rv = 1;
2162 else /* ( ch_self == ch_peer ) */
2163 /* Well, then use something else. */
2164 rv = test_bit(DISCARD_CONCURRENT, &mdev->flags)
2165 ? -1 : 1;
2166 break;
2167 case ASB_DISCARD_LOCAL:
2168 rv = -1;
2169 break;
2170 case ASB_DISCARD_REMOTE:
2171 rv = 1;
2172 }
2173
2174 return rv;
2175}
2176
2177static int drbd_asb_recover_1p(struct drbd_conf *mdev) __must_hold(local)
2178{
6184ea21 2179 int hg, rv = -100;
b411b363
PR
2180
2181 switch (mdev->net_conf->after_sb_1p) {
2182 case ASB_DISCARD_YOUNGER_PRI:
2183 case ASB_DISCARD_OLDER_PRI:
2184 case ASB_DISCARD_LEAST_CHG:
2185 case ASB_DISCARD_LOCAL:
2186 case ASB_DISCARD_REMOTE:
2187 dev_err(DEV, "Configuration error.\n");
2188 break;
2189 case ASB_DISCONNECT:
2190 break;
2191 case ASB_CONSENSUS:
2192 hg = drbd_asb_recover_0p(mdev);
2193 if (hg == -1 && mdev->state.role == R_SECONDARY)
2194 rv = hg;
2195 if (hg == 1 && mdev->state.role == R_PRIMARY)
2196 rv = hg;
2197 break;
2198 case ASB_VIOLENTLY:
2199 rv = drbd_asb_recover_0p(mdev);
2200 break;
2201 case ASB_DISCARD_SECONDARY:
2202 return mdev->state.role == R_PRIMARY ? 1 : -1;
2203 case ASB_CALL_HELPER:
2204 hg = drbd_asb_recover_0p(mdev);
2205 if (hg == -1 && mdev->state.role == R_PRIMARY) {
bb437946
AG
2206 enum drbd_state_rv rv2;
2207
2208 drbd_set_role(mdev, R_SECONDARY, 0);
b411b363
PR
2209 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2210 * we might be here in C_WF_REPORT_PARAMS which is transient.
2211 * we do not need to wait for the after state change work either. */
bb437946
AG
2212 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2213 if (rv2 != SS_SUCCESS) {
b411b363
PR
2214 drbd_khelper(mdev, "pri-lost-after-sb");
2215 } else {
2216 dev_warn(DEV, "Successfully gave up primary role.\n");
2217 rv = hg;
2218 }
2219 } else
2220 rv = hg;
2221 }
2222
2223 return rv;
2224}
2225
2226static int drbd_asb_recover_2p(struct drbd_conf *mdev) __must_hold(local)
2227{
6184ea21 2228 int hg, rv = -100;
b411b363
PR
2229
2230 switch (mdev->net_conf->after_sb_2p) {
2231 case ASB_DISCARD_YOUNGER_PRI:
2232 case ASB_DISCARD_OLDER_PRI:
2233 case ASB_DISCARD_LEAST_CHG:
2234 case ASB_DISCARD_LOCAL:
2235 case ASB_DISCARD_REMOTE:
2236 case ASB_CONSENSUS:
2237 case ASB_DISCARD_SECONDARY:
2238 dev_err(DEV, "Configuration error.\n");
2239 break;
2240 case ASB_VIOLENTLY:
2241 rv = drbd_asb_recover_0p(mdev);
2242 break;
2243 case ASB_DISCONNECT:
2244 break;
2245 case ASB_CALL_HELPER:
2246 hg = drbd_asb_recover_0p(mdev);
2247 if (hg == -1) {
bb437946
AG
2248 enum drbd_state_rv rv2;
2249
b411b363
PR
2250 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2251 * we might be here in C_WF_REPORT_PARAMS which is transient.
2252 * we do not need to wait for the after state change work either. */
bb437946
AG
2253 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2254 if (rv2 != SS_SUCCESS) {
b411b363
PR
2255 drbd_khelper(mdev, "pri-lost-after-sb");
2256 } else {
2257 dev_warn(DEV, "Successfully gave up primary role.\n");
2258 rv = hg;
2259 }
2260 } else
2261 rv = hg;
2262 }
2263
2264 return rv;
2265}
2266
2267static void drbd_uuid_dump(struct drbd_conf *mdev, char *text, u64 *uuid,
2268 u64 bits, u64 flags)
2269{
2270 if (!uuid) {
2271 dev_info(DEV, "%s uuid info vanished while I was looking!\n", text);
2272 return;
2273 }
2274 dev_info(DEV, "%s %016llX:%016llX:%016llX:%016llX bits:%llu flags:%llX\n",
2275 text,
2276 (unsigned long long)uuid[UI_CURRENT],
2277 (unsigned long long)uuid[UI_BITMAP],
2278 (unsigned long long)uuid[UI_HISTORY_START],
2279 (unsigned long long)uuid[UI_HISTORY_END],
2280 (unsigned long long)bits,
2281 (unsigned long long)flags);
2282}
2283
2284/*
2285 100 after split brain try auto recover
2286 2 C_SYNC_SOURCE set BitMap
2287 1 C_SYNC_SOURCE use BitMap
2288 0 no Sync
2289 -1 C_SYNC_TARGET use BitMap
2290 -2 C_SYNC_TARGET set BitMap
2291 -100 after split brain, disconnect
2292-1000 unrelated data
4a23f264
PR
2293-1091 requires proto 91
2294-1096 requires proto 96
b411b363
PR
2295 */
2296static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(local)
2297{
2298 u64 self, peer;
2299 int i, j;
2300
2301 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2302 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2303
2304 *rule_nr = 10;
2305 if (self == UUID_JUST_CREATED && peer == UUID_JUST_CREATED)
2306 return 0;
2307
2308 *rule_nr = 20;
2309 if ((self == UUID_JUST_CREATED || self == (u64)0) &&
2310 peer != UUID_JUST_CREATED)
2311 return -2;
2312
2313 *rule_nr = 30;
2314 if (self != UUID_JUST_CREATED &&
2315 (peer == UUID_JUST_CREATED || peer == (u64)0))
2316 return 2;
2317
2318 if (self == peer) {
2319 int rct, dc; /* roles at crash time */
2320
2321 if (mdev->p_uuid[UI_BITMAP] == (u64)0 && mdev->ldev->md.uuid[UI_BITMAP] != (u64)0) {
2322
2323 if (mdev->agreed_pro_version < 91)
4a23f264 2324 return -1091;
b411b363
PR
2325
2326 if ((mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
2327 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
2328 dev_info(DEV, "was SyncSource, missed the resync finished event, corrected myself:\n");
2329 drbd_uuid_set_bm(mdev, 0UL);
2330
2331 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2332 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2333 *rule_nr = 34;
2334 } else {
2335 dev_info(DEV, "was SyncSource (peer failed to write sync_uuid)\n");
2336 *rule_nr = 36;
2337 }
2338
2339 return 1;
2340 }
2341
2342 if (mdev->ldev->md.uuid[UI_BITMAP] == (u64)0 && mdev->p_uuid[UI_BITMAP] != (u64)0) {
2343
2344 if (mdev->agreed_pro_version < 91)
4a23f264 2345 return -1091;
b411b363
PR
2346
2347 if ((mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_BITMAP] & ~((u64)1)) &&
2348 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1))) {
2349 dev_info(DEV, "was SyncTarget, peer missed the resync finished event, corrected peer:\n");
2350
2351 mdev->p_uuid[UI_HISTORY_START + 1] = mdev->p_uuid[UI_HISTORY_START];
2352 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_BITMAP];
2353 mdev->p_uuid[UI_BITMAP] = 0UL;
2354
2355 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2356 *rule_nr = 35;
2357 } else {
2358 dev_info(DEV, "was SyncTarget (failed to write sync_uuid)\n");
2359 *rule_nr = 37;
2360 }
2361
2362 return -1;
2363 }
2364
2365 /* Common power [off|failure] */
2366 rct = (test_bit(CRASHED_PRIMARY, &mdev->flags) ? 1 : 0) +
2367 (mdev->p_uuid[UI_FLAGS] & 2);
2368 /* lowest bit is set when we were primary,
2369 * next bit (weight 2) is set when peer was primary */
2370 *rule_nr = 40;
2371
2372 switch (rct) {
2373 case 0: /* !self_pri && !peer_pri */ return 0;
2374 case 1: /* self_pri && !peer_pri */ return 1;
2375 case 2: /* !self_pri && peer_pri */ return -1;
2376 case 3: /* self_pri && peer_pri */
2377 dc = test_bit(DISCARD_CONCURRENT, &mdev->flags);
2378 return dc ? -1 : 1;
2379 }
2380 }
2381
2382 *rule_nr = 50;
2383 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2384 if (self == peer)
2385 return -1;
2386
2387 *rule_nr = 51;
2388 peer = mdev->p_uuid[UI_HISTORY_START] & ~((u64)1);
2389 if (self == peer) {
4a23f264
PR
2390 if (mdev->agreed_pro_version < 96 ?
2391 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) ==
2392 (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1)) :
2393 peer + UUID_NEW_BM_OFFSET == (mdev->p_uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2394 /* The last P_SYNC_UUID did not get though. Undo the last start of
2395 resync as sync source modifications of the peer's UUIDs. */
2396
2397 if (mdev->agreed_pro_version < 91)
4a23f264 2398 return -1091;
b411b363
PR
2399
2400 mdev->p_uuid[UI_BITMAP] = mdev->p_uuid[UI_HISTORY_START];
2401 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_HISTORY_START + 1];
4a23f264
PR
2402
2403 dev_info(DEV, "Did not got last syncUUID packet, corrected:\n");
2404 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2405
b411b363
PR
2406 return -1;
2407 }
2408 }
2409
2410 *rule_nr = 60;
2411 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2412 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2413 peer = mdev->p_uuid[i] & ~((u64)1);
2414 if (self == peer)
2415 return -2;
2416 }
2417
2418 *rule_nr = 70;
2419 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2420 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2421 if (self == peer)
2422 return 1;
2423
2424 *rule_nr = 71;
2425 self = mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1);
2426 if (self == peer) {
4a23f264
PR
2427 if (mdev->agreed_pro_version < 96 ?
2428 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) ==
2429 (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) :
2430 self + UUID_NEW_BM_OFFSET == (mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2431 /* The last P_SYNC_UUID did not get though. Undo the last start of
2432 resync as sync source modifications of our UUIDs. */
2433
2434 if (mdev->agreed_pro_version < 91)
4a23f264 2435 return -1091;
b411b363
PR
2436
2437 _drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
2438 _drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
2439
4a23f264 2440 dev_info(DEV, "Last syncUUID did not get through, corrected:\n");
b411b363
PR
2441 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2442 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2443
2444 return 1;
2445 }
2446 }
2447
2448
2449 *rule_nr = 80;
d8c2a36b 2450 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
b411b363
PR
2451 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2452 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2453 if (self == peer)
2454 return 2;
2455 }
2456
2457 *rule_nr = 90;
2458 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2459 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2460 if (self == peer && self != ((u64)0))
2461 return 100;
2462
2463 *rule_nr = 100;
2464 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2465 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2466 for (j = UI_HISTORY_START; j <= UI_HISTORY_END; j++) {
2467 peer = mdev->p_uuid[j] & ~((u64)1);
2468 if (self == peer)
2469 return -100;
2470 }
2471 }
2472
2473 return -1000;
2474}
2475
2476/* drbd_sync_handshake() returns the new conn state on success, or
2477 CONN_MASK (-1) on failure.
2478 */
2479static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_role peer_role,
2480 enum drbd_disk_state peer_disk) __must_hold(local)
2481{
2482 int hg, rule_nr;
2483 enum drbd_conns rv = C_MASK;
2484 enum drbd_disk_state mydisk;
2485
2486 mydisk = mdev->state.disk;
2487 if (mydisk == D_NEGOTIATING)
2488 mydisk = mdev->new_state_tmp.disk;
2489
2490 dev_info(DEV, "drbd_sync_handshake:\n");
2491 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid, mdev->comm_bm_set, 0);
2492 drbd_uuid_dump(mdev, "peer", mdev->p_uuid,
2493 mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2494
2495 hg = drbd_uuid_compare(mdev, &rule_nr);
2496
2497 dev_info(DEV, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
2498
2499 if (hg == -1000) {
2500 dev_alert(DEV, "Unrelated data, aborting!\n");
2501 return C_MASK;
2502 }
4a23f264
PR
2503 if (hg < -1000) {
2504 dev_alert(DEV, "To resolve this both sides have to support at least protocol %d\n", -hg - 1000);
b411b363
PR
2505 return C_MASK;
2506 }
2507
2508 if ((mydisk == D_INCONSISTENT && peer_disk > D_INCONSISTENT) ||
2509 (peer_disk == D_INCONSISTENT && mydisk > D_INCONSISTENT)) {
2510 int f = (hg == -100) || abs(hg) == 2;
2511 hg = mydisk > D_INCONSISTENT ? 1 : -1;
2512 if (f)
2513 hg = hg*2;
2514 dev_info(DEV, "Becoming sync %s due to disk states.\n",
2515 hg > 0 ? "source" : "target");
2516 }
2517
3a11a487
AG
2518 if (abs(hg) == 100)
2519 drbd_khelper(mdev, "initial-split-brain");
2520
b411b363
PR
2521 if (hg == 100 || (hg == -100 && mdev->net_conf->always_asbp)) {
2522 int pcount = (mdev->state.role == R_PRIMARY)
2523 + (peer_role == R_PRIMARY);
2524 int forced = (hg == -100);
2525
2526 switch (pcount) {
2527 case 0:
2528 hg = drbd_asb_recover_0p(mdev);
2529 break;
2530 case 1:
2531 hg = drbd_asb_recover_1p(mdev);
2532 break;
2533 case 2:
2534 hg = drbd_asb_recover_2p(mdev);
2535 break;
2536 }
2537 if (abs(hg) < 100) {
2538 dev_warn(DEV, "Split-Brain detected, %d primaries, "
2539 "automatically solved. Sync from %s node\n",
2540 pcount, (hg < 0) ? "peer" : "this");
2541 if (forced) {
2542 dev_warn(DEV, "Doing a full sync, since"
2543 " UUIDs where ambiguous.\n");
2544 hg = hg*2;
2545 }
2546 }
2547 }
2548
2549 if (hg == -100) {
2550 if (mdev->net_conf->want_lose && !(mdev->p_uuid[UI_FLAGS]&1))
2551 hg = -1;
2552 if (!mdev->net_conf->want_lose && (mdev->p_uuid[UI_FLAGS]&1))
2553 hg = 1;
2554
2555 if (abs(hg) < 100)
2556 dev_warn(DEV, "Split-Brain detected, manually solved. "
2557 "Sync from %s node\n",
2558 (hg < 0) ? "peer" : "this");
2559 }
2560
2561 if (hg == -100) {
580b9767
LE
2562 /* FIXME this log message is not correct if we end up here
2563 * after an attempted attach on a diskless node.
