]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/block/drbd/drbd_receiver.c
drbd: Moved SEND_PING to the per connection (tconn) flags
[mirror_ubuntu-bionic-kernel.git] / drivers / block / drbd / drbd_receiver.c
CommitLineData
b411b363
PR
1/*
2 drbd_receiver.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23 */
24
25
b411b363
PR
26#include <linux/module.h>
27
28#include <asm/uaccess.h>
29#include <net/sock.h>
30
b411b363
PR
31#include <linux/drbd.h>
32#include <linux/fs.h>
33#include <linux/file.h>
34#include <linux/in.h>
35#include <linux/mm.h>
36#include <linux/memcontrol.h>
37#include <linux/mm_inline.h>
38#include <linux/slab.h>
b411b363
PR
39#include <linux/pkt_sched.h>
40#define __KERNEL_SYSCALLS__
41#include <linux/unistd.h>
42#include <linux/vmalloc.h>
43#include <linux/random.h>
b411b363
PR
44#include <linux/string.h>
45#include <linux/scatterlist.h>
46#include "drbd_int.h"
b411b363
PR
47#include "drbd_req.h"
48
49#include "drbd_vli.h"
50
b411b363
PR
51enum finish_epoch {
52 FE_STILL_LIVE,
53 FE_DESTROYED,
54 FE_RECYCLED,
55};
56
57static int drbd_do_handshake(struct drbd_conf *mdev);
58static int drbd_do_auth(struct drbd_conf *mdev);
59
60static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *, struct drbd_epoch *, enum epoch_event);
61static int e_end_block(struct drbd_conf *, struct drbd_work *, int);
62
b411b363
PR
63
64#define GFP_TRY (__GFP_HIGHMEM | __GFP_NOWARN)
65
45bb912b
LE
66/*
67 * some helper functions to deal with single linked page lists,
68 * page->private being our "next" pointer.
69 */
70
71/* If at least n pages are linked at head, get n pages off.
72 * Otherwise, don't modify head, and return NULL.
73 * Locking is the responsibility of the caller.
74 */
75static struct page *page_chain_del(struct page **head, int n)
76{
77 struct page *page;
78 struct page *tmp;
79
80 BUG_ON(!n);
81 BUG_ON(!head);
82
83 page = *head;
23ce4227
PR
84
85 if (!page)
86 return NULL;
87
45bb912b
LE
88 while (page) {
89 tmp = page_chain_next(page);
90 if (--n == 0)
91 break; /* found sufficient pages */
92 if (tmp == NULL)
93 /* insufficient pages, don't use any of them. */
94 return NULL;
95 page = tmp;
96 }
97
98 /* add end of list marker for the returned list */
99 set_page_private(page, 0);
100 /* actual return value, and adjustment of head */
101 page = *head;
102 *head = tmp;
103 return page;
104}
105
106/* may be used outside of locks to find the tail of a (usually short)
107 * "private" page chain, before adding it back to a global chain head
108 * with page_chain_add() under a spinlock. */
109static struct page *page_chain_tail(struct page *page, int *len)
110{
111 struct page *tmp;
112 int i = 1;
113 while ((tmp = page_chain_next(page)))
114 ++i, page = tmp;
115 if (len)
116 *len = i;
117 return page;
118}
119
120static int page_chain_free(struct page *page)
121{
122 struct page *tmp;
123 int i = 0;
124 page_chain_for_each_safe(page, tmp) {
125 put_page(page);
126 ++i;
127 }
128 return i;
129}
130
131static void page_chain_add(struct page **head,
132 struct page *chain_first, struct page *chain_last)
133{
134#if 1
135 struct page *tmp;
136 tmp = page_chain_tail(chain_first, NULL);
137 BUG_ON(tmp != chain_last);
138#endif
139
140 /* add chain to head */
141 set_page_private(chain_last, (unsigned long)*head);
142 *head = chain_first;
143}
144
145static struct page *drbd_pp_first_pages_or_try_alloc(struct drbd_conf *mdev, int number)
b411b363
PR
146{
147 struct page *page = NULL;
45bb912b
LE
148 struct page *tmp = NULL;
149 int i = 0;
b411b363
PR
150
151 /* Yes, testing drbd_pp_vacant outside the lock is racy.
152 * So what. It saves a spin_lock. */
45bb912b 153 if (drbd_pp_vacant >= number) {
b411b363 154 spin_lock(&drbd_pp_lock);
45bb912b
LE
155 page = page_chain_del(&drbd_pp_pool, number);
156 if (page)
157 drbd_pp_vacant -= number;
b411b363 158 spin_unlock(&drbd_pp_lock);
45bb912b
LE
159 if (page)
160 return page;
b411b363 161 }
45bb912b 162
b411b363
PR
163 /* GFP_TRY, because we must not cause arbitrary write-out: in a DRBD
164 * "criss-cross" setup, that might cause write-out on some other DRBD,
165 * which in turn might block on the other node at this very place. */
45bb912b
LE
166 for (i = 0; i < number; i++) {
167 tmp = alloc_page(GFP_TRY);
168 if (!tmp)
169 break;
170 set_page_private(tmp, (unsigned long)page);
171 page = tmp;
172 }
173
174 if (i == number)
175 return page;
176
177 /* Not enough pages immediately available this time.
178 * No need to jump around here, drbd_pp_alloc will retry this
179 * function "soon". */
180 if (page) {
181 tmp = page_chain_tail(page, NULL);
182 spin_lock(&drbd_pp_lock);
183 page_chain_add(&drbd_pp_pool, page, tmp);
184 drbd_pp_vacant += i;
185 spin_unlock(&drbd_pp_lock);
186 }
187 return NULL;
b411b363
PR
188}
189
b411b363
PR
190static void reclaim_net_ee(struct drbd_conf *mdev, struct list_head *to_be_freed)
191{
db830c46 192 struct drbd_peer_request *peer_req;
b411b363
PR
193 struct list_head *le, *tle;
194
195 /* The EEs are always appended to the end of the list. Since
196 they are sent in order over the wire, they have to finish
197 in order. As soon as we see the first not finished we can
198 stop to examine the list... */
199
200 list_for_each_safe(le, tle, &mdev->net_ee) {
db830c46
AG
201 peer_req = list_entry(le, struct drbd_peer_request, w.list);
202 if (drbd_ee_has_active_page(peer_req))
b411b363
PR
203 break;
204 list_move(le, to_be_freed);
205 }
206}
207
208static void drbd_kick_lo_and_reclaim_net(struct drbd_conf *mdev)
209{
210 LIST_HEAD(reclaimed);
db830c46 211 struct drbd_peer_request *peer_req, *t;
b411b363 212
87eeee41 213 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 214 reclaim_net_ee(mdev, &reclaimed);
87eeee41 215 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 216
db830c46
AG
217 list_for_each_entry_safe(peer_req, t, &reclaimed, w.list)
218 drbd_free_net_ee(mdev, peer_req);
b411b363
PR
219}
220
221/**
45bb912b 222 * drbd_pp_alloc() - Returns @number pages, retries forever (or until signalled)
b411b363 223 * @mdev: DRBD device.
45bb912b
LE
224 * @number: number of pages requested
225 * @retry: whether to retry, if not enough pages are available right now
226 *
227 * Tries to allocate number pages, first from our own page pool, then from
228 * the kernel, unless this allocation would exceed the max_buffers setting.
229 * Possibly retry until DRBD frees sufficient pages somewhere else.
b411b363 230 *
45bb912b 231 * Returns a page chain linked via page->private.
b411b363 232 */
45bb912b 233static struct page *drbd_pp_alloc(struct drbd_conf *mdev, unsigned number, bool retry)
b411b363
PR
234{
235 struct page *page = NULL;
236 DEFINE_WAIT(wait);
237
45bb912b
LE
238 /* Yes, we may run up to @number over max_buffers. If we
239 * follow it strictly, the admin will get it wrong anyways. */
89e58e75 240 if (atomic_read(&mdev->pp_in_use) < mdev->tconn->net_conf->max_buffers)
45bb912b 241 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363 242
45bb912b 243 while (page == NULL) {
b411b363
PR
244 prepare_to_wait(&drbd_pp_wait, &wait, TASK_INTERRUPTIBLE);
245
246 drbd_kick_lo_and_reclaim_net(mdev);
247
89e58e75 248 if (atomic_read(&mdev->pp_in_use) < mdev->tconn->net_conf->max_buffers) {
45bb912b 249 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363
PR
250 if (page)
251 break;
252 }
253
254 if (!retry)
255 break;
256
257 if (signal_pending(current)) {
258 dev_warn(DEV, "drbd_pp_alloc interrupted!\n");
259 break;
260 }
261
262 schedule();
263 }
264 finish_wait(&drbd_pp_wait, &wait);
265
45bb912b
LE
266 if (page)
267 atomic_add(number, &mdev->pp_in_use);
b411b363
PR
268 return page;
269}
270
271/* Must not be used from irq, as that may deadlock: see drbd_pp_alloc.
87eeee41 272 * Is also used from inside an other spin_lock_irq(&mdev->tconn->req_lock);
45bb912b
LE
273 * Either links the page chain back to the global pool,
274 * or returns all pages to the system. */
435f0740 275static void drbd_pp_free(struct drbd_conf *mdev, struct page *page, int is_net)
b411b363 276{
435f0740 277 atomic_t *a = is_net ? &mdev->pp_in_use_by_net : &mdev->pp_in_use;
b411b363 278 int i;
435f0740 279
1816a2b4 280 if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE)*minor_count)
45bb912b
LE
281 i = page_chain_free(page);
282 else {
283 struct page *tmp;
284 tmp = page_chain_tail(page, &i);
285 spin_lock(&drbd_pp_lock);
286 page_chain_add(&drbd_pp_pool, page, tmp);
287 drbd_pp_vacant += i;
288 spin_unlock(&drbd_pp_lock);
b411b363 289 }
435f0740 290 i = atomic_sub_return(i, a);
45bb912b 291 if (i < 0)
435f0740
LE
292 dev_warn(DEV, "ASSERTION FAILED: %s: %d < 0\n",
293 is_net ? "pp_in_use_by_net" : "pp_in_use", i);
b411b363
PR
294 wake_up(&drbd_pp_wait);
295}
296
297/*
298You need to hold the req_lock:
299 _drbd_wait_ee_list_empty()
300
301You must not have the req_lock:
302 drbd_free_ee()
303 drbd_alloc_ee()
304 drbd_init_ee()
305 drbd_release_ee()
306 drbd_ee_fix_bhs()
307 drbd_process_done_ee()
308 drbd_clear_done_ee()
309 drbd_wait_ee_list_empty()
310*/
311
f6ffca9f
AG
312struct drbd_peer_request *
313drbd_alloc_ee(struct drbd_conf *mdev, u64 id, sector_t sector,
314 unsigned int data_size, gfp_t gfp_mask) __must_hold(local)
b411b363 315{
db830c46 316 struct drbd_peer_request *peer_req;
b411b363 317 struct page *page;
45bb912b 318 unsigned nr_pages = (data_size + PAGE_SIZE -1) >> PAGE_SHIFT;
b411b363 319
0cf9d27e 320 if (drbd_insert_fault(mdev, DRBD_FAULT_AL_EE))
b411b363
PR
321 return NULL;
322
db830c46
AG
323 peer_req = mempool_alloc(drbd_ee_mempool, gfp_mask & ~__GFP_HIGHMEM);
324 if (!peer_req) {
b411b363
PR
325 if (!(gfp_mask & __GFP_NOWARN))
326 dev_err(DEV, "alloc_ee: Allocation of an EE failed\n");
327 return NULL;
328 }
329
45bb912b
LE
330 page = drbd_pp_alloc(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
331 if (!page)
332 goto fail;
b411b363 333
db830c46
AG
334 drbd_clear_interval(&peer_req->i);
335 peer_req->i.size = data_size;
336 peer_req->i.sector = sector;
337 peer_req->i.local = false;
338 peer_req->i.waiting = false;
339
340 peer_req->epoch = NULL;
341 peer_req->mdev = mdev;
342 peer_req->pages = page;
343 atomic_set(&peer_req->pending_bios, 0);
344 peer_req->flags = 0;
9a8e7753
AG
345 /*
346 * The block_id is opaque to the receiver. It is not endianness
347 * converted, and sent back to the sender unchanged.
348 */
db830c46 349 peer_req->block_id = id;
b411b363 350
db830c46 351 return peer_req;
b411b363 352
45bb912b 353 fail:
db830c46 354 mempool_free(peer_req, drbd_ee_mempool);
b411b363
PR
355 return NULL;
356}
357
db830c46 358void drbd_free_some_ee(struct drbd_conf *mdev, struct drbd_peer_request *peer_req,
f6ffca9f 359 int is_net)
b411b363 360{
db830c46
AG
361 if (peer_req->flags & EE_HAS_DIGEST)
362 kfree(peer_req->digest);
363 drbd_pp_free(mdev, peer_req->pages, is_net);
364 D_ASSERT(atomic_read(&peer_req->pending_bios) == 0);
365 D_ASSERT(drbd_interval_empty(&peer_req->i));
366 mempool_free(peer_req, drbd_ee_mempool);
b411b363
PR
367}
368
369int drbd_release_ee(struct drbd_conf *mdev, struct list_head *list)
370{
371 LIST_HEAD(work_list);
db830c46 372 struct drbd_peer_request *peer_req, *t;
b411b363 373 int count = 0;
435f0740 374 int is_net = list == &mdev->net_ee;
b411b363 375
87eeee41 376 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 377 list_splice_init(list, &work_list);
87eeee41 378 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 379
db830c46
AG
380 list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
381 drbd_free_some_ee(mdev, peer_req, is_net);
b411b363
PR
382 count++;
383 }
384 return count;
385}
386
387
388/*
389 * This function is called from _asender only_
8554df1c 390 * but see also comments in _req_mod(,BARRIER_ACKED)
b411b363
PR
391 * and receive_Barrier.
392 *
393 * Move entries from net_ee to done_ee, if ready.
394 * Grab done_ee, call all callbacks, free the entries.
395 * The callbacks typically send out ACKs.