2564 * We just refuse to attach -- well, we drop the "connection"
2565 * to that disk, in a way... */
3a11a487 2566 dev_alert(DEV, "Split-Brain detected but unresolved, dropping connection!\n");
b411b363
PR
2567 drbd_khelper(mdev, "split-brain");
2568 return C_MASK;
2569 }
2570
2571 if (hg > 0 && mydisk <= D_INCONSISTENT) {
2572 dev_err(DEV, "I shall become SyncSource, but I am inconsistent!\n");
2573 return C_MASK;
2574 }
2575
2576 if (hg < 0 && /* by intention we do not use mydisk here. */
2577 mdev->state.role == R_PRIMARY && mdev->state.disk >= D_CONSISTENT) {
2578 switch (mdev->net_conf->rr_conflict) {
2579 case ASB_CALL_HELPER:
2580 drbd_khelper(mdev, "pri-lost");
2581 /* fall through */
2582 case ASB_DISCONNECT:
2583 dev_err(DEV, "I shall become SyncTarget, but I am primary!\n");
2584 return C_MASK;
2585 case ASB_VIOLENTLY:
2586 dev_warn(DEV, "Becoming SyncTarget, violating the stable-data"
2587 "assumption\n");
2588 }
2589 }
2590
cf14c2e9
PR
2591 if (mdev->net_conf->dry_run || test_bit(CONN_DRY_RUN, &mdev->flags)) {
2592 if (hg == 0)
2593 dev_info(DEV, "dry-run connect: No resync, would become Connected immediately.\n");
2594 else
2595 dev_info(DEV, "dry-run connect: Would become %s, doing a %s resync.",
2596 drbd_conn_str(hg > 0 ? C_SYNC_SOURCE : C_SYNC_TARGET),
2597 abs(hg) >= 2 ? "full" : "bit-map based");
2598 return C_MASK;
2599 }
2600
b411b363
PR
2601 if (abs(hg) >= 2) {
2602 dev_info(DEV, "Writing the whole bitmap, full sync required after drbd_sync_handshake.\n");
2603 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from sync_handshake"))
2604 return C_MASK;
2605 }
2606
2607 if (hg > 0) { /* become sync source. */
2608 rv = C_WF_BITMAP_S;
2609 } else if (hg < 0) { /* become sync target */
2610 rv = C_WF_BITMAP_T;
2611 } else {
2612 rv = C_CONNECTED;
2613 if (drbd_bm_total_weight(mdev)) {
2614 dev_info(DEV, "No resync, but %lu bits in bitmap!\n",
2615 drbd_bm_total_weight(mdev));
2616 }
2617 }
2618
2619 return rv;
2620}
2621
2622/* returns 1 if invalid */
2623static int cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self)
2624{
2625 /* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
2626 if ((peer == ASB_DISCARD_REMOTE && self == ASB_DISCARD_LOCAL) ||
2627 (self == ASB_DISCARD_REMOTE && peer == ASB_DISCARD_LOCAL))
2628 return 0;
2629
2630 /* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
2631 if (peer == ASB_DISCARD_REMOTE || peer == ASB_DISCARD_LOCAL ||
2632 self == ASB_DISCARD_REMOTE || self == ASB_DISCARD_LOCAL)
2633 return 1;
2634
2635 /* everything else is valid if they are equal on both sides. */
2636 if (peer == self)
2637 return 0;
2638
2639 /* everything es is invalid. */
2640 return 1;
2641}
2642
02918be2 2643static int receive_protocol(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 2644{
02918be2 2645 struct p_protocol *p = &mdev->data.rbuf.protocol;
b411b363 2646 int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
cf14c2e9 2647 int p_want_lose, p_two_primaries, cf;
b411b363
PR
2648 char p_integrity_alg[SHARED_SECRET_MAX] = "";
2649
b411b363
PR
2650 p_proto = be32_to_cpu(p->protocol);
2651 p_after_sb_0p = be32_to_cpu(p->after_sb_0p);
2652 p_after_sb_1p = be32_to_cpu(p->after_sb_1p);
2653 p_after_sb_2p = be32_to_cpu(p->after_sb_2p);
b411b363 2654 p_two_primaries = be32_to_cpu(p->two_primaries);
cf14c2e9
PR
2655 cf = be32_to_cpu(p->conn_flags);
2656 p_want_lose = cf & CF_WANT_LOSE;
2657
2658 clear_bit(CONN_DRY_RUN, &mdev->flags);
2659
2660 if (cf & CF_DRY_RUN)
2661 set_bit(CONN_DRY_RUN, &mdev->flags);
b411b363
PR
2662
2663 if (p_proto != mdev->net_conf->wire_protocol) {
2664 dev_err(DEV, "incompatible communication protocols\n");
2665 goto disconnect;
2666 }
2667
2668 if (cmp_after_sb(p_after_sb_0p, mdev->net_conf->after_sb_0p)) {
2669 dev_err(DEV, "incompatible after-sb-0pri settings\n");
2670 goto disconnect;
2671 }
2672
2673 if (cmp_after_sb(p_after_sb_1p, mdev->net_conf->after_sb_1p)) {
2674 dev_err(DEV, "incompatible after-sb-1pri settings\n");
2675 goto disconnect;
2676 }
2677
2678 if (cmp_after_sb(p_after_sb_2p, mdev->net_conf->after_sb_2p)) {
2679 dev_err(DEV, "incompatible after-sb-2pri settings\n");
2680 goto disconnect;
2681 }
2682
2683 if (p_want_lose && mdev->net_conf->want_lose) {
2684 dev_err(DEV, "both sides have the 'want_lose' flag set\n");
2685 goto disconnect;
2686 }
2687
2688 if (p_two_primaries != mdev->net_conf->two_primaries) {
2689 dev_err(DEV, "incompatible setting of the two-primaries options\n");
2690 goto disconnect;
2691 }
2692
2693 if (mdev->agreed_pro_version >= 87) {
2694 unsigned char *my_alg = mdev->net_conf->integrity_alg;
2695
2696 if (drbd_recv(mdev, p_integrity_alg, data_size) != data_size)
81e84650 2697 return false;
b411b363
PR
2698
2699 p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
2700 if (strcmp(p_integrity_alg, my_alg)) {
2701 dev_err(DEV, "incompatible setting of the data-integrity-alg\n");
2702 goto disconnect;
2703 }
2704 dev_info(DEV, "data-integrity-alg: %s\n",
2705 my_alg[0] ? my_alg : (unsigned char *)"<not-used>");
2706 }
2707
81e84650 2708 return true;
b411b363
PR
2709
2710disconnect:
2711 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2712 return false;
b411b363
PR
2713}
2714
2715/* helper function
2716 * input: alg name, feature name
2717 * return: NULL (alg name was "")
2718 * ERR_PTR(error) if something goes wrong
2719 * or the crypto hash ptr, if it worked out ok. */
2720struct crypto_hash *drbd_crypto_alloc_digest_safe(const struct drbd_conf *mdev,
2721 const char *alg, const char *name)
2722{
2723 struct crypto_hash *tfm;
2724
2725 if (!alg[0])
2726 return NULL;
2727
2728 tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC);
2729 if (IS_ERR(tfm)) {
2730 dev_err(DEV, "Can not allocate \"%s\" as %s (reason: %ld)\n",
2731 alg, name, PTR_ERR(tfm));
2732 return tfm;
2733 }
2734 if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
2735 crypto_free_hash(tfm);
2736 dev_err(DEV, "\"%s\" is not a digest (%s)\n", alg, name);
2737 return ERR_PTR(-EINVAL);
2738 }
2739 return tfm;
2740}
2741
02918be2 2742static int receive_SyncParam(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int packet_size)
b411b363 2743{
81e84650 2744 int ok = true;
02918be2 2745 struct p_rs_param_95 *p = &mdev->data.rbuf.rs_param_95;
b411b363
PR
2746 unsigned int header_size, data_size, exp_max_sz;
2747 struct crypto_hash *verify_tfm = NULL;
2748 struct crypto_hash *csums_tfm = NULL;
2749 const int apv = mdev->agreed_pro_version;
778f271d
PR
2750 int *rs_plan_s = NULL;
2751 int fifo_size = 0;
b411b363
PR
2752
2753 exp_max_sz = apv <= 87 ? sizeof(struct p_rs_param)
2754 : apv == 88 ? sizeof(struct p_rs_param)
2755 + SHARED_SECRET_MAX
8e26f9cc
PR
2756 : apv <= 94 ? sizeof(struct p_rs_param_89)
2757 : /* apv >= 95 */ sizeof(struct p_rs_param_95);
b411b363 2758
02918be2 2759 if (packet_size > exp_max_sz) {
b411b363 2760 dev_err(DEV, "SyncParam packet too long: received %u, expected <= %u bytes\n",
02918be2 2761 packet_size, exp_max_sz);
81e84650 2762 return false;
b411b363
PR
2763 }
2764
2765 if (apv <= 88) {
02918be2
PR
2766 header_size = sizeof(struct p_rs_param) - sizeof(struct p_header80);
2767 data_size = packet_size - header_size;
8e26f9cc 2768 } else if (apv <= 94) {
02918be2
PR
2769 header_size = sizeof(struct p_rs_param_89) - sizeof(struct p_header80);
2770 data_size = packet_size - header_size;
b411b363 2771 D_ASSERT(data_size == 0);
8e26f9cc 2772 } else {
02918be2
PR
2773 header_size = sizeof(struct p_rs_param_95) - sizeof(struct p_header80);
2774 data_size = packet_size - header_size;
b411b363
PR
2775 D_ASSERT(data_size == 0);
2776 }
2777
2778 /* initialize verify_alg and csums_alg */
2779 memset(p->verify_alg, 0, 2 * SHARED_SECRET_MAX);
2780
02918be2 2781 if (drbd_recv(mdev, &p->head.payload, header_size) != header_size)
81e84650 2782 return false;
b411b363
PR
2783
2784 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2785
2786 if (apv >= 88) {
2787 if (apv == 88) {
2788 if (data_size > SHARED_SECRET_MAX) {
2789 dev_err(DEV, "verify-alg too long, "
2790 "peer wants %u, accepting only %u byte\n",
2791 data_size, SHARED_SECRET_MAX);
81e84650 2792 return false;
b411b363
PR
2793 }
2794
2795 if (drbd_recv(mdev, p->verify_alg, data_size) != data_size)
81e84650 2796 return false;
b411b363
PR
2797
2798 /* we expect NUL terminated string */
2799 /* but just in case someone tries to be evil */
2800 D_ASSERT(p->verify_alg[data_size-1] == 0);
2801 p->verify_alg[data_size-1] = 0;
2802
2803 } else /* apv >= 89 */ {
2804 /* we still expect NUL terminated strings */
2805 /* but just in case someone tries to be evil */
2806 D_ASSERT(p->verify_alg[SHARED_SECRET_MAX-1] == 0);
2807 D_ASSERT(p->csums_alg[SHARED_SECRET_MAX-1] == 0);
2808 p->verify_alg[SHARED_SECRET_MAX-1] = 0;
2809 p->csums_alg[SHARED_SECRET_MAX-1] = 0;
2810 }
2811
2812 if (strcmp(mdev->sync_conf.verify_alg, p->verify_alg)) {
2813 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2814 dev_err(DEV, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
2815 mdev->sync_conf.verify_alg, p->verify_alg);
2816 goto disconnect;
2817 }
2818 verify_tfm = drbd_crypto_alloc_digest_safe(mdev,
2819 p->verify_alg, "verify-alg");
2820 if (IS_ERR(verify_tfm)) {
2821 verify_tfm = NULL;
2822 goto disconnect;
2823 }
2824 }
2825
2826 if (apv >= 89 && strcmp(mdev->sync_conf.csums_alg, p->csums_alg)) {
2827 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2828 dev_err(DEV, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
2829 mdev->sync_conf.csums_alg, p->csums_alg);
2830 goto disconnect;