396 */
397static int drbd_process_done_ee(struct drbd_conf *mdev)
398{
399 LIST_HEAD(work_list);
400 LIST_HEAD(reclaimed);
db830c46 401 struct drbd_peer_request *peer_req, *t;
b411b363
PR
402 int ok = (mdev->state.conn >= C_WF_REPORT_PARAMS);
403
87eeee41 404 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
405 reclaim_net_ee(mdev, &reclaimed);
406 list_splice_init(&mdev->done_ee, &work_list);
87eeee41 407 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 408
db830c46
AG
409 list_for_each_entry_safe(peer_req, t, &reclaimed, w.list)
410 drbd_free_net_ee(mdev, peer_req);
b411b363
PR
411
412 /* possible callbacks here:
413 * e_end_block, and e_end_resync_block, e_send_discard_ack.
414 * all ignore the last argument.
415 */
db830c46 416 list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
b411b363 417 /* list_del not necessary, next/prev members not touched */
db830c46
AG
418 ok = peer_req->w.cb(mdev, &peer_req->w, !ok) && ok;
419 drbd_free_ee(mdev, peer_req);
b411b363
PR
420 }
421 wake_up(&mdev->ee_wait);
422
423 return ok;
424}
425
426void _drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
427{
428 DEFINE_WAIT(wait);
429
430 /* avoids spin_lock/unlock
431 * and calling prepare_to_wait in the fast path */
432 while (!list_empty(head)) {
433 prepare_to_wait(&mdev->ee_wait, &wait, TASK_UNINTERRUPTIBLE);
87eeee41 434 spin_unlock_irq(&mdev->tconn->req_lock);
7eaceacc 435 io_schedule();
b411b363 436 finish_wait(&mdev->ee_wait, &wait);
87eeee41 437 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
438 }
439}
440
441void drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
442{
87eeee41 443 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 444 _drbd_wait_ee_list_empty(mdev, head);
87eeee41 445 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
446}
447
448/* see also kernel_accept; which is only present since 2.6.18.
449 * also we want to log which part of it failed, exactly */
7653620d 450static int drbd_accept(const char **what, struct socket *sock, struct socket **newsock)
b411b363
PR
451{
452 struct sock *sk = sock->sk;
453 int err = 0;
454
455 *what = "listen";
456 err = sock->ops->listen(sock, 5);
457 if (err < 0)
458 goto out;
459
460 *what = "sock_create_lite";
461 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
462 newsock);
463 if (err < 0)
464 goto out;
465
466 *what = "accept";
467 err = sock->ops->accept(sock, *newsock, 0);
468 if (err < 0) {
469 sock_release(*newsock);
470 *newsock = NULL;
471 goto out;
472 }
473 (*newsock)->ops = sock->ops;
474
475out:
476 return err;
477}
478
479static int drbd_recv_short(struct drbd_conf *mdev, struct socket *sock,
480 void *buf, size_t size, int flags)
481{
482 mm_segment_t oldfs;
483 struct kvec iov = {
484 .iov_base = buf,
485 .iov_len = size,
486 };
487 struct msghdr msg = {
488 .msg_iovlen = 1,
489 .msg_iov = (struct iovec *)&iov,
490 .msg_flags = (flags ? flags : MSG_WAITALL | MSG_NOSIGNAL)
491 };
492 int rv;
493
494 oldfs = get_fs();
495 set_fs(KERNEL_DS);
496 rv = sock_recvmsg(sock, &msg, size, msg.msg_flags);
497 set_fs(oldfs);
498
499 return rv;
500}
501
502static int drbd_recv(struct drbd_conf *mdev, void *buf, size_t size)
503{
504 mm_segment_t oldfs;
505 struct kvec iov = {
506 .iov_base = buf,
507 .iov_len = size,
508 };
509 struct msghdr msg = {
510 .msg_iovlen = 1,
511 .msg_iov = (struct iovec *)&iov,
512 .msg_flags = MSG_WAITALL | MSG_NOSIGNAL
513 };
514 int rv;
515
516 oldfs = get_fs();
517 set_fs(KERNEL_DS);
518
519 for (;;) {
e42325a5 520 rv = sock_recvmsg(mdev->tconn->data.socket, &msg, size, msg.msg_flags);
b411b363
PR
521 if (rv == size)
522 break;
523
524 /* Note:
525 * ECONNRESET other side closed the connection
526 * ERESTARTSYS (on sock) we got a signal
527 */
528
529 if (rv < 0) {
530 if (rv == -ECONNRESET)
531 dev_info(DEV, "sock was reset by peer\n");
532 else if (rv != -ERESTARTSYS)
533 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
534 break;
535 } else if (rv == 0) {
536 dev_info(DEV, "sock was shut down by peer\n");
537 break;
538 } else {
539 /* signal came in, or peer/link went down,
540 * after we read a partial message
541 */
542 /* D_ASSERT(signal_pending(current)); */
543 break;
544 }
545 };
546
547 set_fs(oldfs);
548
549 if (rv != size)
550 drbd_force_state(mdev, NS(conn, C_BROKEN_PIPE));
551
552 return rv;
553}
554
5dbf1673
LE
555/* quoting tcp(7):
556 * On individual connections, the socket buffer size must be set prior to the
557 * listen(2) or connect(2) calls in order to have it take effect.
558 * This is our wrapper to do so.
559 */
560static void drbd_setbufsize(struct socket *sock, unsigned int snd,
561 unsigned int rcv)
562{
563 /* open coded SO_SNDBUF, SO_RCVBUF */
564 if (snd) {
565 sock->sk->sk_sndbuf = snd;
566 sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
567 }
568 if (rcv) {
569 sock->sk->sk_rcvbuf = rcv;
570 sock->sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
571 }
572}
573
eac3e990 574static struct socket *drbd_try_connect(struct drbd_tconn *tconn)
b411b363
PR
575{
576 const char *what;
577 struct socket *sock;
578 struct sockaddr_in6 src_in6;
579 int err;
580 int disconnect_on_error = 1;
581
eac3e990 582 if (!get_net_conf(tconn))
b411b363
PR
583 return NULL;
584
585 what = "sock_create_kern";
eac3e990 586 err = sock_create_kern(((struct sockaddr *)tconn->net_conf->my_addr)->sa_family,
b411b363
PR
587 SOCK_STREAM, IPPROTO_TCP, &sock);
588 if (err < 0) {
589 sock = NULL;
590 goto out;
591 }
592
593 sock->sk->sk_rcvtimeo =
eac3e990
PR
594 sock->sk->sk_sndtimeo = tconn->net_conf->try_connect_int*HZ;
595 drbd_setbufsize(sock, tconn->net_conf->sndbuf_size,
596 tconn->net_conf->rcvbuf_size);
b411b363
PR
597
598 /* explicitly bind to the configured IP as source IP
599 * for the outgoing connections.
600 * This is needed for multihomed hosts and to be
601 * able to use lo: interfaces for drbd.
602 * Make sure to use 0 as port number, so linux selects
603 * a free one dynamically.
604 */
eac3e990
PR
605 memcpy(&src_in6, tconn->net_conf->my_addr,
606 min_t(int, tconn->net_conf->my_addr_len, sizeof(src_in6)));
607 if (((struct sockaddr *)tconn->net_conf->my_addr)->sa_family == AF_INET6)
b411b363
PR
608 src_in6.sin6_port = 0;
609 else
610 ((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
611
612 what = "bind before connect";
613 err = sock->ops->bind(sock,
614 (struct sockaddr *) &src_in6,
eac3e990 615 tconn->net_conf->my_addr_len);
b411b363
PR
616 if (err < 0)
617 goto out;
618
619 /* connect may fail, peer not yet available.
620 * stay C_WF_CONNECTION, don't go Disconnecting! */
621 disconnect_on_error = 0;
622 what = "connect";
623 err = sock->ops->connect(sock,
eac3e990
PR
624 (struct sockaddr *)tconn->net_conf->peer_addr,
625 tconn->net_conf->peer_addr_len, 0);
b411b363
PR
626
627out:
628 if (err < 0) {
629 if (sock) {
630 sock_release(sock);
631 sock = NULL;
632 }
633 switch (-err) {
634 /* timeout, busy, signal pending */
635 case ETIMEDOUT: case EAGAIN: case EINPROGRESS:
636 case EINTR: case ERESTARTSYS:
637 /* peer not (yet) available, network problem */
638 case ECONNREFUSED: case ENETUNREACH:
639 case EHOSTDOWN: case EHOSTUNREACH:
640 disconnect_on_error = 0;
641 break;
642 default:
eac3e990 643 conn_err(tconn, "%s failed, err = %d\n", what, err);
b411b363
PR
644 }
645 if (disconnect_on_error)
eac3e990 646 drbd_force_state(tconn->volume0, NS(conn, C_DISCONNECTING));
b411b363 647 }
eac3e990 648 put_net_conf(tconn);
b411b363
PR
649 return sock;
650}
651
7653620d 652static struct socket *drbd_wait_for_connect(struct drbd_tconn *tconn)
b411b363
PR
653{
654 int timeo, err;
655 struct socket *s_estab = NULL, *s_listen;
656 const char *what;
657
7653620d 658 if (!get_net_conf(tconn))
b411b363
PR
659 return NULL;
660
661 what = "sock_create_kern";
7653620d 662 err = sock_create_kern(((struct sockaddr *)tconn->net_conf->my_addr)->sa_family,
b411b363
PR
663 SOCK_STREAM, IPPROTO_TCP, &s_listen);
664 if (err) {
665 s_listen = NULL;
666 goto out;
667 }
668
7653620d 669 timeo = tconn->net_conf->try_connect_int * HZ;
b411b363
PR
670 timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
671
672 s_listen->sk->sk_reuse = 1; /* SO_REUSEADDR */
673 s_listen->sk->sk_rcvtimeo = timeo;
674 s_listen->sk->sk_sndtimeo = timeo;
7653620d
PR
675 drbd_setbufsize(s_listen, tconn->net_conf->sndbuf_size,
676 tconn->net_conf->rcvbuf_size);
b411b363
PR
677
678 what = "bind before listen";
679 err = s_listen->ops->bind(s_listen,
7653620d
PR
680 (struct sockaddr *) tconn->net_conf->my_addr,
681 tconn->net_conf->my_addr_len);
b411b363
PR
682 if (err < 0)
683 goto out;
684
7653620d 685 err = drbd_accept(&what, s_listen, &s_estab);
b411b363
PR
686
687out:
688 if (s_listen)
689 sock_release(s_listen);
690 if (err < 0) {
691 if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
7653620d
PR
692 conn_err(tconn, "%s failed, err = %d\n", what, err);
693 drbd_force_state(tconn->volume0, NS(conn, C_DISCONNECTING));
b411b363
PR
694 }
695 }
7653620d 696 put_net_conf(tconn);
b411b363
PR
697
698 return s_estab;
699}
700
d8763023
AG
701static int drbd_send_fp(struct drbd_conf *mdev, struct socket *sock,
702 enum drbd_packet cmd)
b411b363 703{
c012949a 704 struct p_header *h = &mdev->tconn->data.sbuf.header;
b411b363
PR
705
706 return _drbd_send_cmd(mdev, sock, cmd, h, sizeof(*h), 0);
707}
708
d8763023
AG
709static enum drbd_packet drbd_recv_fp(struct drbd_conf *mdev,
710 struct socket *sock)
b411b363 711{
e42325a5 712 struct p_header80 *h = &mdev->tconn->data.rbuf.header.h80;
b411b363
PR
713 int rr;
714
715 rr = drbd_recv_short(mdev, sock, h, sizeof(*h), 0);
716
ca9bc12b 717 if (rr == sizeof(*h) && h->magic == cpu_to_be32(DRBD_MAGIC))
b411b363
PR
718 return be16_to_cpu(h->command);
719
720 return 0xffff;
721}
722
723/**
724 * drbd_socket_okay() - Free the socket if its connection is not okay
725 * @mdev: DRBD device.
726 * @sock: pointer to the pointer to the socket.
727 */
728static int drbd_socket_okay(struct drbd_conf *mdev, struct socket **sock)
729{
730 int rr;
731 char tb[4];
732
733 if (!*sock)
81e84650 734 return false;
b411b363
PR
735
736 rr = drbd_recv_short(mdev, *sock, tb, 4, MSG_DONTWAIT | MSG_PEEK);
737
738 if (rr > 0 || rr == -EAGAIN) {
81e84650 739 return true;
b411b363
PR
740 } else {
741 sock_release(*sock);
742 *sock = NULL;
81e84650 743 return false;
b411b363
PR
744 }
745}
746
747/*
748 * return values:
749 * 1 yes, we have a valid connection
750 * 0 oops, did not work out, please try again
751 * -1 peer talks different language,
752 * no point in trying again, please go standalone.
753 * -2 We do not have a network config...
754 */
755static int drbd_connect(struct drbd_conf *mdev)
756{
757 struct socket *s, *sock, *msock;
758 int try, h, ok;
759
e42325a5 760 D_ASSERT(!mdev->tconn->data.socket);
b411b363 761
b411b363
PR
762 if (drbd_request_state(mdev, NS(conn, C_WF_CONNECTION)) < SS_SUCCESS)
763 return -2;
764
25703f83 765 clear_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
fd340c12
PR
766 mdev->tconn->agreed_pro_version = 99;
767 /* agreed_pro_version must be smaller than 100 so we send the old
768 header (h80) in the first packet and in the handshake packet. */
b411b363
PR
769
770 sock = NULL;
771 msock = NULL;
772
773 do {
774 for (try = 0;;) {
775 /* 3 tries, this should take less than a second! */
eac3e990 776 s = drbd_try_connect(mdev->tconn);
b411b363
PR
777 if (s || ++try >= 3)
778 break;
779 /* give the other side time to call bind() & listen() */
20ee6390 780 schedule_timeout_interruptible(HZ / 10);
b411b363
PR
781 }
782
783 if (s) {
784 if (!sock) {
785 drbd_send_fp(mdev, s, P_HAND_SHAKE_S);
786 sock = s;
787 s = NULL;
788 } else if (!msock) {
789 drbd_send_fp(mdev, s, P_HAND_SHAKE_M);
790 msock = s;
791 s = NULL;
792 } else {
793 dev_err(DEV, "Logic error in drbd_connect()\n");
794 goto out_release_sockets;
795 }
796 }
797
798 if (sock && msock) {
89e58e75 799 schedule_timeout_interruptible(mdev->tconn->net_conf->ping_timeo*HZ/10);
b411b363
PR
800 ok = drbd_socket_okay(mdev, &sock);
801 ok = drbd_socket_okay(mdev, &msock) && ok;
802 if (ok)
803 break;
804 }
805
806retry:
7653620d 807 s = drbd_wait_for_connect(mdev->tconn);
b411b363
PR
808 if (s) {
809 try = drbd_recv_fp(mdev, s);
810 drbd_socket_okay(mdev, &sock);
811 drbd_socket_okay(mdev, &msock);
812 switch (try) {
813 case P_HAND_SHAKE_S:
814 if (sock) {
815 dev_warn(DEV, "initial packet S crossed\n");
816 sock_release(sock);
817 }
818 sock = s;
819 break;
820 case P_HAND_SHAKE_M:
821 if (msock) {
822 dev_warn(DEV, "initial packet M crossed\n");
823 sock_release(msock);
824 }
825 msock = s;
25703f83 826 set_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363
PR
827 break;
828 default:
829 dev_warn(DEV, "Error receiving initial packet\n");
830 sock_release(s);
831 if (random32() & 1)
832 goto retry;
833 }
834 }
835
836 if (mdev->state.conn <= C_DISCONNECTING)
837 goto out_release_sockets;
838 if (signal_pending(current)) {
839 flush_signals(current);
840 smp_rmb();
e6b3ea83 841 if (get_t_state(&mdev->tconn->receiver) == EXITING)
b411b363
PR
842 goto out_release_sockets;
843 }
844
845 if (sock && msock) {
846 ok = drbd_socket_okay(mdev, &sock);
847 ok = drbd_socket_okay(mdev, &msock) && ok;
848 if (ok)
849 break;
850 }
851 } while (1);
852
853 msock->sk->sk_reuse = 1; /* SO_REUSEADDR */
854 sock->sk->sk_reuse = 1; /* SO_REUSEADDR */
855
856 sock->sk->sk_allocation = GFP_NOIO;
857 msock->sk->sk_allocation = GFP_NOIO;
858
859 sock->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
860 msock->sk->sk_priority = TC_PRIO_INTERACTIVE;
861
b411b363 862 /* NOT YET ...
89e58e75 863 * sock->sk->sk_sndtimeo = mdev->tconn->net_conf->timeout*HZ/10;
b411b363
PR
864 * sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
865 * first set it to the P_HAND_SHAKE timeout,
866 * which we set to 4x the configured ping_timeout. */
867 sock->sk->sk_sndtimeo =
89e58e75 868 sock->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_timeo*4*HZ/10;
b411b363 869
89e58e75
PR
870 msock->sk->sk_sndtimeo = mdev->tconn->net_conf->timeout*HZ/10;
871 msock->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_int*HZ;
b411b363
PR
872
873 /* we don't want delays.
25985edc 874 * we use TCP_CORK where appropriate, though */
b411b363
PR
875 drbd_tcp_nodelay(sock);
876 drbd_tcp_nodelay(msock);
877
e42325a5
PR
878 mdev->tconn->data.socket = sock;
879 mdev->tconn->meta.socket = msock;
31890f4a 880 mdev->tconn->last_received = jiffies;
b411b363 881
e6b3ea83 882 D_ASSERT(mdev->tconn->asender.task == NULL);
b411b363
PR
883
884 h = drbd_do_handshake(mdev);
885 if (h <= 0)
886 return h;
887
a0638456 888 if (mdev->tconn->cram_hmac_tfm) {
b411b363 889 /* drbd_request_state(mdev, NS(conn, WFAuth)); */
b10d96cb
JT
890 switch (drbd_do_auth(mdev)) {
891 case -1:
b411b363
PR
892 dev_err(DEV, "Authentication of peer failed\n");
893 return -1;
b10d96cb
JT
894 case 0:
895 dev_err(DEV, "Authentication of peer failed, trying again.\n");
896 return 0;
b411b363
PR
897 }
898 }
899
900 if (drbd_request_state(mdev, NS(conn, C_WF_REPORT_PARAMS)) < SS_SUCCESS)
901 return 0;
902
89e58e75 903 sock->sk->sk_sndtimeo = mdev->tconn->net_conf->timeout*HZ/10;
b411b363
PR
904 sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
905
906 atomic_set(&mdev->packet_seq, 0);
907 mdev->peer_seq = 0;
908
e6b3ea83 909 drbd_thread_start(&mdev->tconn->asender);
b411b363 910
148efa16 911 if (drbd_send_protocol(mdev) == -1)
7e2455c1 912 return -1;
b411b363 913 drbd_send_sync_param(mdev, &mdev->sync_conf);
e89b591c 914 drbd_send_sizes(mdev, 0, 0);
b411b363
PR
915 drbd_send_uuids(mdev);
916 drbd_send_state(mdev);
917 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
918 clear_bit(RESIZE_PENDING, &mdev->flags);
7fde2be9 919 mod_timer(&mdev->request_timer, jiffies + HZ); /* just start it here. */
b411b363
PR
920
921 return 1;
922
923out_release_sockets:
924 if (sock)
925 sock_release(sock);
926 if (msock)
927 sock_release(msock);
928 return -1;
929}
930
d8763023
AG
931static bool decode_header(struct drbd_conf *mdev, struct p_header *h,
932 enum drbd_packet *cmd, unsigned int *packet_size)
b411b363 933{
fd340c12 934 if (h->h80.magic == cpu_to_be32(DRBD_MAGIC)) {
02918be2
PR
935 *cmd = be16_to_cpu(h->h80.command);
936 *packet_size = be16_to_cpu(h->h80.length);
ca9bc12b 937 } else if (h->h95.magic == cpu_to_be16(DRBD_MAGIC_BIG)) {
02918be2 938 *cmd = be16_to_cpu(h->h95.command);
fd340c12 939 *packet_size = be32_to_cpu(h->h95.length) & 0x00ffffff;
02918be2 940 } else {
004352fa
LE
941 dev_err(DEV, "magic?? on data m: 0x%08x c: %d l: %d\n",
942 be32_to_cpu(h->h80.magic),
943 be16_to_cpu(h->h80.command),
944 be16_to_cpu(h->h80.length));
81e84650 945 return false;
b411b363 946 }
257d0af6
PR
947 return true;
948}
949
d8763023
AG
950static int drbd_recv_header(struct drbd_conf *mdev, enum drbd_packet *cmd,
951 unsigned int *packet_size)
257d0af6
PR
952{
953 struct p_header *h = &mdev->tconn->data.rbuf.header;
954 int r;
955
956 r = drbd_recv(mdev, h, sizeof(*h));
957 if (unlikely(r != sizeof(*h))) {
958 if (!signal_pending(current))
959 dev_warn(DEV, "short read expecting header on sock: r=%d\n", r);
960 return false;
961 }
962
963 r = decode_header(mdev, h, cmd, packet_size);
31890f4a 964 mdev->tconn->last_received = jiffies;
b411b363 965
257d0af6 966 return r;
b411b363
PR
967}
968
2451fc3b 969static void drbd_flush(struct drbd_conf *mdev)
b411b363
PR
970{
971 int rv;
972
973 if (mdev->write_ordering >= WO_bdev_flush && get_ldev(mdev)) {
fbd9b09a 974 rv = blkdev_issue_flush(mdev->ldev->backing_bdev, GFP_KERNEL,
dd3932ed 975 NULL);
b411b363
PR
976 if (rv) {
977 dev_err(DEV, "local disk flush failed with status %d\n", rv);
978 /* would rather check on EOPNOTSUPP, but that is not reliable.
979 * don't try again for ANY return value != 0
980 * if (rv == -EOPNOTSUPP) */
981 drbd_bump_write_ordering(mdev, WO_drain_io);
982 }
983 put_ldev(mdev);
984 }
b411b363
PR
985}
986
987/**
988 * drbd_may_finish_epoch() - Applies an epoch_event to the epoch's state, eventually finishes it.
989 * @mdev: DRBD device.
990 * @epoch: Epoch object.
991 * @ev: Epoch event.
992 */
993static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
994 struct drbd_epoch *epoch,
995 enum epoch_event ev)
996{
2451fc3b 997 int epoch_size;
b411b363 998 struct drbd_epoch *next_epoch;
b411b363
PR
999 enum finish_epoch rv = FE_STILL_LIVE;
1000
1001 spin_lock(&mdev->epoch_lock);
1002 do {
1003 next_epoch = NULL;
b411b363
PR
1004
1005 epoch_size = atomic_read(&epoch->epoch_size);
1006
1007 switch (ev & ~EV_CLEANUP) {
1008 case EV_PUT:
1009 atomic_dec(&epoch->active);
1010 break;
1011 case EV_GOT_BARRIER_NR:
1012 set_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags);
b411b363
PR
1013 break;
1014 case EV_BECAME_LAST:
1015 /* nothing to do*/
1016 break;
1017 }
1018
b411b363
PR
1019 if (epoch_size != 0 &&
1020 atomic_read(&epoch->active) == 0 &&
2451fc3b 1021 test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags)) {
b411b363
PR
1022 if (!(ev & EV_CLEANUP)) {
1023 spin_unlock(&mdev->epoch_lock);
1024 drbd_send_b_ack(mdev, epoch->barrier_nr, epoch_size);
1025 spin_lock(&mdev->epoch_lock);
1026 }
1027 dec_unacked(mdev);
1028
1029 if (mdev->current_epoch != epoch) {
1030 next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
1031 list_del(&epoch->list);
1032 ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
1033 mdev->epochs--;
b411b363
PR
1034 kfree(epoch);
1035
1036 if (rv == FE_STILL_LIVE)
1037 rv = FE_DESTROYED;
1038 } else {
1039 epoch->flags = 0;
1040 atomic_set(&epoch->epoch_size, 0);
698f9315 1041 /* atomic_set(&epoch->active, 0); is already zero */
b411b363
PR
1042 if (rv == FE_STILL_LIVE)
1043 rv = FE_RECYCLED;
2451fc3b 1044 wake_up(&mdev->ee_wait);
b411b363
PR
1045 }
1046 }
1047
1048 if (!next_epoch)
1049 break;
1050
1051 epoch = next_epoch;
1052 } while (1);
1053
1054 spin_unlock(&mdev->epoch_lock);
1055
b411b363
PR
1056 return rv;
1057}
1058
1059/**
1060 * drbd_bump_write_ordering() - Fall back to an other write ordering method
1061 * @mdev: DRBD device.
1062 * @wo: Write ordering method to try.
1063 */
1064void drbd_bump_write_ordering(struct drbd_conf *mdev, enum write_ordering_e wo) __must_hold(local)
1065{
1066 enum write_ordering_e pwo;
1067 static char *write_ordering_str[] = {
1068 [WO_none] = "none",
1069 [WO_drain_io] = "drain",
1070 [WO_bdev_flush] = "flush",
b411b363
PR
1071 };
1072
1073 pwo = mdev->write_ordering;
1074 wo = min(pwo, wo);
b411b363
PR
1075 if (wo == WO_bdev_flush && mdev->ldev->dc.no_disk_flush)
1076 wo = WO_drain_io;
1077 if (wo == WO_drain_io && mdev->ldev->dc.no_disk_drain)
1078 wo = WO_none;
1079 mdev->write_ordering = wo;
2451fc3b 1080 if (pwo != mdev->write_ordering || wo == WO_bdev_flush)
b411b363
PR
1081 dev_info(DEV, "Method to ensure write ordering: %s\n", write_ordering_str[mdev->write_ordering]);
1082}
1083
45bb912b
LE
1084/**
1085 * drbd_submit_ee()
1086 * @mdev: DRBD device.
db830c46 1087 * @peer_req: peer request
45bb912b 1088 * @rw: flag field, see bio->bi_rw
10f6d992
LE
1089 *
1090 * May spread the pages to multiple bios,
1091 * depending on bio_add_page restrictions.
1092 *
1093 * Returns 0 if all bios have been submitted,
1094 * -ENOMEM if we could not allocate enough bios,
1095 * -ENOSPC (any better suggestion?) if we have not been able to bio_add_page a
1096 * single page to an empty bio (which should never happen and likely indicates
1097 * that the lower level IO stack is in some way broken). This has been observed
1098 * on certain Xen deployments.
45bb912b
LE
1099 */
1100/* TODO allocate from our own bio_set. */
db830c46 1101int drbd_submit_ee(struct drbd_conf *mdev, struct drbd_peer_request *peer_req,
f6ffca9f 1102 const unsigned rw, const int fault_type)
45bb912b
LE
1103{
1104 struct bio *bios = NULL;
1105 struct bio *bio;
db830c46
AG
1106 struct page *page = peer_req->pages;
1107 sector_t sector = peer_req->i.sector;
1108 unsigned ds = peer_req->i.size;
45bb912b
LE
1109 unsigned n_bios = 0;
1110 unsigned nr_pages = (ds + PAGE_SIZE -1) >> PAGE_SHIFT;
10f6d992 1111 int err = -ENOMEM;
45bb912b
LE
1112
1113 /* In most cases, we will only need one bio. But in case the lower
1114 * level restrictions happen to be different at this offset on this
1115 * side than those of the sending peer, we may need to submit the
1116 * request in more than one bio. */
1117next_bio:
1118 bio = bio_alloc(GFP_NOIO, nr_pages);
1119 if (!bio) {
1120 dev_err(DEV, "submit_ee: Allocation of a bio failed\n");
1121 goto fail;
1122 }
db830c46 1123 /* > peer_req->i.sector, unless this is the first bio */
45bb912b
LE
1124 bio->bi_sector = sector;
1125 bio->bi_bdev = mdev->ldev->backing_bdev;
45bb912b 1126 bio->bi_rw = rw;
db830c46 1127 bio->bi_private = peer_req;
45bb912b
LE
1128 bio->bi_end_io = drbd_endio_sec;
1129
1130 bio->bi_next = bios;
1131 bios = bio;
1132 ++n_bios;
1133
1134 page_chain_for_each(page) {
1135 unsigned len = min_t(unsigned, ds, PAGE_SIZE);
1136 if (!bio_add_page(bio, page, len, 0)) {
10f6d992
LE
1137 /* A single page must always be possible!