2831 }
2832 csums_tfm = drbd_crypto_alloc_digest_safe(mdev,
2833 p->csums_alg, "csums-alg");
2834 if (IS_ERR(csums_tfm)) {
2835 csums_tfm = NULL;
2836 goto disconnect;
2837 }
2838 }
2839
8e26f9cc
PR
2840 if (apv > 94) {
2841 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2842 mdev->sync_conf.c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
2843 mdev->sync_conf.c_delay_target = be32_to_cpu(p->c_delay_target);
2844 mdev->sync_conf.c_fill_target = be32_to_cpu(p->c_fill_target);
2845 mdev->sync_conf.c_max_rate = be32_to_cpu(p->c_max_rate);
778f271d
PR
2846
2847 fifo_size = (mdev->sync_conf.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
2848 if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
2849 rs_plan_s = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
2850 if (!rs_plan_s) {
2851 dev_err(DEV, "kmalloc of fifo_buffer failed");
2852 goto disconnect;
2853 }
2854 }
8e26f9cc 2855 }
b411b363
PR
2856
2857 spin_lock(&mdev->peer_seq_lock);
2858 /* lock against drbd_nl_syncer_conf() */
2859 if (verify_tfm) {
2860 strcpy(mdev->sync_conf.verify_alg, p->verify_alg);
2861 mdev->sync_conf.verify_alg_len = strlen(p->verify_alg) + 1;
2862 crypto_free_hash(mdev->verify_tfm);
2863 mdev->verify_tfm = verify_tfm;
2864 dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
2865 }
2866 if (csums_tfm) {
2867 strcpy(mdev->sync_conf.csums_alg, p->csums_alg);
2868 mdev->sync_conf.csums_alg_len = strlen(p->csums_alg) + 1;
2869 crypto_free_hash(mdev->csums_tfm);
2870 mdev->csums_tfm = csums_tfm;
2871 dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
2872 }
778f271d
PR
2873 if (fifo_size != mdev->rs_plan_s.size) {
2874 kfree(mdev->rs_plan_s.values);
2875 mdev->rs_plan_s.values = rs_plan_s;
2876 mdev->rs_plan_s.size = fifo_size;
2877 mdev->rs_planed = 0;
2878 }
b411b363
PR
2879 spin_unlock(&mdev->peer_seq_lock);
2880 }
2881
2882 return ok;
2883disconnect:
2884 /* just for completeness: actually not needed,
2885 * as this is not reached if csums_tfm was ok. */
2886 crypto_free_hash(csums_tfm);
2887 /* but free the verify_tfm again, if csums_tfm did not work out */
2888 crypto_free_hash(verify_tfm);
2889 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2890 return false;
b411b363
PR
2891}
2892
2893static void drbd_setup_order_type(struct drbd_conf *mdev, int peer)
2894{
2895 /* sorry, we currently have no working implementation
2896 * of distributed TCQ */
2897}
2898
2899/* warn if the arguments differ by more than 12.5% */
2900static void warn_if_differ_considerably(struct drbd_conf *mdev,
2901 const char *s, sector_t a, sector_t b)
2902{
2903 sector_t d;
2904 if (a == 0 || b == 0)
2905 return;
2906 d = (a > b) ? (a - b) : (b - a);
2907 if (d > (a>>3) || d > (b>>3))
2908 dev_warn(DEV, "Considerable difference in %s: %llus vs. %llus\n", s,
2909 (unsigned long long)a, (unsigned long long)b);
2910}
2911
02918be2 2912static int receive_sizes(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 2913{
02918be2 2914 struct p_sizes *p = &mdev->data.rbuf.sizes;
b411b363 2915 enum determine_dev_size dd = unchanged;
1816a2b4 2916 unsigned int max_bio_size;
b411b363
PR
2917 sector_t p_size, p_usize, my_usize;
2918 int ldsc = 0; /* local disk size changed */
e89b591c 2919 enum dds_flags ddsf;
b411b363 2920
b411b363
PR
2921 p_size = be64_to_cpu(p->d_size);
2922 p_usize = be64_to_cpu(p->u_size);
2923
2924 if (p_size == 0 && mdev->state.disk == D_DISKLESS) {
2925 dev_err(DEV, "some backing storage is needed\n");
2926 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2927 return false;
b411b363
PR
2928 }
2929
2930 /* just store the peer's disk size for now.
2931 * we still need to figure out whether we accept that. */
2932 mdev->p_size = p_size;
2933
b411b363
PR
2934 if (get_ldev(mdev)) {
2935 warn_if_differ_considerably(mdev, "lower level device sizes",
2936 p_size, drbd_get_max_capacity(mdev->ldev));
2937 warn_if_differ_considerably(mdev, "user requested size",
2938 p_usize, mdev->ldev->dc.disk_size);
2939
2940 /* if this is the first connect, or an otherwise expected
2941 * param exchange, choose the minimum */
2942 if (mdev->state.conn == C_WF_REPORT_PARAMS)
2943 p_usize = min_not_zero((sector_t)mdev->ldev->dc.disk_size,
2944 p_usize);
2945
2946 my_usize = mdev->ldev->dc.disk_size;
2947
2948 if (mdev->ldev->dc.disk_size != p_usize) {
2949 mdev->ldev->dc.disk_size = p_usize;
2950 dev_info(DEV, "Peer sets u_size to %lu sectors\n",
2951 (unsigned long)mdev->ldev->dc.disk_size);
2952 }
2953
2954 /* Never shrink a device with usable data during connect.
2955 But allow online shrinking if we are connected. */
a393db6f 2956 if (drbd_new_dev_size(mdev, mdev->ldev, 0) <
b411b363
PR
2957 drbd_get_capacity(mdev->this_bdev) &&
2958 mdev->state.disk >= D_OUTDATED &&
2959 mdev->state.conn < C_CONNECTED) {
2960 dev_err(DEV, "The peer's disk size is too small!\n");
2961 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
2962 mdev->ldev->dc.disk_size = my_usize;
2963 put_ldev(mdev);
81e84650 2964 return false;
b411b363
PR
2965 }
2966 put_ldev(mdev);
2967 }
b411b363 2968
e89b591c 2969 ddsf = be16_to_cpu(p->dds_flags);
b411b363 2970 if (get_ldev(mdev)) {
e89b591c 2971 dd = drbd_determin_dev_size(mdev, ddsf);
b411b363
PR
2972 put_ldev(mdev);
2973 if (dd == dev_size_error)
81e84650 2974 return false;
b411b363
PR
2975 drbd_md_sync(mdev);
2976 } else {
2977 /* I am diskless, need to accept the peer's size. */
2978 drbd_set_my_capacity(mdev, p_size);
2979 }
2980
b411b363
PR
2981 if (get_ldev(mdev)) {
2982 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) {
2983 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
2984 ldsc = 1;
2985 }
2986
a1c88d0d 2987 if (mdev->agreed_pro_version < 94)
1816a2b4 2988 max_bio_size = be32_to_cpu(p->max_bio_size);
8979d9c9 2989 else if (mdev->agreed_pro_version == 94)
1816a2b4 2990 max_bio_size = DRBD_MAX_SIZE_H80_PACKET;
a1c88d0d 2991 else /* drbd 8.3.8 onwards */
1816a2b4 2992 max_bio_size = DRBD_MAX_BIO_SIZE;
a1c88d0d 2993
1816a2b4
LE
2994 if (max_bio_size != queue_max_hw_sectors(mdev->rq_queue) << 9)
2995 drbd_setup_queue_param(mdev, max_bio_size);
b411b363 2996
e89b591c 2997 drbd_setup_order_type(mdev, be16_to_cpu(p->queue_order_type));
b411b363
PR
2998 put_ldev(mdev);
2999 }
3000
3001 if (mdev->state.conn > C_WF_REPORT_PARAMS) {
3002 if (be64_to_cpu(p->c_size) !=
3003 drbd_get_capacity(mdev->this_bdev) || ldsc) {
3004 /* we have different sizes, probably peer
3005 * needs to know my new size... */
e89b591c 3006 drbd_send_sizes(mdev, 0, ddsf);
b411b363
PR
3007 }
3008 if (test_and_clear_bit(RESIZE_PENDING, &mdev->flags) ||
3009 (dd == grew && mdev->state.conn == C_CONNECTED)) {
3010 if (mdev->state.pdsk >= D_INCONSISTENT &&
e89b591c
PR
3011 mdev->state.disk >= D_INCONSISTENT) {
3012 if (ddsf & DDSF_NO_RESYNC)
3013 dev_info(DEV, "Resync of new storage suppressed with --assume-clean\n");
3014 else
3015 resync_after_online_grow(mdev);
3016 } else
b411b363
PR
3017 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
3018 }
3019 }
3020
81e84650 3021 return true;
b411b363
PR
3022}
3023
02918be2 3024static int receive_uuids(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 3025{
02918be2 3026 struct p_uuids *p = &mdev->data.rbuf.uuids;
b411b363
PR
3027 u64 *p_uuid;
3028 int i;
3029
b411b363
PR
3030 p_uuid = kmalloc(sizeof(u64)*UI_EXTENDED_SIZE, GFP_NOIO);
3031
3032 for (i = UI_CURRENT; i < UI_EXTENDED_SIZE; i++)
3033 p_uuid[i] = be64_to_cpu(p->uuid[i]);
3034
3035 kfree(mdev->p_uuid);
3036 mdev->p_uuid = p_uuid;
3037
3038 if (mdev->state.conn < C_CONNECTED &&
3039 mdev->state.disk < D_INCONSISTENT &&
3040 mdev->state.role == R_PRIMARY &&
3041 (mdev->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) {
3042 dev_err(DEV, "Can only connect to data with current UUID=%016llX\n",
3043 (unsigned long long)mdev->ed_uuid);
3044 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3045 return false;
b411b363
PR
3046 }
3047
3048 if (get_ldev(mdev)) {
3049 int skip_initial_sync =
3050 mdev->state.conn == C_CONNECTED &&
3051 mdev->agreed_pro_version >= 90 &&
3052 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED &&
3053 (p_uuid[UI_FLAGS] & 8);
3054 if (skip_initial_sync) {
3055 dev_info(DEV, "Accepted new current UUID, preparing to skip initial sync\n");
3056 drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
3057 "clear_n_write from receive_uuids");
3058 _drbd_uuid_set(mdev, UI_CURRENT, p_uuid[UI_CURRENT]);
3059 _drbd_uuid_set(mdev, UI_BITMAP, 0);
3060 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
3061 CS_VERBOSE, NULL);
3062 drbd_md_sync(mdev);
3063 }
3064 put_ldev(mdev);
18a50fa2
PR
3065 } else if (mdev->state.disk < D_INCONSISTENT &&
3066 mdev->state.role == R_PRIMARY) {
3067 /* I am a diskless primary, the peer just created a new current UUID
3068 for me. */
3069 drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
b411b363
PR
3070 }
3071
3072 /* Before we test for the disk state, we should wait until an eventually
3073 ongoing cluster wide state change is finished. That is important if
3074 we are primary and are detaching from our disk. We need to see the
3075 new disk state... */
3076 wait_event(mdev->misc_wait, !test_bit(CLUSTER_ST_CHANGE, &mdev->flags));
3077 if (mdev->state.conn >= C_CONNECTED && mdev->state.disk < D_INCONSISTENT)
3078 drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
3079
81e84650 3080 return true;
b411b363
PR
3081}
3082
3083/**
3084 * convert_state() - Converts the peer's view of the cluster state to our point of view
3085 * @ps: The state as seen by the peer.