1138 * But in case it fails anyways,
1139 * we deal with it, and complain (below). */
1140 if (bio->bi_vcnt == 0) {
1141 dev_err(DEV,
1142 "bio_add_page failed for len=%u, "
1143 "bi_vcnt=0 (bi_sector=%llu)\n",
1144 len, (unsigned long long)bio->bi_sector);
1145 err = -ENOSPC;
1146 goto fail;
1147 }
45bb912b
LE
1148 goto next_bio;
1149 }
1150 ds -= len;
1151 sector += len >> 9;
1152 --nr_pages;
1153 }
1154 D_ASSERT(page == NULL);
1155 D_ASSERT(ds == 0);
1156
db830c46 1157 atomic_set(&peer_req->pending_bios, n_bios);
45bb912b
LE
1158 do {
1159 bio = bios;
1160 bios = bios->bi_next;
1161 bio->bi_next = NULL;
1162
45bb912b 1163 drbd_generic_make_request(mdev, fault_type, bio);
45bb912b 1164 } while (bios);
45bb912b
LE
1165 return 0;
1166
1167fail:
1168 while (bios) {
1169 bio = bios;
1170 bios = bios->bi_next;
1171 bio_put(bio);
1172 }
10f6d992 1173 return err;
45bb912b
LE
1174}
1175
53840641 1176static void drbd_remove_epoch_entry_interval(struct drbd_conf *mdev,
db830c46 1177 struct drbd_peer_request *peer_req)
53840641 1178{
db830c46 1179 struct drbd_interval *i = &peer_req->i;
53840641
AG
1180
1181 drbd_remove_interval(&mdev->write_requests, i);
1182 drbd_clear_interval(i);
1183
6c852bec 1184 /* Wake up any processes waiting for this peer request to complete. */
53840641
AG
1185 if (i->waiting)
1186 wake_up(&mdev->misc_wait);
1187}
1188
d8763023
AG
1189static int receive_Barrier(struct drbd_conf *mdev, enum drbd_packet cmd,
1190 unsigned int data_size)
b411b363 1191{
2451fc3b 1192 int rv;
e42325a5 1193 struct p_barrier *p = &mdev->tconn->data.rbuf.barrier;
b411b363
PR
1194 struct drbd_epoch *epoch;
1195
b411b363
PR
1196 inc_unacked(mdev);
1197
b411b363
PR
1198 mdev->current_epoch->barrier_nr = p->barrier;
1199 rv = drbd_may_finish_epoch(mdev, mdev->current_epoch, EV_GOT_BARRIER_NR);
1200
1201 /* P_BARRIER_ACK may imply that the corresponding extent is dropped from
1202 * the activity log, which means it would not be resynced in case the
1203 * R_PRIMARY crashes now.
1204 * Therefore we must send the barrier_ack after the barrier request was
1205 * completed. */
1206 switch (mdev->write_ordering) {
b411b363
PR
1207 case WO_none:
1208 if (rv == FE_RECYCLED)
81e84650 1209 return true;
2451fc3b
PR
1210
1211 /* receiver context, in the writeout path of the other node.
1212 * avoid potential distributed deadlock */
1213 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1214 if (epoch)
1215 break;
1216 else
1217 dev_warn(DEV, "Allocation of an epoch failed, slowing down\n");
1218 /* Fall through */
b411b363
PR
1219
1220 case WO_bdev_flush:
1221 case WO_drain_io:
b411b363 1222 drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
2451fc3b
PR
1223 drbd_flush(mdev);
1224
1225 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1226 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1227 if (epoch)
1228 break;
b411b363
PR
1229 }
1230
2451fc3b
PR
1231 epoch = mdev->current_epoch;
1232 wait_event(mdev->ee_wait, atomic_read(&epoch->epoch_size) == 0);
1233
1234 D_ASSERT(atomic_read(&epoch->active) == 0);
1235 D_ASSERT(epoch->flags == 0);
b411b363 1236
81e84650 1237 return true;
2451fc3b
PR
1238 default:
1239 dev_err(DEV, "Strangeness in mdev->write_ordering %d\n", mdev->write_ordering);
81e84650 1240 return false;
b411b363
PR
1241 }
1242
1243 epoch->flags = 0;
1244 atomic_set(&epoch->epoch_size, 0);
1245 atomic_set(&epoch->active, 0);
1246
1247 spin_lock(&mdev->epoch_lock);
1248 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1249 list_add(&epoch->list, &mdev->current_epoch->list);
1250 mdev->current_epoch = epoch;
1251 mdev->epochs++;
b411b363
PR
1252 } else {
1253 /* The current_epoch got recycled while we allocated this one... */
1254 kfree(epoch);
1255 }
1256 spin_unlock(&mdev->epoch_lock);
1257
81e84650 1258 return true;
b411b363
PR
1259}
1260
1261/* used from receive_RSDataReply (recv_resync_read)
1262 * and from receive_Data */
f6ffca9f
AG
1263static struct drbd_peer_request *
1264read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector,
1265 int data_size) __must_hold(local)
b411b363 1266{
6666032a 1267 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
db830c46 1268 struct drbd_peer_request *peer_req;
b411b363 1269 struct page *page;
45bb912b 1270 int dgs, ds, rr;
a0638456
PR
1271 void *dig_in = mdev->tconn->int_dig_in;
1272 void *dig_vv = mdev->tconn->int_dig_vv;
6b4388ac 1273 unsigned long *data;
b411b363 1274
a0638456
PR
1275 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
1276 crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
b411b363
PR
1277
1278 if (dgs) {
1279 rr = drbd_recv(mdev, dig_in, dgs);
1280 if (rr != dgs) {
0ddc5549
LE
1281 if (!signal_pending(current))
1282 dev_warn(DEV,
1283 "short read receiving data digest: read %d expected %d\n",
1284 rr, dgs);
b411b363
PR
1285 return NULL;
1286 }
1287 }
1288
1289 data_size -= dgs;
1290
841ce241
AG
1291 if (!expect(data_size != 0))
1292 return NULL;
1293 if (!expect(IS_ALIGNED(data_size, 512)))
1294 return NULL;
1295 if (!expect(data_size <= DRBD_MAX_BIO_SIZE))
1296 return NULL;
b411b363 1297
6666032a
LE
1298 /* even though we trust out peer,
1299 * we sometimes have to double check. */
1300 if (sector + (data_size>>9) > capacity) {
fdda6544
LE
1301 dev_err(DEV, "request from peer beyond end of local disk: "
1302 "capacity: %llus < sector: %llus + size: %u\n",
6666032a
LE
1303 (unsigned long long)capacity,
1304 (unsigned long long)sector, data_size);
1305 return NULL;
1306 }
1307
b411b363
PR
1308 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1309 * "criss-cross" setup, that might cause write-out on some other DRBD,
1310 * which in turn might block on the other node at this very place. */
db830c46
AG
1311 peer_req = drbd_alloc_ee(mdev, id, sector, data_size, GFP_NOIO);
1312 if (!peer_req)
b411b363 1313 return NULL;
45bb912b 1314
b411b363 1315 ds = data_size;
db830c46 1316 page = peer_req->pages;
45bb912b
LE
1317 page_chain_for_each(page) {
1318 unsigned len = min_t(int, ds, PAGE_SIZE);
6b4388ac 1319 data = kmap(page);
45bb912b 1320 rr = drbd_recv(mdev, data, len);
0cf9d27e 1321 if (drbd_insert_fault(mdev, DRBD_FAULT_RECEIVE)) {
6b4388ac
PR
1322 dev_err(DEV, "Fault injection: Corrupting data on receive\n");
1323 data[0] = data[0] ^ (unsigned long)-1;
1324 }
b411b363 1325 kunmap(page);
45bb912b 1326 if (rr != len) {
db830c46 1327 drbd_free_ee(mdev, peer_req);
0ddc5549
LE
1328 if (!signal_pending(current))
1329 dev_warn(DEV, "short read receiving data: read %d expected %d\n",
1330 rr, len);
b411b363
PR
1331 return NULL;
1332 }
1333 ds -= rr;
1334 }
1335
1336 if (dgs) {
db830c46 1337 drbd_csum_ee(mdev, mdev->tconn->integrity_r_tfm, peer_req, dig_vv);
b411b363 1338 if (memcmp(dig_in, dig_vv, dgs)) {
470be44a
LE
1339 dev_err(DEV, "Digest integrity check FAILED: %llus +%u\n",
1340 (unsigned long long)sector, data_size);
b411b363 1341 drbd_bcast_ee(mdev, "digest failed",
db830c46
AG
1342 dgs, dig_in, dig_vv, peer_req);
1343 drbd_free_ee(mdev, peer_req);
b411b363
PR
1344 return NULL;
1345 }
1346 }
1347 mdev->recv_cnt += data_size>>9;
db830c46 1348 return peer_req;
b411b363
PR
1349}
1350
1351/* drbd_drain_block() just takes a data block
1352 * out of the socket input buffer, and discards it.
1353 */
1354static int drbd_drain_block(struct drbd_conf *mdev, int data_size)
1355{
1356 struct page *page;
1357 int rr, rv = 1;
1358 void *data;
1359
c3470cde 1360 if (!data_size)
81e84650 1361 return true;
c3470cde 1362
45bb912b 1363 page = drbd_pp_alloc(mdev, 1, 1);
b411b363
PR
1364
1365 data = kmap(page);
1366 while (data_size) {
1367 rr = drbd_recv(mdev, data, min_t(int, data_size, PAGE_SIZE));
1368 if (rr != min_t(int, data_size, PAGE_SIZE)) {
1369 rv = 0;
0ddc5549
LE
1370 if (!signal_pending(current))
1371 dev_warn(DEV,
1372 "short read receiving data: read %d expected %d\n",
1373 rr, min_t(int, data_size, PAGE_SIZE));
b411b363
PR
1374 break;
1375 }
1376 data_size -= rr;
1377 }
1378 kunmap(page);
435f0740 1379 drbd_pp_free(mdev, page, 0);
b411b363
PR
1380 return rv;
1381}
1382
1383static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
1384 sector_t sector, int data_size)
1385{
1386 struct bio_vec *bvec;
1387 struct bio *bio;
1388 int dgs, rr, i, expect;
a0638456
PR
1389 void *dig_in = mdev->tconn->int_dig_in;
1390 void *dig_vv = mdev->tconn->int_dig_vv;
b411b363 1391
a0638456
PR
1392 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
1393 crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
b411b363
PR
1394
1395 if (dgs) {
1396 rr = drbd_recv(mdev, dig_in, dgs);
1397 if (rr != dgs) {
0ddc5549
LE
1398 if (!signal_pending(current))
1399 dev_warn(DEV,
1400 "short read receiving data reply digest: read %d expected %d\n",
1401 rr, dgs);
b411b363
PR
1402 return 0;
1403 }
1404 }
1405
1406 data_size -= dgs;
1407
1408 /* optimistically update recv_cnt. if receiving fails below,
1409 * we disconnect anyways, and counters will be reset. */
1410 mdev->recv_cnt += data_size>>9;
1411
1412 bio = req->master_bio;
1413 D_ASSERT(sector == bio->bi_sector);
1414
1415 bio_for_each_segment(bvec, bio, i) {
1416 expect = min_t(int, data_size, bvec->bv_len);
1417 rr = drbd_recv(mdev,
1418 kmap(bvec->bv_page)+bvec->bv_offset,
1419 expect);
1420 kunmap(bvec->bv_page);
1421 if (rr != expect) {
0ddc5549
LE
1422 if (!signal_pending(current))
1423 dev_warn(DEV, "short read receiving data reply: "
1424 "read %d expected %d\n",
1425 rr, expect);
b411b363
PR
1426 return 0;
1427 }
1428 data_size -= rr;
1429 }
1430
1431 if (dgs) {
a0638456 1432 drbd_csum_bio(mdev, mdev->tconn->integrity_r_tfm, bio, dig_vv);
b411b363
PR
1433 if (memcmp(dig_in, dig_vv, dgs)) {
1434 dev_err(DEV, "Digest integrity check FAILED. Broken NICs?\n");
1435 return 0;
1436 }
1437 }
1438
1439 D_ASSERT(data_size == 0);
1440 return 1;
1441}
1442
1443/* e_end_resync_block() is called via
1444 * drbd_process_done_ee() by asender only */
1445static int e_end_resync_block(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1446{
db830c46
AG
1447 struct drbd_peer_request *peer_req = (struct drbd_peer_request *)w;
1448 sector_t sector = peer_req->i.sector;
b411b363
PR
1449 int ok;
1450
db830c46 1451 D_ASSERT(drbd_interval_empty(&peer_req->i));
b411b363 1452
db830c46
AG
1453 if (likely((peer_req->flags & EE_WAS_ERROR) == 0)) {
1454 drbd_set_in_sync(mdev, sector, peer_req->i.size);
1455 ok = drbd_send_ack(mdev, P_RS_WRITE_ACK, peer_req);
b411b363
PR
1456 } else {
1457 /* Record failure to sync */
db830c46 1458 drbd_rs_failed_io(mdev, sector, peer_req->i.size);
b411b363 1459
db830c46 1460 ok = drbd_send_ack(mdev, P_NEG_ACK, peer_req);
b411b363
PR
1461 }
1462 dec_unacked(mdev);
1463
1464 return ok;
1465}
1466
1467static int recv_resync_read(struct drbd_conf *mdev, sector_t sector, int data_size) __releases(local)
1468{
db830c46 1469 struct drbd_peer_request *peer_req;
b411b363 1470
db830c46
AG
1471 peer_req = read_in_block(mdev, ID_SYNCER, sector, data_size);
1472 if (!peer_req)
45bb912b 1473 goto fail;
b411b363
PR
1474
1475 dec_rs_pending(mdev);
1476
b411b363
PR
1477 inc_unacked(mdev);
1478 /* corresponding dec_unacked() in e_end_resync_block()
1479 * respective _drbd_clear_done_ee */
1480
db830c46 1481 peer_req->w.cb = e_end_resync_block;
45bb912b 1482
87eeee41 1483 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 1484 list_add(&peer_req->w.list, &mdev->sync_ee);
87eeee41 1485 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 1486
0f0601f4 1487 atomic_add(data_size >> 9, &mdev->rs_sect_ev);
db830c46 1488 if (drbd_submit_ee(mdev, peer_req, WRITE, DRBD_FAULT_RS_WR) == 0)
81e84650 1489 return true;
b411b363 1490
10f6d992
LE
1491 /* don't care for the reason here */
1492 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 1493 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 1494 list_del(&peer_req->w.list);
87eeee41 1495 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9 1496
db830c46 1497 drbd_free_ee(mdev, peer_req);
45bb912b
LE
1498fail:
1499 put_ldev(mdev);
81e84650 1500 return false;
b411b363
PR
1501}
1502
668eebc6 1503static struct drbd_request *
bc9c5c41
AG
1504find_request(struct drbd_conf *mdev, struct rb_root *root, u64 id,
1505 sector_t sector, bool missing_ok, const char *func)
51624585 1506{
51624585
AG
1507 struct drbd_request *req;
1508
bc9c5c41
AG
1509 /* Request object according to our peer */
1510 req = (struct drbd_request *)(unsigned long)id;
5e472264 1511 if (drbd_contains_interval(root, sector, &req->i) && req->i.local)
668eebc6 1512 return req;
c3afd8f5
AG
1513 if (!missing_ok) {
1514 dev_err(DEV, "%s: failed to find request %lu, sector %llus\n", func,
1515 (unsigned long)id, (unsigned long long)sector);
1516 }
51624585
AG
1517 return NULL;
1518}
1519
d8763023
AG
1520static int receive_DataReply(struct drbd_conf *mdev, enum drbd_packet cmd,
1521 unsigned int data_size)
b411b363
PR
1522{
1523 struct drbd_request *req;
1524 sector_t sector;
b411b363 1525 int ok;
e42325a5 1526 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1527
1528 sector = be64_to_cpu(p->sector);
1529
87eeee41 1530 spin_lock_irq(&mdev->tconn->req_lock);
bc9c5c41 1531 req = find_request(mdev, &mdev->read_requests, p->block_id, sector, false, __func__);
87eeee41 1532 spin_unlock_irq(&mdev->tconn->req_lock);
c3afd8f5 1533 if (unlikely(!req))
81e84650 1534 return false;
b411b363 1535
24c4830c 1536 /* hlist_del(&req->collision) is done in _req_may_be_done, to avoid
b411b363
PR
1537 * special casing it there for the various failure cases.