3086 */
3087static union drbd_state convert_state(union drbd_state ps)
3088{
3089 union drbd_state ms;
3090
3091 static enum drbd_conns c_tab[] = {
3092 [C_CONNECTED] = C_CONNECTED,
3093
3094 [C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
3095 [C_STARTING_SYNC_T] = C_STARTING_SYNC_S,
3096 [C_DISCONNECTING] = C_TEAR_DOWN, /* C_NETWORK_FAILURE, */
3097 [C_VERIFY_S] = C_VERIFY_T,
3098 [C_MASK] = C_MASK,
3099 };
3100
3101 ms.i = ps.i;
3102
3103 ms.conn = c_tab[ps.conn];
3104 ms.peer = ps.role;
3105 ms.role = ps.peer;
3106 ms.pdsk = ps.disk;
3107 ms.disk = ps.pdsk;
3108 ms.peer_isp = (ps.aftr_isp | ps.user_isp);
3109
3110 return ms;
3111}
3112
02918be2 3113static int receive_req_state(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 3114{
02918be2 3115 struct p_req_state *p = &mdev->data.rbuf.req_state;
b411b363 3116 union drbd_state mask, val;
bf885f8a 3117 enum drbd_state_rv rv;
b411b363 3118
b411b363
PR
3119 mask.i = be32_to_cpu(p->mask);
3120 val.i = be32_to_cpu(p->val);
3121
3122 if (test_bit(DISCARD_CONCURRENT, &mdev->flags) &&
3123 test_bit(CLUSTER_ST_CHANGE, &mdev->flags)) {
3124 drbd_send_sr_reply(mdev, SS_CONCURRENT_ST_CHG);
81e84650 3125 return true;
b411b363
PR
3126 }
3127
3128 mask = convert_state(mask);
3129 val = convert_state(val);
3130
3131 rv = drbd_change_state(mdev, CS_VERBOSE, mask, val);
3132
3133 drbd_send_sr_reply(mdev, rv);
3134 drbd_md_sync(mdev);
3135
81e84650 3136 return true;
b411b363
PR
3137}
3138
02918be2 3139static int receive_state(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 3140{
02918be2 3141 struct p_state *p = &mdev->data.rbuf.state;
4ac4aada 3142 union drbd_state os, ns, peer_state;
b411b363 3143 enum drbd_disk_state real_peer_disk;
65d922c3 3144 enum chg_state_flags cs_flags;
b411b363
PR
3145 int rv;
3146
b411b363
PR
3147 peer_state.i = be32_to_cpu(p->state);
3148
3149 real_peer_disk = peer_state.disk;
3150 if (peer_state.disk == D_NEGOTIATING) {
3151 real_peer_disk = mdev->p_uuid[UI_FLAGS] & 4 ? D_INCONSISTENT : D_CONSISTENT;
3152 dev_info(DEV, "real peer disk state = %s\n", drbd_disk_str(real_peer_disk));
3153 }
3154
3155 spin_lock_irq(&mdev->req_lock);
3156 retry:
4ac4aada 3157 os = ns = mdev->state;
b411b363
PR
3158 spin_unlock_irq(&mdev->req_lock);
3159
e9ef7bb6
LE
3160 /* peer says his disk is uptodate, while we think it is inconsistent,
3161 * and this happens while we think we have a sync going on. */
3162 if (os.pdsk == D_INCONSISTENT && real_peer_disk == D_UP_TO_DATE &&
3163 os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
3164 /* If we are (becoming) SyncSource, but peer is still in sync
3165 * preparation, ignore its uptodate-ness to avoid flapping, it
3166 * will change to inconsistent once the peer reaches active
3167 * syncing states.
3168 * It may have changed syncer-paused flags, however, so we
3169 * cannot ignore this completely. */
3170 if (peer_state.conn > C_CONNECTED &&
3171 peer_state.conn < C_SYNC_SOURCE)
3172 real_peer_disk = D_INCONSISTENT;
3173
3174 /* if peer_state changes to connected at the same time,
3175 * it explicitly notifies us that it finished resync.
3176 * Maybe we should finish it up, too? */
3177 else if (os.conn >= C_SYNC_SOURCE &&
3178 peer_state.conn == C_CONNECTED) {
3179 if (drbd_bm_total_weight(mdev) <= mdev->rs_failed)
3180 drbd_resync_finished(mdev);
81e84650 3181 return true;
e9ef7bb6
LE
3182 }
3183 }
3184
3185 /* peer says his disk is inconsistent, while we think it is uptodate,
3186 * and this happens while the peer still thinks we have a sync going on,
3187 * but we think we are already done with the sync.
3188 * We ignore this to avoid flapping pdsk.
3189 * This should not happen, if the peer is a recent version of drbd. */
3190 if (os.pdsk == D_UP_TO_DATE && real_peer_disk == D_INCONSISTENT &&
3191 os.conn == C_CONNECTED && peer_state.conn > C_SYNC_SOURCE)
3192 real_peer_disk = D_UP_TO_DATE;
3193
4ac4aada
LE
3194 if (ns.conn == C_WF_REPORT_PARAMS)
3195 ns.conn = C_CONNECTED;
b411b363 3196
67531718
PR
3197 if (peer_state.conn == C_AHEAD)
3198 ns.conn = C_BEHIND;
3199
b411b363
PR
3200 if (mdev->p_uuid && peer_state.disk >= D_NEGOTIATING &&
3201 get_ldev_if_state(mdev, D_NEGOTIATING)) {
3202 int cr; /* consider resync */
3203
3204 /* if we established a new connection */
4ac4aada 3205 cr = (os.conn < C_CONNECTED);
b411b363
PR
3206 /* if we had an established connection
3207 * and one of the nodes newly attaches a disk */
4ac4aada 3208 cr |= (os.conn == C_CONNECTED &&
b411b363 3209 (peer_state.disk == D_NEGOTIATING ||
4ac4aada 3210 os.disk == D_NEGOTIATING));
b411b363
PR
3211 /* if we have both been inconsistent, and the peer has been
3212 * forced to be UpToDate with --overwrite-data */
3213 cr |= test_bit(CONSIDER_RESYNC, &mdev->flags);
3214 /* if we had been plain connected, and the admin requested to
3215 * start a sync by "invalidate" or "invalidate-remote" */
4ac4aada 3216 cr |= (os.conn == C_CONNECTED &&
b411b363
PR
3217 (peer_state.conn >= C_STARTING_SYNC_S &&
3218 peer_state.conn <= C_WF_BITMAP_T));
3219
3220 if (cr)
4ac4aada 3221 ns.conn = drbd_sync_handshake(mdev, peer_state.role, real_peer_disk);
b411b363
PR
3222
3223 put_ldev(mdev);
4ac4aada
LE
3224 if (ns.conn == C_MASK) {
3225 ns.conn = C_CONNECTED;
b411b363 3226 if (mdev->state.disk == D_NEGOTIATING) {
82f59cc6 3227 drbd_force_state(mdev, NS(disk, D_FAILED));
b411b363
PR
3228 } else if (peer_state.disk == D_NEGOTIATING) {
3229 dev_err(DEV, "Disk attach process on the peer node was aborted.\n");
3230 peer_state.disk = D_DISKLESS;
580b9767 3231 real_peer_disk = D_DISKLESS;
b411b363 3232 } else {
cf14c2e9 3233 if (test_and_clear_bit(CONN_DRY_RUN, &mdev->flags))
81e84650 3234 return false;
4ac4aada 3235 D_ASSERT(os.conn == C_WF_REPORT_PARAMS);
b411b363 3236 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3237 return false;
b411b363
PR
3238 }
3239 }
3240 }
3241
3242 spin_lock_irq(&mdev->req_lock);
4ac4aada 3243 if (mdev->state.i != os.i)
b411b363
PR
3244 goto retry;
3245 clear_bit(CONSIDER_RESYNC, &mdev->flags);
b411b363
PR
3246 ns.peer = peer_state.role;
3247 ns.pdsk = real_peer_disk;
3248 ns.peer_isp = (peer_state.aftr_isp | peer_state.user_isp);
4ac4aada 3249 if ((ns.conn == C_CONNECTED || ns.conn == C_WF_BITMAP_S) && ns.disk == D_NEGOTIATING)
b411b363 3250 ns.disk = mdev->new_state_tmp.disk;
4ac4aada
LE
3251 cs_flags = CS_VERBOSE + (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED ? 0 : CS_HARD);
3252 if (ns.pdsk == D_CONSISTENT && is_susp(ns) && ns.conn == C_CONNECTED && os.conn < C_CONNECTED &&
481c6f50
PR
3253 test_bit(NEW_CUR_UUID, &mdev->flags)) {
3254 /* Do not allow tl_restart(resend) for a rebooted peer. We can only allow this
3255 for temporal network outages! */
3256 spin_unlock_irq(&mdev->req_lock);
3257 dev_err(DEV, "Aborting Connect, can not thaw IO with an only Consistent peer\n");
3258 tl_clear(mdev);
3259 drbd_uuid_new_current(mdev);
3260 clear_bit(NEW_CUR_UUID, &mdev->flags);
3261 drbd_force_state(mdev, NS2(conn, C_PROTOCOL_ERROR, susp, 0));
81e84650 3262 return false;
481c6f50 3263 }
65d922c3 3264 rv = _drbd_set_state(mdev, ns, cs_flags, NULL);
b411b363
PR
3265 ns = mdev->state;
3266 spin_unlock_irq(&mdev->req_lock);
3267
3268 if (rv < SS_SUCCESS) {
3269 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3270 return false;
b411b363
PR
3271 }
3272
4ac4aada
LE
3273 if (os.conn > C_WF_REPORT_PARAMS) {
3274 if (ns.conn > C_CONNECTED && peer_state.conn <= C_CONNECTED &&
b411b363
PR
3275 peer_state.disk != D_NEGOTIATING ) {
3276 /* we want resync, peer has not yet decided to sync... */
3277 /* Nowadays only used when forcing a node into primary role and
3278 setting its disk to UpToDate with that */
3279 drbd_send_uuids(mdev);
3280 drbd_send_state(mdev);
3281 }
3282 }
3283
3284 mdev->net_conf->want_lose = 0;
3285
3286 drbd_md_sync(mdev); /* update connected indicator, la_size, ... */
3287
81e84650 3288 return true;
b411b363
PR
3289}
3290
02918be2 3291static int receive_sync_uuid(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363 3292{
02918be2 3293 struct p_rs_uuid *p = &mdev->data.rbuf.rs_uuid;
b411b363
PR
3294
3295 wait_event(mdev->misc_wait,
3296 mdev->state.conn == C_WF_SYNC_UUID ||
c4752ef1 3297 mdev->state.conn == C_BEHIND ||
b411b363
PR
3298 mdev->state.conn < C_CONNECTED ||
3299 mdev->state.disk < D_NEGOTIATING);
3300
3301 /* D_ASSERT( mdev->state.conn == C_WF_SYNC_UUID ); */
3302
b411b363
PR
3303 /* Here the _drbd_uuid_ functions are right, current should
3304 _not_ be rotated into the history */
3305 if (get_ldev_if_state(mdev, D_NEGOTIATING)) {
3306 _drbd_uuid_set(mdev, UI_CURRENT, be64_to_cpu(p->uuid));
3307 _drbd_uuid_set(mdev, UI_BITMAP, 0UL);
3308
3309 drbd_start_resync(mdev, C_SYNC_TARGET);
3310
3311 put_ldev(mdev);
3312 } else
3313 dev_err(DEV, "Ignoring SyncUUID packet!\n");
3314
81e84650 3315 return true;
b411b363
PR
3316}
3317
2c46407d
AG
3318/**
3319 * receive_bitmap_plain
3320 *
3321 * Return 0 when done, 1 when another iteration is needed, and a negative error
3322 * code upon failure.
3323 */
3324static int
02918be2
PR
3325receive_bitmap_plain(struct drbd_conf *mdev, unsigned int data_size,
3326 unsigned long *buffer, struct bm_xfer_ctx *c)
b411b363
PR
3327{
3328 unsigned num_words = min_t(size_t, BM_PACKET_WORDS, c->bm_words - c->word_offset);
3329 unsigned want = num_words * sizeof(long);
2c46407d 3330 int err;
b411b363 3331
02918be2
PR
3332 if (want != data_size) {
3333 dev_err(DEV, "%s:want (%u) != data_size (%u)\n", __func__, want, data_size);
2c46407d 3334 return -EIO;
b411b363
PR
3335 }
3336 if (want == 0)
2c46407d
AG
3337 return 0;
3338 err = drbd_recv(mdev, buffer, want);
3339 if (err != want) {
3340 if (err >= 0)
3341 err = -EIO;
3342 return err;
3343 }
b411b363
PR
3344
3345 drbd_bm_merge_lel(mdev, c->word_offset, num_words, buffer);
3346
3347 c->word_offset += num_words;
3348 c->bit_offset = c->word_offset * BITS_PER_LONG;
3349 if (c->bit_offset > c->bm_bits)
3350 c->bit_offset = c->bm_bits;
3351
2c46407d 3352 return 1;
b411b363
PR
3353}
3354
2c46407d
AG
3355/**
3356 * recv_bm_rle_bits
3357 *
3358 * Return 0 when done, 1 when another iteration is needed, and a negative error
3359 * code upon failure.