1538 * still no race with drbd_fail_pending_reads */
1539 ok = recv_dless_read(mdev, req, sector, data_size);
1540
1541 if (ok)
8554df1c 1542 req_mod(req, DATA_RECEIVED);
b411b363
PR
1543 /* else: nothing. handled from drbd_disconnect...
1544 * I don't think we may complete this just yet
1545 * in case we are "on-disconnect: freeze" */
1546
1547 return ok;
1548}
1549
d8763023
AG
1550static int receive_RSDataReply(struct drbd_conf *mdev, enum drbd_packet cmd,
1551 unsigned int data_size)
b411b363
PR
1552{
1553 sector_t sector;
b411b363 1554 int ok;
e42325a5 1555 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1556
1557 sector = be64_to_cpu(p->sector);
1558 D_ASSERT(p->block_id == ID_SYNCER);
1559
1560 if (get_ldev(mdev)) {
1561 /* data is submitted to disk within recv_resync_read.
1562 * corresponding put_ldev done below on error,
9c50842a 1563 * or in drbd_endio_sec. */
b411b363
PR
1564 ok = recv_resync_read(mdev, sector, data_size);
1565 } else {
1566 if (__ratelimit(&drbd_ratelimit_state))
1567 dev_err(DEV, "Can not write resync data to local disk.\n");
1568
1569 ok = drbd_drain_block(mdev, data_size);
1570
2b2bf214 1571 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1572 }
1573
778f271d
PR
1574 atomic_add(data_size >> 9, &mdev->rs_sect_in);
1575
b411b363
PR
1576 return ok;
1577}
1578
1579/* e_end_block() is called via drbd_process_done_ee().
1580 * this means this function only runs in the asender thread
1581 */
1582static int e_end_block(struct drbd_conf *mdev, struct drbd_work *w, int cancel)
1583{
db830c46
AG
1584 struct drbd_peer_request *peer_req = (struct drbd_peer_request *)w;
1585 sector_t sector = peer_req->i.sector;
b411b363
PR
1586 int ok = 1, pcmd;
1587
89e58e75 1588 if (mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C) {
db830c46 1589 if (likely((peer_req->flags & EE_WAS_ERROR) == 0)) {
b411b363
PR
1590 pcmd = (mdev->state.conn >= C_SYNC_SOURCE &&
1591 mdev->state.conn <= C_PAUSED_SYNC_T &&
db830c46 1592 peer_req->flags & EE_MAY_SET_IN_SYNC) ?
b411b363 1593 P_RS_WRITE_ACK : P_WRITE_ACK;
db830c46 1594 ok &= drbd_send_ack(mdev, pcmd, peer_req);
b411b363 1595 if (pcmd == P_RS_WRITE_ACK)
db830c46 1596 drbd_set_in_sync(mdev, sector, peer_req->i.size);
b411b363 1597 } else {
db830c46 1598 ok = drbd_send_ack(mdev, P_NEG_ACK, peer_req);
b411b363
PR
1599 /* we expect it to be marked out of sync anyways...
1600 * maybe assert this? */
1601 }
1602 dec_unacked(mdev);
1603 }
1604 /* we delete from the conflict detection hash _after_ we sent out the
1605 * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right. */
89e58e75 1606 if (mdev->tconn->net_conf->two_primaries) {
87eeee41 1607 spin_lock_irq(&mdev->tconn->req_lock);
db830c46
AG
1608 D_ASSERT(!drbd_interval_empty(&peer_req->i));
1609 drbd_remove_epoch_entry_interval(mdev, peer_req);
87eeee41 1610 spin_unlock_irq(&mdev->tconn->req_lock);
bb3bfe96 1611 } else
db830c46 1612 D_ASSERT(drbd_interval_empty(&peer_req->i));
b411b363 1613
db830c46 1614 drbd_may_finish_epoch(mdev, peer_req->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
b411b363
PR
1615
1616 return ok;
1617}
1618
1619static int e_send_discard_ack(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1620{
db830c46 1621 struct drbd_peer_request *peer_req = (struct drbd_peer_request *)w;
b411b363
PR
1622 int ok = 1;
1623
89e58e75 1624 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
db830c46 1625 ok = drbd_send_ack(mdev, P_DISCARD_ACK, peer_req);
b411b363 1626
87eeee41 1627 spin_lock_irq(&mdev->tconn->req_lock);
db830c46
AG
1628 D_ASSERT(!drbd_interval_empty(&peer_req->i));
1629 drbd_remove_epoch_entry_interval(mdev, peer_req);
87eeee41 1630 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1631
1632 dec_unacked(mdev);
1633
1634 return ok;
1635}
1636
3e394da1
AG
1637static bool seq_greater(u32 a, u32 b)
1638{
1639 /*
1640 * We assume 32-bit wrap-around here.
1641 * For 24-bit wrap-around, we would have to shift:
1642 * a <<= 8; b <<= 8;
1643 */
1644 return (s32)a - (s32)b > 0;
1645}
1646
1647static u32 seq_max(u32 a, u32 b)
1648{
1649 return seq_greater(a, b) ? a : b;
1650}
1651
43ae077d 1652static void update_peer_seq(struct drbd_conf *mdev, unsigned int peer_seq)
3e394da1 1653{
43ae077d 1654 unsigned int old_peer_seq;
3e394da1
AG
1655
1656 spin_lock(&mdev->peer_seq_lock);
43ae077d
AG
1657 old_peer_seq = mdev->peer_seq;
1658 mdev->peer_seq = seq_max(mdev->peer_seq, peer_seq);
3e394da1 1659 spin_unlock(&mdev->peer_seq_lock);
43ae077d 1660 if (old_peer_seq != peer_seq)
3e394da1
AG
1661 wake_up(&mdev->seq_wait);
1662}
1663
b411b363
PR
1664/* Called from receive_Data.
1665 * Synchronize packets on sock with packets on msock.
1666 *
1667 * This is here so even when a P_DATA packet traveling via sock overtook an Ack
1668 * packet traveling on msock, they are still processed in the order they have
1669 * been sent.
1670 *
1671 * Note: we don't care for Ack packets overtaking P_DATA packets.
1672 *
1673 * In case packet_seq is larger than mdev->peer_seq number, there are
1674 * outstanding packets on the msock. We wait for them to arrive.
1675 * In case we are the logically next packet, we update mdev->peer_seq
1676 * ourselves. Correctly handles 32bit wrap around.
1677 *
1678 * Assume we have a 10 GBit connection, that is about 1<<30 byte per second,
1679 * about 1<<21 sectors per second. So "worst" case, we have 1<<3 == 8 seconds
1680 * for the 24bit wrap (historical atomic_t guarantee on some archs), and we have
1681 * 1<<9 == 512 seconds aka ages for the 32bit wrap around...
1682 *
1683 * returns 0 if we may process the packet,
1684 * -ERESTARTSYS if we were interrupted (by disconnect signal). */
1685static int drbd_wait_peer_seq(struct drbd_conf *mdev, const u32 packet_seq)
1686{
1687 DEFINE_WAIT(wait);
1688 unsigned int p_seq;
1689 long timeout;
1690 int ret = 0;
1691 spin_lock(&mdev->peer_seq_lock);
1692 for (;;) {
1693 prepare_to_wait(&mdev->seq_wait, &wait, TASK_INTERRUPTIBLE);
3e394da1 1694 if (!seq_greater(packet_seq, mdev->peer_seq + 1))
b411b363
PR
1695 break;
1696 if (signal_pending(current)) {
1697 ret = -ERESTARTSYS;
1698 break;
1699 }
1700 p_seq = mdev->peer_seq;
1701 spin_unlock(&mdev->peer_seq_lock);
1702 timeout = schedule_timeout(30*HZ);
1703 spin_lock(&mdev->peer_seq_lock);
1704 if (timeout == 0 && p_seq == mdev->peer_seq) {
1705 ret = -ETIMEDOUT;
1706 dev_err(DEV, "ASSERT FAILED waited 30 seconds for sequence update, forcing reconnect\n");
1707 break;
1708 }
1709 }
1710 finish_wait(&mdev->seq_wait, &wait);
1711 if (mdev->peer_seq+1 == packet_seq)
1712 mdev->peer_seq++;
1713 spin_unlock(&mdev->peer_seq_lock);
1714 return ret;
1715}
1716
688593c5
LE
1717/* see also bio_flags_to_wire()
1718 * DRBD_REQ_*, because we need to semantically map the flags to data packet
1719 * flags and back. We may replicate to other kernel versions. */
1720static unsigned long wire_flags_to_bio(struct drbd_conf *mdev, u32 dpf)
76d2e7ec 1721{
688593c5
LE
1722 return (dpf & DP_RW_SYNC ? REQ_SYNC : 0) |
1723 (dpf & DP_FUA ? REQ_FUA : 0) |
1724 (dpf & DP_FLUSH ? REQ_FLUSH : 0) |
1725 (dpf & DP_DISCARD ? REQ_DISCARD : 0);
76d2e7ec
PR
1726}
1727
b411b363 1728/* mirrored write */
d8763023
AG
1729static int receive_Data(struct drbd_conf *mdev, enum drbd_packet cmd,
1730 unsigned int data_size)
b411b363
PR
1731{
1732 sector_t sector;
db830c46 1733 struct drbd_peer_request *peer_req;
e42325a5 1734 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1735 int rw = WRITE;
1736 u32 dp_flags;
1737
b411b363 1738 if (!get_ldev(mdev)) {
b411b363
PR
1739 spin_lock(&mdev->peer_seq_lock);
1740 if (mdev->peer_seq+1 == be32_to_cpu(p->seq_num))
1741 mdev->peer_seq++;
1742 spin_unlock(&mdev->peer_seq_lock);
1743
2b2bf214 1744 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1745 atomic_inc(&mdev->current_epoch->epoch_size);
1746 return drbd_drain_block(mdev, data_size);
1747 }
1748
1749 /* get_ldev(mdev) successful.
1750 * Corresponding put_ldev done either below (on various errors),
9c50842a 1751 * or in drbd_endio_sec, if we successfully submit the data at
b411b363
PR
1752 * the end of this function. */
1753
1754 sector = be64_to_cpu(p->sector);
db830c46
AG
1755 peer_req = read_in_block(mdev, p->block_id, sector, data_size);
1756 if (!peer_req) {
b411b363 1757 put_ldev(mdev);
81e84650 1758 return false;
b411b363
PR
1759 }
1760
db830c46 1761 peer_req->w.cb = e_end_block;
b411b363 1762
688593c5
LE
1763 dp_flags = be32_to_cpu(p->dp_flags);
1764 rw |= wire_flags_to_bio(mdev, dp_flags);
1765
1766 if (dp_flags & DP_MAY_SET_IN_SYNC)
db830c46 1767 peer_req->flags |= EE_MAY_SET_IN_SYNC;
688593c5 1768
b411b363 1769 spin_lock(&mdev->epoch_lock);
db830c46
AG
1770 peer_req->epoch = mdev->current_epoch;
1771 atomic_inc(&peer_req->epoch->epoch_size);
1772 atomic_inc(&peer_req->epoch->active);
b411b363
PR
1773 spin_unlock(&mdev->epoch_lock);
1774
b411b363 1775 /* I'm the receiver, I do hold a net_cnt reference. */
89e58e75 1776 if (!mdev->tconn->net_conf->two_primaries) {
87eeee41 1777 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
1778 } else {
1779 /* don't get the req_lock yet,
1780 * we may sleep in drbd_wait_peer_seq */
db830c46 1781 const int size = peer_req->i.size;
25703f83 1782 const int discard = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363 1783 DEFINE_WAIT(wait);
b411b363
PR
1784 int first;
1785
89e58e75 1786 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
b411b363
PR
1787
1788 /* conflict detection and handling:
1789 * 1. wait on the sequence number,
1790 * in case this data packet overtook ACK packets.
5e472264 1791 * 2. check for conflicting write requests.
b411b363
PR
1792 *
1793 * Note: for two_primaries, we are protocol C,
1794 * so there cannot be any request that is DONE
1795 * but still on the transfer log.