3360 */
3361static int
b411b363
PR
3362recv_bm_rle_bits(struct drbd_conf *mdev,
3363 struct p_compressed_bm *p,
3364 struct bm_xfer_ctx *c)
3365{
3366 struct bitstream bs;
3367 u64 look_ahead;
3368 u64 rl;
3369 u64 tmp;
3370 unsigned long s = c->bit_offset;
3371 unsigned long e;
004352fa 3372 int len = be16_to_cpu(p->head.length) - (sizeof(*p) - sizeof(p->head));
b411b363
PR
3373 int toggle = DCBP_get_start(p);
3374 int have;
3375 int bits;
3376
3377 bitstream_init(&bs, p->code, len, DCBP_get_pad_bits(p));
3378
3379 bits = bitstream_get_bits(&bs, &look_ahead, 64);
3380 if (bits < 0)
2c46407d 3381 return -EIO;
b411b363
PR
3382
3383 for (have = bits; have > 0; s += rl, toggle = !toggle) {
3384 bits = vli_decode_bits(&rl, look_ahead);
3385 if (bits <= 0)
2c46407d 3386 return -EIO;
b411b363
PR
3387
3388 if (toggle) {
3389 e = s + rl -1;
3390 if (e >= c->bm_bits) {
3391 dev_err(DEV, "bitmap overflow (e:%lu) while decoding bm RLE packet\n", e);
2c46407d 3392 return -EIO;
b411b363
PR
3393 }
3394 _drbd_bm_set_bits(mdev, s, e);
3395 }
3396
3397 if (have < bits) {
3398 dev_err(DEV, "bitmap decoding error: h:%d b:%d la:0x%08llx l:%u/%u\n",
3399 have, bits, look_ahead,
3400 (unsigned int)(bs.cur.b - p->code),
3401 (unsigned int)bs.buf_len);
2c46407d 3402 return -EIO;
b411b363
PR
3403 }
3404 look_ahead >>= bits;
3405 have -= bits;
3406
3407 bits = bitstream_get_bits(&bs, &tmp, 64 - have);
3408 if (bits < 0)
2c46407d 3409 return -EIO;
b411b363
PR
3410 look_ahead |= tmp << have;
3411 have += bits;
3412 }
3413
3414 c->bit_offset = s;
3415 bm_xfer_ctx_bit_to_word_offset(c);
3416
2c46407d 3417 return (s != c->bm_bits);
b411b363
PR
3418}
3419
2c46407d
AG
3420/**
3421 * decode_bitmap_c
3422 *
3423 * Return 0 when done, 1 when another iteration is needed, and a negative error
3424 * code upon failure.
3425 */
3426static int
b411b363
PR
3427decode_bitmap_c(struct drbd_conf *mdev,
3428 struct p_compressed_bm *p,
3429 struct bm_xfer_ctx *c)
3430{
3431 if (DCBP_get_code(p) == RLE_VLI_Bits)
3432 return recv_bm_rle_bits(mdev, p, c);
3433
3434 /* other variants had been implemented for evaluation,
3435 * but have been dropped as this one turned out to be "best"
3436 * during all our tests. */
3437
3438 dev_err(DEV, "receive_bitmap_c: unknown encoding %u\n", p->encoding);
3439 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
2c46407d 3440 return -EIO;
b411b363
PR
3441}
3442
3443void INFO_bm_xfer_stats(struct drbd_conf *mdev,
3444 const char *direction, struct bm_xfer_ctx *c)
3445{
3446 /* what would it take to transfer it "plaintext" */
0b70a13d 3447 unsigned plain = sizeof(struct p_header80) *
b411b363
PR
3448 ((c->bm_words+BM_PACKET_WORDS-1)/BM_PACKET_WORDS+1)
3449 + c->bm_words * sizeof(long);
3450 unsigned total = c->bytes[0] + c->bytes[1];
3451 unsigned r;
3452
3453 /* total can not be zero. but just in case: */
3454 if (total == 0)
3455 return;
3456
3457 /* don't report if not compressed */
3458 if (total >= plain)
3459 return;
3460
3461 /* total < plain. check for overflow, still */
3462 r = (total > UINT_MAX/1000) ? (total / (plain/1000))
3463 : (1000 * total / plain);
3464
3465 if (r > 1000)
3466 r = 1000;
3467
3468 r = 1000 - r;
3469 dev_info(DEV, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), "
3470 "total %u; compression: %u.%u%%\n",
3471 direction,
3472 c->bytes[1], c->packets[1],
3473 c->bytes[0], c->packets[0],
3474 total, r/10, r % 10);
3475}
3476
3477/* Since we are processing the bitfield from lower addresses to higher,
3478 it does not matter if the process it in 32 bit chunks or 64 bit
3479 chunks as long as it is little endian. (Understand it as byte stream,
3480 beginning with the lowest byte...) If we would use big endian
3481 we would need to process it from the highest address to the lowest,
3482 in order to be agnostic to the 32 vs 64 bits issue.
3483
3484 returns 0 on failure, 1 if we successfully received it. */
02918be2 3485static int receive_bitmap(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363
PR
3486{
3487 struct bm_xfer_ctx c;
3488 void *buffer;
2c46407d 3489 int err;
81e84650 3490 int ok = false;
02918be2 3491 struct p_header80 *h = &mdev->data.rbuf.header.h80;
b411b363 3492
3719094e 3493 /* drbd_bm_lock(mdev, "receive bitmap"); By intention no bm_lock */
b411b363
PR
3494
3495 /* maybe we should use some per thread scratch page,
3496 * and allocate that during initial device creation? */
3497 buffer = (unsigned long *) __get_free_page(GFP_NOIO);
3498 if (!buffer) {
3499 dev_err(DEV, "failed to allocate one page buffer in %s\n", __func__);
3500 goto out;
3501 }
3502
3503 c = (struct bm_xfer_ctx) {
3504 .bm_bits = drbd_bm_bits(mdev),
3505 .bm_words = drbd_bm_words(mdev),
3506 };
3507
2c46407d 3508 for(;;) {
02918be2 3509 if (cmd == P_BITMAP) {
2c46407d 3510 err = receive_bitmap_plain(mdev, data_size, buffer, &c);
02918be2 3511 } else if (cmd == P_COMPRESSED_BITMAP) {
b411b363
PR
3512 /* MAYBE: sanity check that we speak proto >= 90,
3513 * and the feature is enabled! */
3514 struct p_compressed_bm *p;
3515
02918be2 3516 if (data_size > BM_PACKET_PAYLOAD_BYTES) {
b411b363
PR
3517 dev_err(DEV, "ReportCBitmap packet too large\n");
3518 goto out;
3519 }
3520 /* use the page buff */
3521 p = buffer;
3522 memcpy(p, h, sizeof(*h));
02918be2 3523 if (drbd_recv(mdev, p->head.payload, data_size) != data_size)
b411b363 3524 goto out;
004352fa
LE
3525 if (data_size <= (sizeof(*p) - sizeof(p->head))) {
3526 dev_err(DEV, "ReportCBitmap packet too small (l:%u)\n", data_size);
78fcbdae 3527 goto out;
b411b363 3528 }
2c46407d 3529 err = decode_bitmap_c(mdev, p, &c);
b411b363 3530 } else {
02918be2 3531 dev_warn(DEV, "receive_bitmap: cmd neither ReportBitMap nor ReportCBitMap (is 0x%x)", cmd);
b411b363
PR
3532 goto out;
3533 }
3534
02918be2
PR
3535 c.packets[cmd == P_BITMAP]++;
3536 c.bytes[cmd == P_BITMAP] += sizeof(struct p_header80) + data_size;
b411b363 3537
2c46407d
AG
3538 if (err <= 0) {
3539 if (err < 0)
3540 goto out;
b411b363 3541 break;
2c46407d 3542 }
02918be2 3543 if (!drbd_recv_header(mdev, &cmd, &data_size))
b411b363 3544 goto out;
2c46407d 3545 }
b411b363
PR
3546
3547 INFO_bm_xfer_stats(mdev, "receive", &c);
3548
3549 if (mdev->state.conn == C_WF_BITMAP_T) {
de1f8e4a
AG
3550 enum drbd_state_rv rv;
3551
b411b363
PR
3552 ok = !drbd_send_bitmap(mdev);
3553 if (!ok)
3554 goto out;
3555 /* Omit CS_ORDERED with this state transition to avoid deadlocks. */
de1f8e4a
AG
3556 rv = _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
3557 D_ASSERT(rv == SS_SUCCESS);
b411b363
PR
3558 } else if (mdev->state.conn != C_WF_BITMAP_S) {
3559 /* admin may have requested C_DISCONNECTING,
3560 * other threads may have noticed network errors */
3561 dev_info(DEV, "unexpected cstate (%s) in receive_bitmap\n",
3562 drbd_conn_str(mdev->state.conn));
3563 }
3564
81e84650 3565 ok = true;
b411b363 3566 out:
3719094e 3567 /* drbd_bm_unlock(mdev); by intention no lock */
b411b363
PR
3568 if (ok && mdev->state.conn == C_WF_BITMAP_S)
3569 drbd_start_resync(mdev, C_SYNC_SOURCE);
3570 free_page((unsigned long) buffer);
3571 return ok;
3572}
3573
02918be2 3574static int receive_skip(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
b411b363
PR
3575{
3576 /* TODO zero copy sink :) */
3577 static char sink[128];
3578 int size, want, r;
3579
02918be2
PR
3580 dev_warn(DEV, "skipping unknown optional packet type %d, l: %d!\n",
3581 cmd, data_size);
b411b363 3582
02918be2 3583 size = data_size;
b411b363
PR
3584 while (size > 0) {
3585 want = min_t(int, size, sizeof(sink));
3586 r = drbd_recv(mdev, sink, want);
3587 ERR_IF(r <= 0) break;
3588 size -= r;
3589 }
3590 return size == 0;
3591}
3592
02918be2 3593static int receive_UnplugRemote(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
0ced55a3 3594{
e7f52dfb
LE
3595 /* Make sure we've acked all the TCP data associated
3596 * with the data requests being unplugged */
3597 drbd_tcp_quickack(mdev->data.socket);
0ced55a3 3598
81e84650 3599 return true;
0ced55a3
PR
3600}
3601
73a01a18
PR
3602static int receive_out_of_sync(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3603{
3604 struct p_block_desc *p = &mdev->data.rbuf.block_desc;
3605
f735e363
LE
3606 switch (mdev->state.conn) {
3607 case C_WF_SYNC_UUID:
3608 case C_WF_BITMAP_T:
3609 case C_BEHIND:
3610 break;
3611 default:
3612 dev_err(DEV, "ASSERT FAILED cstate = %s, expected: WFSyncUUID|WFBitMapT|Behind\n",
3613 drbd_conn_str(mdev->state.conn));
3614 }
3615
73a01a18
PR
3616 drbd_set_out_of_sync(mdev, be64_to_cpu(p->sector), be32_to_cpu(p->blksize));
3617
81e84650 3618 return true;
73a01a18
PR
3619}
3620
02918be2
PR
3621typedef int (*drbd_cmd_handler_f)(struct drbd_conf *, enum drbd_packets cmd, unsigned int to_receive);
3622
3623struct data_cmd {
3624 int expect_payload;
3625 size_t pkt_size;
3626 drbd_cmd_handler_f function;
3627};
3628
3629static struct data_cmd drbd_cmd_handler[] = {
3630 [P_DATA] = { 1, sizeof(struct p_data), receive_Data },
3631 [P_DATA_REPLY] = { 1, sizeof(struct p_data), receive_DataReply },
3632 [P_RS_DATA_REPLY] = { 1, sizeof(struct p_data), receive_RSDataReply } ,
3633 [P_BARRIER] = { 0, sizeof(struct p_barrier), receive_Barrier } ,
3634 [P_BITMAP] = { 1, sizeof(struct p_header80), receive_bitmap } ,
3635 [P_COMPRESSED_BITMAP] = { 1, sizeof(struct p_header80), receive_bitmap } ,
3636 [P_UNPLUG_REMOTE] = { 0, sizeof(struct p_header80), receive_UnplugRemote },
3637 [P_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3638 [P_RS_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3639 [P_SYNC_PARAM] = { 1, sizeof(struct p_header80), receive_SyncParam },
3640 [P_SYNC_PARAM89] = { 1, sizeof(struct p_header80), receive_SyncParam },
3641 [P_PROTOCOL] = { 1, sizeof(struct p_protocol), receive_protocol },
3642 [P_UUIDS] = { 0, sizeof(struct p_uuids), receive_uuids },
3643 [P_SIZES] = { 0, sizeof(struct p_sizes), receive_sizes },
3644 [P_STATE] = { 0, sizeof(struct p_state), receive_state },
3645 [P_STATE_CHG_REQ] = { 0, sizeof(struct p_req_state), receive_req_state },
3646 [P_SYNC_UUID] = { 0, sizeof(struct p_rs_uuid), receive_sync_uuid },
3647 [P_OV_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3648 [P_OV_REPLY] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3649 [P_CSUM_RS_REQUEST] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3650 [P_DELAY_PROBE] = { 0, sizeof(struct p_delay_probe93), receive_skip },
73a01a18 3651 [P_OUT_OF_SYNC] = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
b411b363
PR
3652 /* anything missing from this table is in
3653 * the asender_tbl, see get_asender_cmd */
02918be2 3654 [P_MAX_CMD] = { 0, 0, NULL },
b411b363
PR
3655};
3656
02918be2
PR
3657/* All handler functions that expect a sub-header get that sub-heder in
3658 mdev->data.rbuf.header.head.payload.
3659
3660 Usually in mdev->data.rbuf.header.head the callback can find the usual
3661 p_header, but they may not rely on that. Since there is also p_header95 !
3662 */
b411b363
PR
3663
3664static void drbdd(struct drbd_conf *mdev)
3665{
02918be2
PR
3666 union p_header *header = &mdev->data.rbuf.header;
3667 unsigned int packet_size;
3668 enum drbd_packets cmd;
3669 size_t shs; /* sub header size */
3670 int rv;
b411b363
PR
3671
3672 while (get_t_state(&mdev->receiver) == Running) {
3673 drbd_thread_current_set_cpu(mdev);
02918be2
PR
3674 if (!drbd_recv_header(mdev, &cmd, &packet_size))
3675 goto err_out;
b411b363 3676
02918be2
PR
3677 if (unlikely(cmd >= P_MAX_CMD || !drbd_cmd_handler[cmd].function)) {
3678 dev_err(DEV, "unknown packet type %d, l: %d!\n", cmd, packet_size);
3679 goto err_out;
0b33a916 3680 }
b411b363 3681
02918be2 3682 shs = drbd_cmd_handler[cmd].pkt_size - sizeof(union p_header);
02918be2
PR
3683 if (packet_size - shs > 0 && !drbd_cmd_handler[cmd].expect_payload) {
3684 dev_err(DEV, "No payload expected %s l:%d\n", cmdname(cmd), packet_size);
3685 goto err_out;
b411b363 3686 }
b411b363 3687
c13f7e1a
LE
3688 if (shs) {
3689 rv = drbd_recv(mdev, &header->h80.payload, shs);
3690 if (unlikely(rv != shs)) {
3691 dev_err(DEV, "short read while reading sub header: rv=%d\n", rv);
3692 goto err_out;
3693 }
3694 }
3695
02918be2 3696 rv = drbd_cmd_handler[cmd].function(mdev, cmd, packet_size - shs);
b411b363 3697
02918be2 3698 if (unlikely(!rv)) {
b411b363 3699 dev_err(DEV, "error receiving %s, l: %d!\n",
02918be2
PR
3700 cmdname(cmd), packet_size);
3701 goto err_out;
b411b363
PR
3702 }
3703 }
b411b363 3704
02918be2
PR
3705 if (0) {
3706 err_out:
3707 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
3708 }
856c50c7
LE
3709 /* If we leave here, we probably want to update at least the
3710 * "Connected" indicator on stable storage. Do so explicitly here. */
3711 drbd_md_sync(mdev);
b411b363
PR
3712}
3713
3714void drbd_flush_workqueue(struct drbd_conf *mdev)
3715{
3716 struct drbd_wq_barrier barr;
3717
3718 barr.w.cb = w_prev_work_done;
3719 init_completion(&barr.done);
3720 drbd_queue_work(&mdev->data.work, &barr.w);
3721 wait_for_completion(&barr.done);
3722}
3723
f70b3511
PR
3724void drbd_free_tl_hash(struct drbd_conf *mdev)
3725{
3726 struct hlist_head *h;
3727
3728 spin_lock_irq(&mdev->req_lock);
3729
3730 if (!mdev->tl_hash || mdev->state.conn != C_STANDALONE) {
3731 spin_unlock_irq(&mdev->req_lock);
3732 return;
3733 }
3734 /* paranoia code */
3735 for (h = mdev->ee_hash; h < mdev->ee_hash + mdev->ee_hash_s; h++)
3736 if (h->first)
3737 dev_err(DEV, "ASSERT FAILED ee_hash[%u].first == %p, expected NULL\n",
3738 (int)(h - mdev->ee_hash), h->first);
3739 kfree(mdev->ee_hash);
3740 mdev->ee_hash = NULL;
3741 mdev->ee_hash_s = 0;
3742
3743 /* paranoia code */
3744 for (h = mdev->tl_hash; h < mdev->tl_hash + mdev->tl_hash_s; h++)
3745 if (h->first)
3746 dev_err(DEV, "ASSERT FAILED tl_hash[%u] == %p, expected NULL\n",
3747 (int)(h - mdev->tl_hash), h->first);
3748 kfree(mdev->tl_hash);
3749 mdev->tl_hash = NULL;
3750 mdev->tl_hash_s = 0;
3751 spin_unlock_irq(&mdev->req_lock);
3752}
3753
b411b363
PR
3754static void drbd_disconnect(struct drbd_conf *mdev)
3755{
3756 enum drbd_fencing_p fp;
3757 union drbd_state os, ns;
3758 int rv = SS_UNKNOWN_ERROR;
3759 unsigned int i;
3760
3761 if (mdev->state.conn == C_STANDALONE)
3762 return;
b411b363
PR
3763
3764 /* asender does not clean up anything. it must not interfere, either */
3765 drbd_thread_stop(&mdev->asender);
b411b363 3766 drbd_free_sock(mdev);
b411b363 3767
85719573 3768 /* wait for current activity to cease. */
b411b363
PR
3769 spin_lock_irq(&mdev->req_lock);
3770 _drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
3771 _drbd_wait_ee_list_empty(mdev, &mdev->sync_ee);
3772 _drbd_wait_ee_list_empty(mdev, &mdev->read_ee);
3773 spin_unlock_irq(&mdev->req_lock);
3774
3775 /* We do not have data structures that would allow us to
3776 * get the rs_pending_cnt down to 0 again.
3777 * * On C_SYNC_TARGET we do not have any data structures describing
3778 * the pending RSDataRequest's we have sent.
3779 * * On C_SYNC_SOURCE there is no data structure that tracks
3780 * the P_RS_DATA_REPLY blocks that we sent to the SyncTarget.
3781 * And no, it is not the sum of the reference counts in the
3782 * resync_LRU. The resync_LRU tracks the whole operation including
3783 * the disk-IO, while the rs_pending_cnt only tracks the blocks
3784 * on the fly. */
3785 drbd_rs_cancel_all(mdev);
3786 mdev->rs_total = 0;
3787 mdev->rs_failed = 0;
3788 atomic_set(&mdev->rs_pending_cnt, 0);
3789 wake_up(&mdev->misc_wait);
3790
3791 /* make sure syncer is stopped and w_resume_next_sg queued */
3792 del_timer_sync(&mdev->resync_timer);
b411b363
PR
3793 resync_timer_fn((unsigned long)mdev);
3794
b411b363
PR
3795 /* wait for all w_e_end_data_req, w_e_end_rsdata_req, w_send_barrier,
3796 * w_make_resync_request etc. which may still be on the worker queue
3797 * to be "canceled" */
3798 drbd_flush_workqueue(mdev);
3799
3800 /* This also does reclaim_net_ee(). If we do this too early, we might
3801 * miss some resync ee and pages.*/
3802 drbd_process_done_ee(mdev);
3803
3804 kfree(mdev->p_uuid);
3805 mdev->p_uuid = NULL;
3806
fb22c402 3807 if (!is_susp(mdev->state))
b411b363
PR
3808 tl_clear(mdev);
3809
b411b363
PR
3810 dev_info(DEV, "Connection closed\n");
3811
3812 drbd_md_sync(mdev);
3813
3814 fp = FP_DONT_CARE;
3815 if (get_ldev(mdev)) {
3816 fp = mdev->ldev->dc.fencing;
3817 put_ldev(mdev);
3818 }
3819
87f7be4c
PR
3820 if (mdev->state.role == R_PRIMARY && fp >= FP_RESOURCE && mdev->state.pdsk >= D_UNKNOWN)
3821 drbd_try_outdate_peer_async(mdev);
b411b363
PR
3822
3823 spin_lock_irq(&mdev->req_lock);
3824 os = mdev->state;
3825 if (os.conn >= C_UNCONNECTED) {
3826 /* Do not restart in case we are C_DISCONNECTING */
3827 ns = os;
3828 ns.conn = C_UNCONNECTED;
3829 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
3830 }
3831 spin_unlock_irq(&mdev->req_lock);
3832
3833 if (os.conn == C_DISCONNECTING) {
84dfb9f5 3834 wait_event(mdev->net_cnt_wait, atomic_read(&mdev->net_cnt) == 0);
b411b363 3835
b411b363
PR
3836 crypto_free_hash(mdev->cram_hmac_tfm);
3837 mdev->cram_hmac_tfm = NULL;
3838
3839 kfree(mdev->net_conf);
3840 mdev->net_conf = NULL;
3841 drbd_request_state(mdev, NS(conn, C_STANDALONE));
3842 }
3843
3844 /* tcp_close and release of sendpage pages can be deferred. I don't
3845 * want to use SO_LINGER, because apparently it can be deferred for
3846 * more than 20 seconds (longest time I checked).
3847 *
3848 * Actually we don't care for exactly when the network stack does its
3849 * put_page(), but release our reference on these pages right here.
3850 */
3851 i = drbd_release_ee(mdev, &mdev->net_ee);
3852 if (i)
3853 dev_info(DEV, "net_ee not empty, killed %u entries\n", i);
435f0740
LE
3854 i = atomic_read(&mdev->pp_in_use_by_net);
3855 if (i)
3856 dev_info(DEV, "pp_in_use_by_net = %d, expected 0\n", i);
b411b363
PR
3857 i = atomic_read(&mdev->pp_in_use);
3858 if (i)
45bb912b 3859 dev_info(DEV, "pp_in_use = %d, expected 0\n", i);
b411b363
PR
3860
3861 D_ASSERT(list_empty(&mdev->read_ee));
3862 D_ASSERT(list_empty(&mdev->active_ee));
3863 D_ASSERT(list_empty(&mdev->sync_ee));
3864 D_ASSERT(list_empty(&mdev->done_ee));
3865
3866 /* ok, no more ee's on the fly, it is safe to reset the epoch_size */
3867 atomic_set(&mdev->current_epoch->epoch_size, 0);
3868 D_ASSERT(list_empty(&mdev->current_epoch->list));
3869}
3870
3871/*
3872 * We support PRO_VERSION_MIN to PRO_VERSION_MAX. The protocol version
3873 * we can agree on is stored in agreed_pro_version.
3874 *
3875 * feature flags and the reserved array should be enough room for future
3876 * enhancements of the handshake protocol, and possible plugins...
3877 *
3878 * for now, they are expected to be zero, but ignored.
3879 */
3880static int drbd_send_handshake(struct drbd_conf *mdev)
3881{
3882 /* ASSERT current == mdev->receiver ... */
3883 struct p_handshake *p = &mdev->data.sbuf.handshake;
3884 int ok;
3885
3886 if (mutex_lock_interruptible(&mdev->data.mutex)) {
3887 dev_err(DEV, "interrupted during initial handshake\n");
3888 return 0; /* interrupted. not ok. */
3889 }
3890
3891 if (mdev->data.socket == NULL) {
3892 mutex_unlock(&mdev->data.mutex);
3893 return 0;
3894 }
3895
3896 memset(p, 0, sizeof(*p));
3897 p->protocol_min = cpu_to_be32(PRO_VERSION_MIN);
3898 p->protocol_max = cpu_to_be32(PRO_VERSION_MAX);
3899 ok = _drbd_send_cmd( mdev, mdev->data.socket, P_HAND_SHAKE,
0b70a13d 3900 (struct p_header80 *)p, sizeof(*p), 0 );
b411b363
PR
3901 mutex_unlock(&mdev->data.mutex);
3902 return ok;
3903}
3904
3905/*
3906 * return values:
3907 * 1 yes, we have a valid connection
3908 * 0 oops, did not work out, please try again
3909 * -1 peer talks different language,
3910 * no point in trying again, please go standalone.
3911 */
3912static int drbd_do_handshake(struct drbd_conf *mdev)
3913{
3914 /* ASSERT current == mdev->receiver ... */
3915 struct p_handshake *p = &mdev->data.rbuf.handshake;
02918be2
PR
3916 const int expect = sizeof(struct p_handshake) - sizeof(struct p_header80);
3917 unsigned int length;
3918 enum drbd_packets cmd;
b411b363
PR
3919 int rv;
3920
3921 rv = drbd_send_handshake(mdev);
3922 if (!rv)
3923 return 0;
3924
02918be2 3925 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
3926 if (!rv)
3927 return 0;
3928
02918be2 3929 if (cmd != P_HAND_SHAKE) {
b411b363 3930 dev_err(DEV, "expected HandShake packet, received: %s (0x%04x)\n",
02918be2 3931 cmdname(cmd), cmd);
b411b363
PR
3932 return -1;
3933 }
3934
02918be2 3935 if (length != expect) {
b411b363 3936 dev_err(DEV, "expected HandShake length: %u, received: %u\n",
02918be2 3937 expect, length);
b411b363
PR
3938 return -1;
3939 }
3940
3941 rv = drbd_recv(mdev, &p->head.payload, expect);
3942
3943 if (rv != expect) {
3944 dev_err(DEV, "short read receiving handshake packet: l=%u\n", rv);
3945 return 0;
3946 }
3947
b411b363
PR
3948 p->protocol_min = be32_to_cpu(p->protocol_min);
3949 p->protocol_max = be32_to_cpu(p->protocol_max);
3950 if (p->protocol_max == 0)
3951 p->protocol_max = p->protocol_min;
3952
3953 if (PRO_VERSION_MAX < p->protocol_min ||
3954 PRO_VERSION_MIN > p->protocol_max)
3955 goto incompat;
3956
3957 mdev->agreed_pro_version = min_t(int, PRO_VERSION_MAX, p->protocol_max);
3958
3959 dev_info(DEV, "Handshake successful: "
3960 "Agreed network protocol version %d\n", mdev->agreed_pro_version);
3961
3962 return 1;
3963
3964 incompat:
3965 dev_err(DEV, "incompatible DRBD dialects: "
3966 "I support %d-%d, peer supports %d-%d\n",
3967 PRO_VERSION_MIN, PRO_VERSION_MAX,
3968 p->protocol_min, p->protocol_max);
3969 return -1;
3970}
3971
3972#if !defined(CONFIG_CRYPTO_HMAC) && !defined(CONFIG_CRYPTO_HMAC_MODULE)
3973static int drbd_do_auth(struct drbd_conf *mdev)
3974{
3975 dev_err(DEV, "This kernel was build without CONFIG_CRYPTO_HMAC.\n");
3976 dev_err(DEV, "You need to disable 'cram-hmac-alg' in drbd.conf.\n");
b10d96cb 3977 return -1;
b411b363
PR
3978}
3979#else
3980#define CHALLENGE_LEN 64
b10d96cb
JT
3981
3982/* Return value:
3983 1 - auth succeeded,
3984 0 - failed, try again (network error),
3985 -1 - auth failed, don't try again.