1796 *
b411b363
PR
1797 * if no conflicting request is found:
1798 * submit.
1799 *
1800 * if any conflicting request is found
1801 * that has not yet been acked,
1802 * AND I have the "discard concurrent writes" flag:
1803 * queue (via done_ee) the P_DISCARD_ACK; OUT.
1804 *
1805 * if any conflicting request is found:
1806 * block the receiver, waiting on misc_wait
1807 * until no more conflicting requests are there,
1808 * or we get interrupted (disconnect).
1809 *
1810 * we do not just write after local io completion of those
1811 * requests, but only after req is done completely, i.e.
1812 * we wait for the P_DISCARD_ACK to arrive!
1813 *
1814 * then proceed normally, i.e. submit.
1815 */
1816 if (drbd_wait_peer_seq(mdev, be32_to_cpu(p->seq_num)))
1817 goto out_interrupted;
1818
87eeee41 1819 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 1820
b411b363
PR
1821 first = 1;
1822 for (;;) {
de696716 1823 struct drbd_interval *i;
b411b363
PR
1824 int have_unacked = 0;
1825 int have_conflict = 0;
1826 prepare_to_wait(&mdev->misc_wait, &wait,
1827 TASK_INTERRUPTIBLE);
de696716
AG
1828
1829 i = drbd_find_overlap(&mdev->write_requests, sector, size);
1830 if (i) {
de696716
AG
1831 /* only ALERT on first iteration,
1832 * we may be woken up early... */
1833 if (first)
5e472264 1834 dev_alert(DEV, "%s[%u] Concurrent %s write detected!"
de696716
AG
1835 " new: %llus +%u; pending: %llus +%u\n",
1836 current->comm, current->pid,
5e472264 1837 i->local ? "local" : "remote",
de696716 1838 (unsigned long long)sector, size,
5e472264
AG
1839 (unsigned long long)i->sector, i->size);
1840
1841 if (i->local) {
1842 struct drbd_request *req2;
1843
1844 req2 = container_of(i, struct drbd_request, i);
1845 if (req2->rq_state & RQ_NET_PENDING)
1846 ++have_unacked;
1847 }
de696716 1848 ++have_conflict;
b411b363 1849 }
b411b363
PR
1850 if (!have_conflict)
1851 break;
1852
1853 /* Discard Ack only for the _first_ iteration */
1854 if (first && discard && have_unacked) {
1855 dev_alert(DEV, "Concurrent write! [DISCARD BY FLAG] sec=%llus\n",
1856 (unsigned long long)sector);
1857 inc_unacked(mdev);
db830c46
AG
1858 peer_req->w.cb = e_send_discard_ack;
1859 list_add_tail(&peer_req->w.list, &mdev->done_ee);
b411b363 1860
87eeee41 1861 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1862
1863 /* we could probably send that P_DISCARD_ACK ourselves,
1864 * but I don't like the receiver using the msock */
1865
1866 put_ldev(mdev);
1867 wake_asender(mdev);
1868 finish_wait(&mdev->misc_wait, &wait);
81e84650 1869 return true;
b411b363
PR
1870 }
1871
1872 if (signal_pending(current)) {
87eeee41 1873 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1874 finish_wait(&mdev->misc_wait, &wait);
1875 goto out_interrupted;
1876 }
1877
a500c2ef 1878 /* Indicate to wake up mdev->misc_wait upon completion. */
53840641 1879 i->waiting = true;
a500c2ef 1880
87eeee41 1881 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1882 if (first) {
1883 first = 0;
1884 dev_alert(DEV, "Concurrent write! [W AFTERWARDS] "
1885 "sec=%llus\n", (unsigned long long)sector);
1886 } else if (discard) {
1887 /* we had none on the first iteration.
1888 * there must be none now. */
1889 D_ASSERT(have_unacked == 0);
1890 }
1891 schedule();
87eeee41 1892 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
1893 }
1894 finish_wait(&mdev->misc_wait, &wait);
5e472264 1895
db830c46 1896 drbd_insert_interval(&mdev->write_requests, &peer_req->i);
b411b363
PR
1897 }
1898
db830c46 1899 list_add(&peer_req->w.list, &mdev->active_ee);
87eeee41 1900 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 1901
89e58e75 1902 switch (mdev->tconn->net_conf->wire_protocol) {
b411b363
PR
1903 case DRBD_PROT_C:
1904 inc_unacked(mdev);
1905 /* corresponding dec_unacked() in e_end_block()
1906 * respective _drbd_clear_done_ee */
1907 break;
1908 case DRBD_PROT_B:
1909 /* I really don't like it that the receiver thread
1910 * sends on the msock, but anyways */
db830c46 1911 drbd_send_ack(mdev, P_RECV_ACK, peer_req);
b411b363
PR
1912 break;
1913 case DRBD_PROT_A:
1914 /* nothing to do */
1915 break;
1916 }
1917
6719fb03 1918 if (mdev->state.pdsk < D_INCONSISTENT) {
b411b363 1919 /* In case we have the only disk of the cluster, */
db830c46
AG
1920 drbd_set_out_of_sync(mdev, peer_req->i.sector, peer_req->i.size);
1921 peer_req->flags |= EE_CALL_AL_COMPLETE_IO;
1922 peer_req->flags &= ~EE_MAY_SET_IN_SYNC;
1923 drbd_al_begin_io(mdev, peer_req->i.sector);
b411b363
PR
1924 }
1925
db830c46 1926 if (drbd_submit_ee(mdev, peer_req, rw, DRBD_FAULT_DT_WR) == 0)
81e84650 1927 return true;
b411b363 1928
10f6d992
LE
1929 /* don't care for the reason here */
1930 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 1931 spin_lock_irq(&mdev->tconn->req_lock);
db830c46
AG
1932 list_del(&peer_req->w.list);
1933 drbd_remove_epoch_entry_interval(mdev, peer_req);
87eeee41 1934 spin_unlock_irq(&mdev->tconn->req_lock);
db830c46
AG
1935 if (peer_req->flags & EE_CALL_AL_COMPLETE_IO)
1936 drbd_al_complete_io(mdev, peer_req->i.sector);
22cc37a9 1937
b411b363 1938out_interrupted:
db830c46 1939 drbd_may_finish_epoch(mdev, peer_req->epoch, EV_PUT + EV_CLEANUP);
b411b363 1940 put_ldev(mdev);
db830c46 1941 drbd_free_ee(mdev, peer_req);
81e84650 1942 return false;
b411b363
PR
1943}
1944
0f0601f4
LE
1945/* We may throttle resync, if the lower device seems to be busy,
1946 * and current sync rate is above c_min_rate.
1947 *
1948 * To decide whether or not the lower device is busy, we use a scheme similar
1949 * to MD RAID is_mddev_idle(): if the partition stats reveal "significant"
1950 * (more than 64 sectors) of activity we cannot account for with our own resync
1951 * activity, it obviously is "busy".
1952 *
1953 * The current sync rate used here uses only the most recent two step marks,
1954 * to have a short time average so we can react faster.
1955 */
e3555d85 1956int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
0f0601f4
LE
1957{
1958 struct gendisk *disk = mdev->ldev->backing_bdev->bd_contains->bd_disk;
1959 unsigned long db, dt, dbdt;
e3555d85 1960 struct lc_element *tmp;
0f0601f4
LE
1961 int curr_events;
1962 int throttle = 0;
1963
1964 /* feature disabled? */
1965 if (mdev->sync_conf.c_min_rate == 0)
1966 return 0;
1967
e3555d85
PR
1968 spin_lock_irq(&mdev->al_lock);
1969 tmp = lc_find(mdev->resync, BM_SECT_TO_EXT(sector));
1970 if (tmp) {
1971 struct bm_extent *bm_ext = lc_entry(tmp, struct bm_extent, lce);
1972 if (test_bit(BME_PRIORITY, &bm_ext->flags)) {
1973 spin_unlock_irq(&mdev->al_lock);
1974 return 0;
1975 }
1976 /* Do not slow down if app IO is already waiting for this extent */
1977 }
1978 spin_unlock_irq(&mdev->al_lock);
1979
0f0601f4
LE
1980 curr_events = (int)part_stat_read(&disk->part0, sectors[0]) +
1981 (int)part_stat_read(&disk->part0, sectors[1]) -
1982 atomic_read(&mdev->rs_sect_ev);
e3555d85 1983
0f0601f4
LE
1984 if (!mdev->rs_last_events || curr_events - mdev->rs_last_events > 64) {
1985 unsigned long rs_left;
1986 int i;
1987
1988 mdev->rs_last_events = curr_events;
1989
1990 /* sync speed average over the last 2*DRBD_SYNC_MARK_STEP,
1991 * approx. */
2649f080
LE
1992 i = (mdev->rs_last_mark + DRBD_SYNC_MARKS-1) % DRBD_SYNC_MARKS;
1993
1994 if (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T)
1995 rs_left = mdev->ov_left;
1996 else
1997 rs_left = drbd_bm_total_weight(mdev) - mdev->rs_failed;
0f0601f4
LE
1998
1999 dt = ((long)jiffies - (long)mdev->rs_mark_time[i]) / HZ;
2000 if (!dt)
2001 dt++;
2002 db = mdev->rs_mark_left[i] - rs_left;
2003 dbdt = Bit2KB(db/dt);
2004
2005 if (dbdt > mdev->sync_conf.c_min_rate)
2006 throttle = 1;
2007 }
2008 return throttle;
2009}
2010
2011
d8763023
AG
2012static int receive_DataRequest(struct drbd_conf *mdev, enum drbd_packet cmd,
2013 unsigned int digest_size)
b411b363
PR
2014{
2015 sector_t sector;
2016 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
db830c46 2017 struct drbd_peer_request *peer_req;
b411b363 2018 struct digest_info *di = NULL;
b18b37be 2019 int size, verb;
b411b363 2020 unsigned int fault_type;
e42325a5 2021 struct p_block_req *p = &mdev->tconn->data.rbuf.block_req;
b411b363
PR
2022
2023 sector = be64_to_cpu(p->sector);
2024 size = be32_to_cpu(p->blksize);
2025
1816a2b4 2026 if (size <= 0 || (size & 0x1ff) != 0 || size > DRBD_MAX_BIO_SIZE) {
b411b363
PR
2027 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2028 (unsigned long long)sector, size);
81e84650 2029 return false;
b411b363
PR
2030 }
2031 if (sector + (size>>9) > capacity) {
2032 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2033 (unsigned long long)sector, size);
81e84650 2034 return false;
b411b363
PR
2035 }
2036
2037 if (!get_ldev_if_state(mdev, D_UP_TO_DATE)) {
b18b37be
PR
2038 verb = 1;
2039 switch (cmd) {
2040 case P_DATA_REQUEST:
2041 drbd_send_ack_rp(mdev, P_NEG_DREPLY, p);
2042 break;
2043 case P_RS_DATA_REQUEST:
2044 case P_CSUM_RS_REQUEST:
2045 case P_OV_REQUEST:
2046 drbd_send_ack_rp(mdev, P_NEG_RS_DREPLY , p);
2047 break;
2048 case P_OV_REPLY:
2049 verb = 0;
2050 dec_rs_pending(mdev);
2051 drbd_send_ack_ex(mdev, P_OV_RESULT, sector, size, ID_IN_SYNC);
2052 break;
2053 default:
2054 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
2055 cmdname(cmd));
2056 }
2057 if (verb && __ratelimit(&drbd_ratelimit_state))
b411b363
PR
2058 dev_err(DEV, "Can not satisfy peer's read request, "
2059 "no local data.\n");
b18b37be 2060
a821cc4a
LE
2061 /* drain possibly payload */
2062 return drbd_drain_block(mdev, digest_size);
b411b363
PR
2063 }
2064
2065 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
2066 * "criss-cross" setup, that might cause write-out on some other DRBD,
2067 * which in turn might block on the other node at this very place. */
db830c46
AG
2068 peer_req = drbd_alloc_ee(mdev, p->block_id, sector, size, GFP_NOIO);
2069 if (!peer_req) {
b411b363 2070 put_ldev(mdev);
81e84650 2071 return false;
b411b363
PR
2072 }
2073
02918be2 2074 switch (cmd) {
b411b363 2075 case P_DATA_REQUEST:
db830c46 2076 peer_req->w.cb = w_e_end_data_req;
b411b363 2077 fault_type = DRBD_FAULT_DT_RD;
80a40e43
LE
2078 /* application IO, don't drbd_rs_begin_io */
2079 goto submit;
2080
b411b363 2081 case P_RS_DATA_REQUEST:
db830c46 2082 peer_req->w.cb = w_e_end_rsdata_req;
b411b363 2083 fault_type = DRBD_FAULT_RS_RD;
5f9915bb
LE
2084 /* used in the sector offset progress display */
2085 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
b411b363
PR
2086 break;
2087
2088 case P_OV_REPLY:
2089 case P_CSUM_RS_REQUEST:
2090 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2091 di = kmalloc(sizeof(*di) + digest_size, GFP_NOIO);
2092 if (!di)
2093 goto out_free_e;
2094
2095 di->digest_size = digest_size;
2096 di->digest = (((char *)di)+sizeof(struct digest_info));
2097
db830c46
AG
2098 peer_req->digest = di;
2099 peer_req->flags |= EE_HAS_DIGEST;
c36c3ced 2100
b411b363
PR
2101 if (drbd_recv(mdev, di->digest, digest_size) != digest_size)
2102 goto out_free_e;
2103
02918be2 2104 if (cmd == P_CSUM_RS_REQUEST) {
31890f4a 2105 D_ASSERT(mdev->tconn->agreed_pro_version >= 89);
db830c46 2106 peer_req->w.cb = w_e_end_csum_rs_req;
5f9915bb
LE
2107 /* used in the sector offset progress display */
2108 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
02918be2 2109 } else if (cmd == P_OV_REPLY) {
2649f080
LE
2110 /* track progress, we may need to throttle */
2111 atomic_add(size >> 9, &mdev->rs_sect_in);
db830c46 2112 peer_req->w.cb = w_e_end_ov_reply;
b411b363 2113 dec_rs_pending(mdev);
0f0601f4
LE
2114 /* drbd_rs_begin_io done when we sent this request,
2115 * but accounting still needs to be done. */
2116 goto submit_for_resync;
b411b363
PR
2117 }
2118 break;
2119
2120 case P_OV_REQUEST:
b411b363 2121 if (mdev->ov_start_sector == ~(sector_t)0 &&
31890f4a 2122 mdev->tconn->agreed_pro_version >= 90) {
de228bba
LE
2123 unsigned long now = jiffies;
2124 int i;
b411b363
PR
2125 mdev->ov_start_sector = sector;
2126 mdev->ov_position = sector;
30b743a2
LE
2127 mdev->ov_left = drbd_bm_bits(mdev) - BM_SECT_TO_BIT(sector);
2128 mdev->rs_total = mdev->ov_left;
de228bba
LE
2129 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
2130 mdev->rs_mark_left[i] = mdev->ov_left;
2131 mdev->rs_mark_time[i] = now;
2132 }
b411b363
PR
2133 dev_info(DEV, "Online Verify start sector: %llu\n",
2134 (unsigned long long)sector);
2135 }
db830c46 2136 peer_req->w.cb = w_e_end_ov_req;
b411b363 2137 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2138 break;
2139
b411b363
PR
2140 default:
2141 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
02918be2 2142 cmdname(cmd));
b411b363 2143 fault_type = DRBD_FAULT_MAX;
80a40e43 2144 goto out_free_e;
b411b363
PR
2145 }
2146
0f0601f4
LE
2147 /* Throttle, drbd_rs_begin_io and submit should become asynchronous
2148 * wrt the receiver, but it is not as straightforward as it may seem.
2149 * Various places in the resync start and stop logic assume resync
2150 * requests are processed in order, requeuing this on the worker thread
2151 * introduces a bunch of new code for synchronization between threads.
2152 *
2153 * Unlimited throttling before drbd_rs_begin_io may stall the resync
2154 * "forever", throttling after drbd_rs_begin_io will lock that extent
2155 * for application writes for the same time. For now, just throttle
2156 * here, where the rest of the code expects the receiver to sleep for
2157 * a while, anyways.
2158 */
2159
2160 /* Throttle before drbd_rs_begin_io, as that locks out application IO;
2161 * this defers syncer requests for some time, before letting at least
2162 * on request through. The resync controller on the receiving side
2163 * will adapt to the incoming rate accordingly.
2164 *
2165 * We cannot throttle here if remote is Primary/SyncTarget:
2166 * we would also throttle its application reads.
2167 * In that case, throttling is done on the SyncTarget only.
2168 */
e3555d85
PR
2169 if (mdev->state.peer != R_PRIMARY && drbd_rs_should_slow_down(mdev, sector))
2170 schedule_timeout_uninterruptible(HZ/10);
2171 if (drbd_rs_begin_io(mdev, sector))
80a40e43 2172 goto out_free_e;
b411b363 2173
0f0601f4
LE
2174submit_for_resync:
2175 atomic_add(size >> 9, &mdev->rs_sect_ev);
2176
80a40e43 2177submit:
b411b363 2178 inc_unacked(mdev);
87eeee41 2179 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 2180 list_add_tail(&peer_req->w.list, &mdev->read_ee);
87eeee41 2181 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 2182
db830c46 2183 if (drbd_submit_ee(mdev, peer_req, READ, fault_type) == 0)
81e84650 2184 return true;
b411b363 2185
10f6d992
LE
2186 /* don't care for the reason here */
2187 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 2188 spin_lock_irq(&mdev->tconn->req_lock);
db830c46 2189 list_del(&peer_req->w.list);
87eeee41 2190 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9
LE
2191 /* no drbd_rs_complete_io(), we are dropping the connection anyways */
2192
b411b363 2193out_free_e:
b411b363 2194 put_ldev(mdev);
db830c46 2195 drbd_free_ee(mdev, peer_req);
81e84650 2196 return false;
b411b363
PR
2197}
2198
2199static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
2200{
2201 int self, peer, rv = -100;
2202 unsigned long ch_self, ch_peer;
2203
2204 self = mdev->ldev->md.uuid[UI_BITMAP] & 1;
2205 peer = mdev->p_uuid[UI_BITMAP] & 1;
2206
2207 ch_peer = mdev->p_uuid[UI_SIZE];
2208 ch_self = mdev->comm_bm_set;
2209
89e58e75 2210 switch (mdev->tconn->net_conf->after_sb_0p) {
b411b363
PR
2211 case ASB_CONSENSUS:
2212 case ASB_DISCARD_SECONDARY:
2213 case ASB_CALL_HELPER:
2214 dev_err(DEV, "Configuration error.\n");
2215 break;
2216 case ASB_DISCONNECT:
2217 break;
2218 case ASB_DISCARD_YOUNGER_PRI:
2219 if (self == 0 && peer == 1) {
2220 rv = -1;
2221 break;
2222 }
2223 if (self == 1 && peer == 0) {
2224 rv = 1;
2225 break;
2226 }
2227 /* Else fall through to one of the other strategies... */
2228 case ASB_DISCARD_OLDER_PRI:
2229 if (self == 0 && peer == 1) {
2230 rv = 1;
2231 break;
2232 }
2233 if (self == 1 && peer == 0) {
2234 rv = -1;
2235 break;
2236 }
2237 /* Else fall through to one of the other strategies... */
ad19bf6e 2238 dev_warn(DEV, "Discard younger/older primary did not find a decision\n"
b411b363
PR
2239 "Using discard-least-changes instead\n");
2240 case ASB_DISCARD_ZERO_CHG:
2241 if (ch_peer == 0 && ch_self == 0) {
25703f83 2242 rv = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags)
b411b363
PR
2243 ? -1 : 1;
2244 break;
2245 } else {
2246 if (ch_peer == 0) { rv = 1; break; }
2247 if (ch_self == 0) { rv = -1; break; }
2248 }
89e58e75 2249 if (mdev->tconn->net_conf->after_sb_0p == ASB_DISCARD_ZERO_CHG)
b411b363
PR
2250 break;
2251 case ASB_DISCARD_LEAST_CHG:
2252 if (ch_self < ch_peer)
2253 rv = -1;
2254 else if (ch_self > ch_peer)
2255 rv = 1;
2256 else /* ( ch_self == ch_peer ) */
2257 /* Well, then use something else. */
25703f83 2258 rv = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags)
b411b363
PR
2259 ? -1 : 1;
2260 break;
2261 case ASB_DISCARD_LOCAL:
2262 rv = -1;
2263 break;
2264 case ASB_DISCARD_REMOTE:
2265 rv = 1;
2266 }
2267
2268 return rv;
2269}
2270
2271static int drbd_asb_recover_1p(struct drbd_conf *mdev) __must_hold(local)
2272{
6184ea21 2273 int hg, rv = -100;
b411b363 2274
89e58e75 2275 switch (mdev->tconn->net_conf->after_sb_1p) {
b411b363
PR
2276 case ASB_DISCARD_YOUNGER_PRI:
2277 case ASB_DISCARD_OLDER_PRI:
2278 case ASB_DISCARD_LEAST_CHG:
2279 case ASB_DISCARD_LOCAL:
2280 case ASB_DISCARD_REMOTE:
2281 dev_err(DEV, "Configuration error.\n");
2282 break;
2283 case ASB_DISCONNECT:
2284 break;
2285 case ASB_CONSENSUS:
2286 hg = drbd_asb_recover_0p(mdev);
2287 if (hg == -1 && mdev->state.role == R_SECONDARY)
2288 rv = hg;
2289 if (hg == 1 && mdev->state.role == R_PRIMARY)
2290 rv = hg;
2291 break;
2292 case ASB_VIOLENTLY:
2293 rv = drbd_asb_recover_0p(mdev);
2294 break;
2295 case ASB_DISCARD_SECONDARY:
2296 return mdev->state.role == R_PRIMARY ? 1 : -1;
2297 case ASB_CALL_HELPER:
2298 hg = drbd_asb_recover_0p(mdev);
2299 if (hg == -1 && mdev->state.role == R_PRIMARY) {
bb437946
AG
2300 enum drbd_state_rv rv2;
2301
2302 drbd_set_role(mdev, R_SECONDARY, 0);
b411b363
PR
2303 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2304 * we might be here in C_WF_REPORT_PARAMS which is transient.
2305 * we do not need to wait for the after state change work either. */
bb437946
AG
2306 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2307 if (rv2 != SS_SUCCESS) {
b411b363
PR
2308 drbd_khelper(mdev, "pri-lost-after-sb");
2309 } else {
2310 dev_warn(DEV, "Successfully gave up primary role.\n");
2311 rv = hg;
2312 }
2313 } else
2314 rv = hg;
2315 }
2316
2317 return rv;
2318}
2319
2320static int drbd_asb_recover_2p(struct drbd_conf *mdev) __must_hold(local)
2321{
6184ea21 2322 int hg, rv = -100;
b411b363 2323
89e58e75 2324 switch (mdev->tconn->net_conf->after_sb_2p) {
b411b363
PR
2325 case ASB_DISCARD_YOUNGER_PRI:
2326 case ASB_DISCARD_OLDER_PRI:
2327 case ASB_DISCARD_LEAST_CHG:
2328 case ASB_DISCARD_LOCAL:
2329 case ASB_DISCARD_REMOTE:
2330 case ASB_CONSENSUS:
2331 case ASB_DISCARD_SECONDARY:
2332 dev_err(DEV, "Configuration error.\n");
2333 break;
2334 case ASB_VIOLENTLY:
2335 rv = drbd_asb_recover_0p(mdev);
2336 break;
2337 case ASB_DISCONNECT:
2338 break;
2339 case ASB_CALL_HELPER:
2340 hg = drbd_asb_recover_0p(mdev);
2341 if (hg == -1) {
bb437946
AG
2342 enum drbd_state_rv rv2;
2343
b411b363
PR
2344 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2345 * we might be here in C_WF_REPORT_PARAMS which is transient.
2346 * we do not need to wait for the after state change work either. */
bb437946
AG
2347 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2348 if (rv2 != SS_SUCCESS) {
b411b363
PR
2349 drbd_khelper(mdev, "pri-lost-after-sb");
2350 } else {
2351 dev_warn(DEV, "Successfully gave up primary role.\n");
2352 rv = hg;
2353 }
2354 } else
2355 rv = hg;
2356 }
2357
2358 return rv;
2359}
2360
2361static void drbd_uuid_dump(struct drbd_conf *mdev, char *text, u64 *uuid,
2362 u64 bits, u64 flags)
2363{
2364 if (!uuid) {
2365 dev_info(DEV, "%s uuid info vanished while I was looking!\n", text);
2366 return;
2367 }
2368 dev_info(DEV, "%s %016llX:%016llX:%016llX:%016llX bits:%llu flags:%llX\n",
2369 text,
2370 (unsigned long long)uuid[UI_CURRENT],
2371 (unsigned long long)uuid[UI_BITMAP],
2372 (unsigned long long)uuid[UI_HISTORY_START],
2373 (unsigned long long)uuid[UI_HISTORY_END],
2374 (unsigned long long)bits,
2375 (unsigned long long)flags);
2376}
2377
2378/*
2379 100 after split brain try auto recover
2380 2 C_SYNC_SOURCE set BitMap
2381 1 C_SYNC_SOURCE use BitMap
2382 0 no Sync
2383 -1 C_SYNC_TARGET use BitMap
2384 -2 C_SYNC_TARGET set BitMap
2385 -100 after split brain, disconnect
2386-1000 unrelated data
4a23f264
PR
2387-1091 requires proto 91
2388-1096 requires proto 96
b411b363
PR
2389 */
2390static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(local)
2391{
2392 u64 self, peer;
2393 int i, j;
2394
2395 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2396 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2397
2398 *rule_nr = 10;
2399 if (self == UUID_JUST_CREATED && peer == UUID_JUST_CREATED)
2400 return 0;
2401
2402 *rule_nr = 20;
2403 if ((self == UUID_JUST_CREATED || self == (u64)0) &&
2404 peer != UUID_JUST_CREATED)
2405 return -2;
2406
2407 *rule_nr = 30;
2408 if (self != UUID_JUST_CREATED &&
2409 (peer == UUID_JUST_CREATED || peer == (u64)0))
2410 return 2;
2411
2412 if (self == peer) {
2413 int rct, dc; /* roles at crash time */
2414
2415 if (mdev->p_uuid[UI_BITMAP] == (u64)0 && mdev->ldev->md.uuid[UI_BITMAP] != (u64)0) {
2416
31890f4a 2417 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2418 return -1091;
b411b363
PR
2419
2420 if ((mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
2421 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
2422 dev_info(DEV, "was SyncSource, missed the resync finished event, corrected myself:\n");
2423 drbd_uuid_set_bm(mdev, 0UL);
2424
2425 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2426 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2427 *rule_nr = 34;
2428 } else {
2429 dev_info(DEV, "was SyncSource (peer failed to write sync_uuid)\n");
2430 *rule_nr = 36;
2431 }
2432
2433 return 1;
2434 }
2435
2436 if (mdev->ldev->md.uuid[UI_BITMAP] == (u64)0 && mdev->p_uuid[UI_BITMAP] != (u64)0) {
2437
31890f4a 2438 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2439 return -1091;
b411b363
PR
2440
2441 if ((mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_BITMAP] & ~((u64)1)) &&
2442 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1))) {
2443 dev_info(DEV, "was SyncTarget, peer missed the resync finished event, corrected peer:\n");
2444
2445 mdev->p_uuid[UI_HISTORY_START + 1] = mdev->p_uuid[UI_HISTORY_START];
2446 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_BITMAP];
2447 mdev->p_uuid[UI_BITMAP] = 0UL;
2448
2449 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2450 *rule_nr = 35;
2451 } else {
2452 dev_info(DEV, "was SyncTarget (failed to write sync_uuid)\n");
2453 *rule_nr = 37;
2454 }
2455
2456 return -1;
2457 }
2458
2459 /* Common power [off|failure] */
2460 rct = (test_bit(CRASHED_PRIMARY, &mdev->flags) ? 1 : 0) +
2461 (mdev->p_uuid[UI_FLAGS] & 2);
2462 /* lowest bit is set when we were primary,
2463 * next bit (weight 2) is set when peer was primary */
2464 *rule_nr = 40;
2465
2466 switch (rct) {
2467 case 0: /* !self_pri && !peer_pri */ return 0;
2468 case 1: /* self_pri && !peer_pri */ return 1;
2469 case 2: /* !self_pri && peer_pri */ return -1;
2470 case 3: /* self_pri && peer_pri */
25703f83 2471 dc = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363
PR
2472 return dc ? -1 : 1;
2473 }
2474 }
2475
2476 *rule_nr = 50;
2477 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2478 if (self == peer)
2479 return -1;
2480
2481 *rule_nr = 51;
2482 peer = mdev->p_uuid[UI_HISTORY_START] & ~((u64)1);
2483 if (self == peer) {
31890f4a 2484 if (mdev->tconn->agreed_pro_version < 96 ?