3986*/
3987
b411b363
PR
3988static int drbd_do_auth(struct drbd_conf *mdev)
3989{
3990 char my_challenge[CHALLENGE_LEN]; /* 64 Bytes... */
3991 struct scatterlist sg;
3992 char *response = NULL;
3993 char *right_response = NULL;
3994 char *peers_ch = NULL;
b411b363
PR
3995 unsigned int key_len = strlen(mdev->net_conf->shared_secret);
3996 unsigned int resp_size;
3997 struct hash_desc desc;
02918be2
PR
3998 enum drbd_packets cmd;
3999 unsigned int length;
b411b363
PR
4000 int rv;
4001
4002 desc.tfm = mdev->cram_hmac_tfm;
4003 desc.flags = 0;
4004
4005 rv = crypto_hash_setkey(mdev->cram_hmac_tfm,
4006 (u8 *)mdev->net_conf->shared_secret, key_len);
4007 if (rv) {
4008 dev_err(DEV, "crypto_hash_setkey() failed with %d\n", rv);
b10d96cb 4009 rv = -1;
b411b363
PR
4010 goto fail;
4011 }
4012
4013 get_random_bytes(my_challenge, CHALLENGE_LEN);
4014
4015 rv = drbd_send_cmd2(mdev, P_AUTH_CHALLENGE, my_challenge, CHALLENGE_LEN);
4016 if (!rv)
4017 goto fail;
4018
02918be2 4019 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4020 if (!rv)
4021 goto fail;
4022
02918be2 4023 if (cmd != P_AUTH_CHALLENGE) {
b411b363 4024 dev_err(DEV, "expected AuthChallenge packet, received: %s (0x%04x)\n",
02918be2 4025 cmdname(cmd), cmd);
b411b363
PR
4026 rv = 0;
4027 goto fail;
4028 }
4029
02918be2 4030 if (length > CHALLENGE_LEN * 2) {
b411b363 4031 dev_err(DEV, "expected AuthChallenge payload too big.\n");
b10d96cb 4032 rv = -1;
b411b363
PR
4033 goto fail;
4034 }
4035
02918be2 4036 peers_ch = kmalloc(length, GFP_NOIO);
b411b363
PR
4037 if (peers_ch == NULL) {
4038 dev_err(DEV, "kmalloc of peers_ch failed\n");
b10d96cb 4039 rv = -1;
b411b363
PR
4040 goto fail;
4041 }
4042
02918be2 4043 rv = drbd_recv(mdev, peers_ch, length);
b411b363 4044
02918be2 4045 if (rv != length) {
b411b363
PR
4046 dev_err(DEV, "short read AuthChallenge: l=%u\n", rv);
4047 rv = 0;
4048 goto fail;
4049 }
4050
4051 resp_size = crypto_hash_digestsize(mdev->cram_hmac_tfm);
4052 response = kmalloc(resp_size, GFP_NOIO);
4053 if (response == NULL) {
4054 dev_err(DEV, "kmalloc of response failed\n");
b10d96cb 4055 rv = -1;
b411b363
PR
4056 goto fail;
4057 }
4058
4059 sg_init_table(&sg, 1);
02918be2 4060 sg_set_buf(&sg, peers_ch, length);
b411b363
PR
4061
4062 rv = crypto_hash_digest(&desc, &sg, sg.length, response);
4063 if (rv) {
4064 dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4065 rv = -1;
b411b363
PR
4066 goto fail;
4067 }
4068
4069 rv = drbd_send_cmd2(mdev, P_AUTH_RESPONSE, response, resp_size);
4070 if (!rv)
4071 goto fail;
4072
02918be2 4073 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4074 if (!rv)
4075 goto fail;
4076
02918be2 4077 if (cmd != P_AUTH_RESPONSE) {
b411b363 4078 dev_err(DEV, "expected AuthResponse packet, received: %s (0x%04x)\n",
02918be2 4079 cmdname(cmd), cmd);
b411b363
PR
4080 rv = 0;
4081 goto fail;
4082 }
4083
02918be2 4084 if (length != resp_size) {
b411b363
PR
4085 dev_err(DEV, "expected AuthResponse payload of wrong size\n");
4086 rv = 0;
4087 goto fail;
4088 }
4089
4090 rv = drbd_recv(mdev, response , resp_size);
4091
4092 if (rv != resp_size) {
4093 dev_err(DEV, "short read receiving AuthResponse: l=%u\n", rv);
4094 rv = 0;
4095 goto fail;
4096 }
4097
4098 right_response = kmalloc(resp_size, GFP_NOIO);
2d1ee87d 4099 if (right_response == NULL) {
b411b363 4100 dev_err(DEV, "kmalloc of right_response failed\n");
b10d96cb 4101 rv = -1;
b411b363
PR
4102 goto fail;
4103 }
4104
4105 sg_set_buf(&sg, my_challenge, CHALLENGE_LEN);
4106
4107 rv = crypto_hash_digest(&desc, &sg, sg.length, right_response);
4108 if (rv) {
4109 dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4110 rv = -1;
b411b363
PR
4111 goto fail;
4112 }
4113
4114 rv = !memcmp(response, right_response, resp_size);
4115
4116 if (rv)
4117 dev_info(DEV, "Peer authenticated using %d bytes of '%s' HMAC\n",
4118 resp_size, mdev->net_conf->cram_hmac_alg);
b10d96cb
JT
4119 else
4120 rv = -1;
b411b363
PR
4121
4122 fail:
4123 kfree(peers_ch);
4124 kfree(response);
4125 kfree(right_response);
4126
4127 return rv;
4128}
4129#endif
4130
4131int drbdd_init(struct drbd_thread *thi)
4132{
4133 struct drbd_conf *mdev = thi->mdev;
4134 unsigned int minor = mdev_to_minor(mdev);
4135 int h;
4136
4137 sprintf(current->comm, "drbd%d_receiver", minor);
4138
4139 dev_info(DEV, "receiver (re)started\n");
4140
4141 do {
4142 h = drbd_connect(mdev);
4143 if (h == 0) {
4144 drbd_disconnect(mdev);
4145 __set_current_state(TASK_INTERRUPTIBLE);
4146 schedule_timeout(HZ);
4147 }
4148 if (h == -1) {
4149 dev_warn(DEV, "Discarding network configuration.\n");
4150 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
4151 }
4152 } while (h == 0);
4153
4154 if (h > 0) {
4155 if (get_net_conf(mdev)) {
4156 drbdd(mdev);
4157 put_net_conf(mdev);
4158 }
4159 }
4160
4161 drbd_disconnect(mdev);
4162
4163 dev_info(DEV, "receiver terminated\n");
4164 return 0;
4165}
4166
4167/* ********* acknowledge sender ******** */
4168
0b70a13d 4169static int got_RqSReply(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4170{
4171 struct p_req_state_reply *p = (struct p_req_state_reply *)h;
4172
4173 int retcode = be32_to_cpu(p->retcode);
4174
4175 if (retcode >= SS_SUCCESS) {
4176 set_bit(CL_ST_CHG_SUCCESS, &mdev->flags);
4177 } else {
4178 set_bit(CL_ST_CHG_FAIL, &mdev->flags);
4179 dev_err(DEV, "Requested state change failed by peer: %s (%d)\n",
4180 drbd_set_st_err_str(retcode), retcode);
4181 }
4182 wake_up(&mdev->state_wait);
4183
81e84650 4184 return true;
b411b363
PR
4185}
4186
0b70a13d 4187static int got_Ping(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4188{
4189 return drbd_send_ping_ack(mdev);
4190
4191}
4192
0b70a13d 4193static int got_PingAck(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4194{
4195 /* restore idle timeout */
4196 mdev->meta.socket->sk->sk_rcvtimeo = mdev->net_conf->ping_int*HZ;
309d1608
PR
4197 if (!test_and_set_bit(GOT_PING_ACK, &mdev->flags))
4198 wake_up(&mdev->misc_wait);
b411b363 4199
81e84650 4200 return true;
b411b363
PR
4201}
4202
0b70a13d 4203static int got_IsInSync(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4204{
4205 struct p_block_ack *p = (struct p_block_ack *)h;
4206 sector_t sector = be64_to_cpu(p->sector);
4207 int blksize = be32_to_cpu(p->blksize);
4208
4209 D_ASSERT(mdev->agreed_pro_version >= 89);
4210
4211 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4212
1d53f09e
LE
4213 if (get_ldev(mdev)) {
4214 drbd_rs_complete_io(mdev, sector);
4215 drbd_set_in_sync(mdev, sector, blksize);
4216 /* rs_same_csums is supposed to count in units of BM_BLOCK_SIZE */
4217 mdev->rs_same_csum += (blksize >> BM_BLOCK_SHIFT);
4218 put_ldev(mdev);
4219 }
b411b363 4220 dec_rs_pending(mdev);
778f271d 4221 atomic_add(blksize >> 9, &mdev->rs_sect_in);
b411b363 4222
81e84650 4223 return true;
b411b363
PR
4224}
4225
4226/* when we receive the ACK for a write request,
4227 * verify that we actually know about it */
4228static struct drbd_request *_ack_id_to_req(struct drbd_conf *mdev,
4229 u64 id, sector_t sector)
4230{
4231 struct hlist_head *slot = tl_hash_slot(mdev, sector);
4232 struct hlist_node *n;
4233 struct drbd_request *req;
4234
4235 hlist_for_each_entry(req, n, slot, colision) {
4236 if ((unsigned long)req == (unsigned long)id) {
4237 if (req->sector != sector) {
4238 dev_err(DEV, "_ack_id_to_req: found req %p but it has "
4239 "wrong sector (%llus versus %llus)\n", req,
4240 (unsigned long long)req->sector,
4241 (unsigned long long)sector);
4242 break;
4243 }
4244 return req;
4245 }
4246 }
b411b363
PR
4247 return NULL;
4248}
4249
4250typedef struct drbd_request *(req_validator_fn)
4251 (struct drbd_conf *mdev, u64 id, sector_t sector);
4252
4253static int validate_req_change_req_state(struct drbd_conf *mdev,
4254 u64 id, sector_t sector, req_validator_fn validator,
4255 const char *func, enum drbd_req_event what)
4256{
4257 struct drbd_request *req;
4258 struct bio_and_error m;
4259
4260 spin_lock_irq(&mdev->req_lock);
4261 req = validator(mdev, id, sector);
4262 if (unlikely(!req)) {
4263 spin_unlock_irq(&mdev->req_lock);
2deb8336
PR
4264
4265 dev_err(DEV, "%s: failed to find req %p, sector %llus\n", func,
4266 (void *)(unsigned long)id, (unsigned long long)sector);
81e84650 4267 return false;
b411b363
PR
4268 }
4269 __req_mod(req, what, &m);
4270 spin_unlock_irq(&mdev->req_lock);
4271
4272 if (m.bio)
4273 complete_master_bio(mdev, &m);
81e84650 4274 return true;
b411b363
PR
4275}
4276
0b70a13d 4277static int got_BlockAck(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4278{
4279 struct p_block_ack *p = (struct p_block_ack *)h;
4280 sector_t sector = be64_to_cpu(p->sector);
4281 int blksize = be32_to_cpu(p->blksize);
4282 enum drbd_req_event what;
4283
4284 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4285
4286 if (is_syncer_block_id(p->block_id)) {
4287 drbd_set_in_sync(mdev, sector, blksize);
4288 dec_rs_pending(mdev);
81e84650 4289 return true;
b411b363
PR
4290 }
4291 switch (be16_to_cpu(h->command)) {
4292 case P_RS_WRITE_ACK:
4293 D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
4294 what = write_acked_by_peer_and_sis;
4295 break;
4296 case P_WRITE_ACK:
4297 D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
4298 what = write_acked_by_peer;
4299 break;
4300 case P_RECV_ACK:
4301 D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_B);
4302 what = recv_acked_by_peer;
4303 break;
4304 case P_DISCARD_ACK:
4305 D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
4306 what = conflict_discarded_by_peer;
4307 break;
4308 default:
4309 D_ASSERT(0);
81e84650 4310 return false;
b411b363
PR
4311 }
4312
4313 return validate_req_change_req_state(mdev, p->block_id, sector,
4314 _ack_id_to_req, __func__ , what);
4315}
4316
0b70a13d 4317static int got_NegAck(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4318{
4319 struct p_block_ack *p = (struct p_block_ack *)h;
4320 sector_t sector = be64_to_cpu(p->sector);
2deb8336
PR
4321 int size = be32_to_cpu(p->blksize);
4322 struct drbd_request *req;
4323 struct bio_and_error m;
b411b363
PR
4324
4325 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4326
4327 if (is_syncer_block_id(p->block_id)) {
b411b363
PR
4328 dec_rs_pending(mdev);
4329 drbd_rs_failed_io(mdev, sector, size);
81e84650 4330 return true;
b411b363 4331 }
2deb8336
PR
4332
4333 spin_lock_irq(&mdev->req_lock);
4334 req = _ack_id_to_req(mdev, p->block_id, sector);
4335 if (!req) {
4336 spin_unlock_irq(&mdev->req_lock);
4337 if (mdev->net_conf->wire_protocol == DRBD_PROT_A ||
4338 mdev->net_conf->wire_protocol == DRBD_PROT_B) {
4339 /* Protocol A has no P_WRITE_ACKs, but has P_NEG_ACKs.
4340 The master bio might already be completed, therefore the
4341 request is no longer in the collision hash.
4342 => Do not try to validate block_id as request. */
4343 /* In Protocol B we might already have got a P_RECV_ACK
4344 but then get a P_NEG_ACK after wards. */
4345 drbd_set_out_of_sync(mdev, sector, size);
4346 return true;
4347 } else {
4348 dev_err(DEV, "%s: failed to find req %p, sector %llus\n", __func__,
4349 (void *)(unsigned long)p->block_id, (unsigned long long)sector);
4350 return false;
4351 }
4352 }
4353 __req_mod(req, neg_acked, &m);
4354 spin_unlock_irq(&mdev->req_lock);
4355
4356 if (m.bio)
4357 complete_master_bio(mdev, &m);
4358 return true;
b411b363
PR
4359}
4360
0b70a13d 4361static int got_NegDReply(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4362{
4363 struct p_block_ack *p = (struct p_block_ack *)h;
4364 sector_t sector = be64_to_cpu(p->sector);
4365
4366 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4367 dev_err(DEV, "Got NegDReply; Sector %llus, len %u; Fail original request.\n",
4368 (unsigned long long)sector, be32_to_cpu(p->blksize));
4369
4370 return validate_req_change_req_state(mdev, p->block_id, sector,
4371 _ar_id_to_req, __func__ , neg_acked);
4372}
4373
0b70a13d 4374static int got_NegRSDReply(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4375{
4376 sector_t sector;
4377 int size;
4378 struct p_block_ack *p = (struct p_block_ack *)h;
4379
4380 sector = be64_to_cpu(p->sector);
4381 size = be32_to_cpu(p->blksize);
b411b363
PR
4382
4383 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4384
4385 dec_rs_pending(mdev);
4386
4387 if (get_ldev_if_state(mdev, D_FAILED)) {
4388 drbd_rs_complete_io(mdev, sector);
d612d309
PR
4389 switch (be16_to_cpu(h->command)) {
4390 case P_NEG_RS_DREPLY:
4391 drbd_rs_failed_io(mdev, sector, size);
4392 case P_RS_CANCEL:
4393 break;
4394 default:
4395 D_ASSERT(0);
4396 put_ldev(mdev);
4397 return false;
4398 }
b411b363
PR
4399 put_ldev(mdev);
4400 }
4401
81e84650 4402 return true;
b411b363
PR
4403}
4404
0b70a13d 4405static int got_BarrierAck(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4406{
4407 struct p_barrier_ack *p = (struct p_barrier_ack *)h;
4408
4409 tl_release(mdev, p->barrier, be32_to_cpu(p->set_size));
4410
c4752ef1
PR
4411 if (mdev->state.conn == C_AHEAD &&
4412 atomic_read(&mdev->ap_in_flight) == 0 &&
370a43e7
PR
4413 !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->current_epoch->flags)) {
4414 mdev->start_resync_timer.expires = jiffies + HZ;
4415 add_timer(&mdev->start_resync_timer);
c4752ef1
PR
4416 }
4417
81e84650 4418 return true;
b411b363
PR
4419}
4420
0b70a13d 4421static int got_OVResult(struct drbd_conf *mdev, struct p_header80 *h)
b411b363
PR
4422{
4423 struct p_block_ack *p = (struct p_block_ack *)h;
4424 struct drbd_work *w;
4425 sector_t sector;
4426 int size;
4427
4428 sector = be64_to_cpu(p->sector);
4429 size = be32_to_cpu(p->blksize);
4430
4431 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4432
4433 if (be64_to_cpu(p->block_id) == ID_OUT_OF_SYNC)
4434 drbd_ov_oos_found(mdev, sector, size);
4435 else
4436 ov_oos_print(mdev);
4437
1d53f09e 4438 if (!get_ldev(mdev))
81e84650 4439 return true;
1d53f09e 4440
b411b363
PR
4441 drbd_rs_complete_io(mdev, sector);
4442 dec_rs_pending(mdev);
4443
ea5442af
LE
4444 --mdev->ov_left;
4445
4446 /* let's advance progress step marks only for every other megabyte */
4447 if ((mdev->ov_left & 0x200) == 0x200)
4448 drbd_advance_rs_marks(mdev, mdev->ov_left);
4449
4450 if (mdev->ov_left == 0) {
b411b363
PR
4451 w = kmalloc(sizeof(*w), GFP_NOIO);
4452 if (w) {
4453 w->cb = w_ov_finished;
4454 drbd_queue_work_front(&mdev->data.work, w);
4455 } else {
4456 dev_err(DEV, "kmalloc(w) failed.");
4457 ov_oos_print(mdev);
4458 drbd_resync_finished(mdev);
4459 }
4460 }
1d53f09e 4461 put_ldev(mdev);
81e84650 4462 return true;
b411b363
PR
4463}
4464
02918be2 4465static int got_skip(struct drbd_conf *mdev, struct p_header80 *h)
0ced55a3 4466{
81e84650 4467 return true;
0ced55a3
PR
4468}
4469
b411b363
PR
4470struct asender_cmd {
4471 size_t pkt_size;
0b70a13d 4472 int (*process)(struct drbd_conf *mdev, struct p_header80 *h);
b411b363
PR
4473};
4474
4475static struct asender_cmd *get_asender_cmd(int cmd)
4476{
4477 static struct asender_cmd asender_tbl[] = {
4478 /* anything missing from this table is in
4479 * the drbd_cmd_handler (drbd_default_handler) table,
4480 * see the beginning of drbdd() */
0b70a13d
PR
4481 [P_PING] = { sizeof(struct p_header80), got_Ping },
4482 [P_PING_ACK] = { sizeof(struct p_header80), got_PingAck },
b411b363
PR
4483 [P_RECV_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4484 [P_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4485 [P_RS_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4486 [P_DISCARD_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4487 [P_NEG_ACK] = { sizeof(struct p_block_ack), got_NegAck },
4488 [P_NEG_DREPLY] = { sizeof(struct p_block_ack), got_NegDReply },
4489 [P_NEG_RS_DREPLY] = { sizeof(struct p_block_ack), got_NegRSDReply},
4490 [P_OV_RESULT] = { sizeof(struct p_block_ack), got_OVResult },
4491 [P_BARRIER_ACK] = { sizeof(struct p_barrier_ack), got_BarrierAck },
4492 [P_STATE_CHG_REPLY] = { sizeof(struct p_req_state_reply), got_RqSReply },
4493 [P_RS_IS_IN_SYNC] = { sizeof(struct p_block_ack), got_IsInSync },
02918be2 4494 [P_DELAY_PROBE] = { sizeof(struct p_delay_probe93), got_skip },
d612d309 4495 [P_RS_CANCEL] = { sizeof(struct p_block_ack), got_NegRSDReply},
b411b363
PR
4496 [P_MAX_CMD] = { 0, NULL },
4497 };
4498 if (cmd > P_MAX_CMD || asender_tbl[cmd].process == NULL)
4499 return NULL;
4500 return &asender_tbl[cmd];
4501}
4502
4503int drbd_asender(struct drbd_thread *thi)
4504{
4505 struct drbd_conf *mdev = thi->mdev;
02918be2 4506 struct p_header80 *h = &mdev->meta.rbuf.header.h80;
b411b363
PR
4507 struct asender_cmd *cmd = NULL;
4508
4509 int rv, len;
4510 void *buf = h;
4511 int received = 0;
0b70a13d 4512 int expect = sizeof(struct p_header80);
b411b363
PR
4513 int empty;
4514
4515 sprintf(current->comm, "drbd%d_asender", mdev_to_minor(mdev));
4516
4517 current->policy = SCHED_RR; /* Make this a realtime task! */
4518 current->rt_priority = 2; /* more important than all other tasks */
4519
4520 while (get_t_state(thi) == Running) {
4521 drbd_thread_current_set_cpu(mdev);
4522 if (test_and_clear_bit(SEND_PING, &mdev->flags)) {
4523 ERR_IF(!drbd_send_ping(mdev)) goto reconnect;
4524 mdev->meta.socket->sk->sk_rcvtimeo =
4525 mdev->net_conf->ping_timeo*HZ/10;
4526 }
4527
4528 /* conditionally cork;
4529 * it may hurt latency if we cork without much to send */
4530 if (!mdev->net_conf->no_cork &&
4531 3 < atomic_read(&mdev->unacked_cnt))
4532 drbd_tcp_cork(mdev->meta.socket);
4533 while (1) {
4534 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4535 flush_signals(current);
0f8488e1 4536 if (!drbd_process_done_ee(mdev))
b411b363 4537 goto reconnect;
b411b363
PR
4538 /* to avoid race with newly queued ACKs */
4539 set_bit(SIGNAL_ASENDER, &mdev->flags);
4540 spin_lock_irq(&mdev->req_lock);
4541 empty = list_empty(&mdev->done_ee);
4542 spin_unlock_irq(&mdev->req_lock);
4543 /* new ack may have been queued right here,
4544 * but then there is also a signal pending,
4545 * and we start over... */
4546 if (empty)
4547 break;
4548 }
4549 /* but unconditionally uncork unless disabled */
4550 if (!mdev->net_conf->no_cork)
4551 drbd_tcp_uncork(mdev->meta.socket);
4552
4553 /* short circuit, recv_msg would return EINTR anyways. */
4554 if (signal_pending(current))
4555 continue;
4556
4557 rv = drbd_recv_short(mdev, mdev->meta.socket,
4558 buf, expect-received, 0);
4559 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4560
4561 flush_signals(current);
4562
4563 /* Note:
4564 * -EINTR (on meta) we got a signal
4565 * -EAGAIN (on meta) rcvtimeo expired
4566 * -ECONNRESET other side closed the connection
4567 * -ERESTARTSYS (on data) we got a signal
4568 * rv < 0 other than above: unexpected error!
4569 * rv == expected: full header or command
4570 * rv < expected: "woken" by signal during receive
4571 * rv == 0 : "connection shut down by peer"
4572 */
4573 if (likely(rv > 0)) {
4574 received += rv;
4575 buf += rv;
4576 } else if (rv == 0) {
4577 dev_err(DEV, "meta connection shut down by peer.\n");
4578 goto reconnect;
4579 } else if (rv == -EAGAIN) {
4580 if (mdev->meta.socket->sk->sk_rcvtimeo ==
4581 mdev->net_conf->ping_timeo*HZ/10) {
4582 dev_err(DEV, "PingAck did not arrive in time.\n");
4583 goto reconnect;
4584 }
4585 set_bit(SEND_PING, &mdev->flags);
4586 continue;
4587 } else if (rv == -EINTR) {
4588 continue;
4589 } else {
4590 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
4591 goto reconnect;
4592 }
4593
4594 if (received == expect && cmd == NULL) {
4595 if (unlikely(h->magic != BE_DRBD_MAGIC)) {
004352fa
LE
4596 dev_err(DEV, "magic?? on meta m: 0x%08x c: %d l: %d\n",
4597 be32_to_cpu(h->magic),
4598 be16_to_cpu(h->command),
4599 be16_to_cpu(h->length));
b411b363
PR
4600 goto reconnect;
4601 }
4602 cmd = get_asender_cmd(be16_to_cpu(h->command));
4603 len = be16_to_cpu(h->length);
4604 if (unlikely(cmd == NULL)) {
004352fa
LE
4605 dev_err(DEV, "unknown command?? on meta m: 0x%08x c: %d l: %d\n",
4606 be32_to_cpu(h->magic),
4607 be16_to_cpu(h->command),
4608 be16_to_cpu(h->length));
b411b363
PR
4609 goto disconnect;
4610 }
4611 expect = cmd->pkt_size;
0b70a13d 4612 ERR_IF(len != expect-sizeof(struct p_header80))
b411b363 4613 goto reconnect;
b411b363
PR
4614 }
4615 if (received == expect) {
4616 D_ASSERT(cmd != NULL);
b411b363
PR
4617 if (!cmd->process(mdev, h))
4618 goto reconnect;
4619
4620 buf = h;
4621 received = 0;
0b70a13d 4622 expect = sizeof(struct p_header80);
b411b363
PR
4623 cmd = NULL;
4624 }
4625 }
4626
4627 if (0) {
4628reconnect:
4629 drbd_force_state(mdev, NS(conn, C_NETWORK_FAILURE));
856c50c7 4630 drbd_md_sync(mdev);
b411b363
PR
4631 }
4632 if (0) {
4633disconnect:
4634 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
856c50c7 4635 drbd_md_sync(mdev);
b411b363
PR
4636 }
4637 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4638
4639 D_ASSERT(mdev->state.conn < C_CONNECTED);
4640 dev_info(DEV, "asender terminated\n");
4641
4642 return 0;
4643}