4a23f264
PR
2485 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) ==
2486 (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1)) :
2487 peer + UUID_NEW_BM_OFFSET == (mdev->p_uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2488 /* The last P_SYNC_UUID did not get though. Undo the last start of
2489 resync as sync source modifications of the peer's UUIDs. */
2490
31890f4a 2491 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2492 return -1091;
b411b363
PR
2493
2494 mdev->p_uuid[UI_BITMAP] = mdev->p_uuid[UI_HISTORY_START];
2495 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_HISTORY_START + 1];
4a23f264
PR
2496
2497 dev_info(DEV, "Did not got last syncUUID packet, corrected:\n");
2498 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2499
b411b363
PR
2500 return -1;
2501 }
2502 }
2503
2504 *rule_nr = 60;
2505 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2506 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2507 peer = mdev->p_uuid[i] & ~((u64)1);
2508 if (self == peer)
2509 return -2;
2510 }
2511
2512 *rule_nr = 70;
2513 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2514 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2515 if (self == peer)
2516 return 1;
2517
2518 *rule_nr = 71;
2519 self = mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1);
2520 if (self == peer) {
31890f4a 2521 if (mdev->tconn->agreed_pro_version < 96 ?
4a23f264
PR
2522 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) ==
2523 (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) :
2524 self + UUID_NEW_BM_OFFSET == (mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2525 /* The last P_SYNC_UUID did not get though. Undo the last start of
2526 resync as sync source modifications of our UUIDs. */
2527
31890f4a 2528 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2529 return -1091;
b411b363
PR
2530
2531 _drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
2532 _drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
2533
4a23f264 2534 dev_info(DEV, "Last syncUUID did not get through, corrected:\n");
b411b363
PR
2535 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2536 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2537
2538 return 1;
2539 }
2540 }
2541
2542
2543 *rule_nr = 80;
d8c2a36b 2544 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
b411b363
PR
2545 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2546 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2547 if (self == peer)
2548 return 2;
2549 }
2550
2551 *rule_nr = 90;
2552 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2553 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2554 if (self == peer && self != ((u64)0))
2555 return 100;
2556
2557 *rule_nr = 100;
2558 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2559 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2560 for (j = UI_HISTORY_START; j <= UI_HISTORY_END; j++) {
2561 peer = mdev->p_uuid[j] & ~((u64)1);
2562 if (self == peer)
2563 return -100;
2564 }
2565 }
2566
2567 return -1000;
2568}
2569
2570/* drbd_sync_handshake() returns the new conn state on success, or
2571 CONN_MASK (-1) on failure.
2572 */
2573static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_role peer_role,
2574 enum drbd_disk_state peer_disk) __must_hold(local)
2575{
2576 int hg, rule_nr;
2577 enum drbd_conns rv = C_MASK;
2578 enum drbd_disk_state mydisk;
2579
2580 mydisk = mdev->state.disk;
2581 if (mydisk == D_NEGOTIATING)
2582 mydisk = mdev->new_state_tmp.disk;
2583
2584 dev_info(DEV, "drbd_sync_handshake:\n");
2585 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid, mdev->comm_bm_set, 0);
2586 drbd_uuid_dump(mdev, "peer", mdev->p_uuid,
2587 mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2588
2589 hg = drbd_uuid_compare(mdev, &rule_nr);
2590
2591 dev_info(DEV, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
2592
2593 if (hg == -1000) {
2594 dev_alert(DEV, "Unrelated data, aborting!\n");
2595 return C_MASK;
2596 }
4a23f264
PR
2597 if (hg < -1000) {
2598 dev_alert(DEV, "To resolve this both sides have to support at least protocol %d\n", -hg - 1000);
b411b363
PR
2599 return C_MASK;
2600 }
2601
2602 if ((mydisk == D_INCONSISTENT && peer_disk > D_INCONSISTENT) ||
2603 (peer_disk == D_INCONSISTENT && mydisk > D_INCONSISTENT)) {
2604 int f = (hg == -100) || abs(hg) == 2;
2605 hg = mydisk > D_INCONSISTENT ? 1 : -1;
2606 if (f)
2607 hg = hg*2;
2608 dev_info(DEV, "Becoming sync %s due to disk states.\n",
2609 hg > 0 ? "source" : "target");
2610 }
2611
3a11a487
AG
2612 if (abs(hg) == 100)
2613 drbd_khelper(mdev, "initial-split-brain");
2614
89e58e75 2615 if (hg == 100 || (hg == -100 && mdev->tconn->net_conf->always_asbp)) {
b411b363
PR
2616 int pcount = (mdev->state.role == R_PRIMARY)
2617 + (peer_role == R_PRIMARY);
2618 int forced = (hg == -100);
2619
2620 switch (pcount) {
2621 case 0:
2622 hg = drbd_asb_recover_0p(mdev);
2623 break;
2624 case 1:
2625 hg = drbd_asb_recover_1p(mdev);
2626 break;
2627 case 2:
2628 hg = drbd_asb_recover_2p(mdev);
2629 break;
2630 }
2631 if (abs(hg) < 100) {
2632 dev_warn(DEV, "Split-Brain detected, %d primaries, "
2633 "automatically solved. Sync from %s node\n",
2634 pcount, (hg < 0) ? "peer" : "this");
2635 if (forced) {
2636 dev_warn(DEV, "Doing a full sync, since"
2637 " UUIDs where ambiguous.\n");
2638 hg = hg*2;
2639 }
2640 }
2641 }
2642
2643 if (hg == -100) {
89e58e75 2644 if (mdev->tconn->net_conf->want_lose && !(mdev->p_uuid[UI_FLAGS]&1))
b411b363 2645 hg = -1;
89e58e75 2646 if (!mdev->tconn->net_conf->want_lose && (mdev->p_uuid[UI_FLAGS]&1))
b411b363
PR
2647 hg = 1;
2648
2649 if (abs(hg) < 100)
2650 dev_warn(DEV, "Split-Brain detected, manually solved. "
2651 "Sync from %s node\n",
2652 (hg < 0) ? "peer" : "this");
2653 }
2654
2655 if (hg == -100) {
580b9767
LE
2656 /* FIXME this log message is not correct if we end up here
2657 * after an attempted attach on a diskless node.
2658 * We just refuse to attach -- well, we drop the "connection"
2659 * to that disk, in a way... */
3a11a487 2660 dev_alert(DEV, "Split-Brain detected but unresolved, dropping connection!\n");
b411b363
PR
2661 drbd_khelper(mdev, "split-brain");
2662 return C_MASK;
2663 }
2664
2665 if (hg > 0 && mydisk <= D_INCONSISTENT) {
2666 dev_err(DEV, "I shall become SyncSource, but I am inconsistent!\n");
2667 return C_MASK;
2668 }
2669
2670 if (hg < 0 && /* by intention we do not use mydisk here. */
2671 mdev->state.role == R_PRIMARY && mdev->state.disk >= D_CONSISTENT) {
89e58e75 2672 switch (mdev->tconn->net_conf->rr_conflict) {
b411b363
PR
2673 case ASB_CALL_HELPER:
2674 drbd_khelper(mdev, "pri-lost");
2675 /* fall through */
2676 case ASB_DISCONNECT:
2677 dev_err(DEV, "I shall become SyncTarget, but I am primary!\n");
2678 return C_MASK;
2679 case ASB_VIOLENTLY:
2680 dev_warn(DEV, "Becoming SyncTarget, violating the stable-data"
2681 "assumption\n");
2682 }
2683 }
2684
89e58e75 2685 if (mdev->tconn->net_conf->dry_run || test_bit(CONN_DRY_RUN, &mdev->flags)) {
cf14c2e9
PR
2686 if (hg == 0)
2687 dev_info(DEV, "dry-run connect: No resync, would become Connected immediately.\n");
2688 else
2689 dev_info(DEV, "dry-run connect: Would become %s, doing a %s resync.",
2690 drbd_conn_str(hg > 0 ? C_SYNC_SOURCE : C_SYNC_TARGET),
2691 abs(hg) >= 2 ? "full" : "bit-map based");
2692 return C_MASK;
2693 }
2694
b411b363
PR
2695 if (abs(hg) >= 2) {
2696 dev_info(DEV, "Writing the whole bitmap, full sync required after drbd_sync_handshake.\n");
20ceb2b2
LE
2697 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from sync_handshake",
2698 BM_LOCKED_SET_ALLOWED))
b411b363
PR
2699 return C_MASK;
2700 }
2701
2702 if (hg > 0) { /* become sync source. */
2703 rv = C_WF_BITMAP_S;
2704 } else if (hg < 0) { /* become sync target */
2705 rv = C_WF_BITMAP_T;
2706 } else {
2707 rv = C_CONNECTED;
2708 if (drbd_bm_total_weight(mdev)) {
2709 dev_info(DEV, "No resync, but %lu bits in bitmap!\n",
2710 drbd_bm_total_weight(mdev));
2711 }
2712 }
2713
2714 return rv;
2715}
2716
2717/* returns 1 if invalid */
2718static int cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self)
2719{
2720 /* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
2721 if ((peer == ASB_DISCARD_REMOTE && self == ASB_DISCARD_LOCAL) ||
2722 (self == ASB_DISCARD_REMOTE && peer == ASB_DISCARD_LOCAL))
2723 return 0;
2724
2725 /* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
2726 if (peer == ASB_DISCARD_REMOTE || peer == ASB_DISCARD_LOCAL ||
2727 self == ASB_DISCARD_REMOTE || self == ASB_DISCARD_LOCAL)
2728 return 1;
2729
2730 /* everything else is valid if they are equal on both sides. */
2731 if (peer == self)
2732 return 0;
2733
2734 /* everything es is invalid. */
2735 return 1;
2736}
2737
d8763023
AG
2738static int receive_protocol(struct drbd_conf *mdev, enum drbd_packet cmd,
2739 unsigned int data_size)
b411b363 2740{
e42325a5 2741 struct p_protocol *p = &mdev->tconn->data.rbuf.protocol;
b411b363 2742 int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
cf14c2e9 2743 int p_want_lose, p_two_primaries, cf;
b411b363
PR
2744 char p_integrity_alg[SHARED_SECRET_MAX] = "";
2745
b411b363
PR
2746 p_proto = be32_to_cpu(p->protocol);
2747 p_after_sb_0p = be32_to_cpu(p->after_sb_0p);
2748 p_after_sb_1p = be32_to_cpu(p->after_sb_1p);
2749 p_after_sb_2p = be32_to_cpu(p->after_sb_2p);
b411b363 2750 p_two_primaries = be32_to_cpu(p->two_primaries);
cf14c2e9
PR
2751 cf = be32_to_cpu(p->conn_flags);
2752 p_want_lose = cf & CF_WANT_LOSE;
2753
2754 clear_bit(CONN_DRY_RUN, &mdev->flags);
2755
2756 if (cf & CF_DRY_RUN)
2757 set_bit(CONN_DRY_RUN, &mdev->flags);
b411b363 2758
89e58e75 2759 if (p_proto != mdev->tconn->net_conf->wire_protocol) {
b411b363
PR
2760 dev_err(DEV, "incompatible communication protocols\n");
2761 goto disconnect;
2762 }
2763
89e58e75 2764 if (cmp_after_sb(p_after_sb_0p, mdev->tconn->net_conf->after_sb_0p)) {
b411b363
PR
2765 dev_err(DEV, "incompatible after-sb-0pri settings\n");
2766 goto disconnect;
2767 }
2768
89e58e75 2769 if (cmp_after_sb(p_after_sb_1p, mdev->tconn->net_conf->after_sb_1p)) {
b411b363
PR
2770 dev_err(DEV, "incompatible after-sb-1pri settings\n");
2771 goto disconnect;
2772 }
2773
89e58e75 2774 if (cmp_after_sb(p_after_sb_2p, mdev->tconn->net_conf->after_sb_2p)) {
b411b363
PR
2775 dev_err(DEV, "incompatible after-sb-2pri settings\n");
2776 goto disconnect;
2777 }
2778
89e58e75 2779 if (p_want_lose && mdev->tconn->net_conf->want_lose) {
b411b363
PR
2780 dev_err(DEV, "both sides have the 'want_lose' flag set\n");
2781 goto disconnect;
2782 }
2783
89e58e75 2784 if (p_two_primaries != mdev->tconn->net_conf->two_primaries) {
b411b363
PR
2785 dev_err(DEV, "incompatible setting of the two-primaries options\n");
2786 goto disconnect;
2787 }
2788
31890f4a 2789 if (mdev->tconn->agreed_pro_version >= 87) {
89e58e75 2790 unsigned char *my_alg = mdev->tconn->net_conf->integrity_alg;
b411b363
PR
2791
2792 if (drbd_recv(mdev, p_integrity_alg, data_size) != data_size)
81e84650 2793 return false;
b411b363
PR
2794
2795 p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
2796 if (strcmp(p_integrity_alg, my_alg)) {
2797 dev_err(DEV, "incompatible setting of the data-integrity-alg\n");
2798 goto disconnect;
2799 }
2800 dev_info(DEV, "data-integrity-alg: %s\n",
2801 my_alg[0] ? my_alg : (unsigned char *)"<not-used>");
2802 }
2803
81e84650 2804 return true;
b411b363
PR
2805
2806disconnect:
2807 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2808 return false;
b411b363
PR
2809}
2810
2811/* helper function
2812 * input: alg name, feature name
2813 * return: NULL (alg name was "")
2814 * ERR_PTR(error) if something goes wrong
2815 * or the crypto hash ptr, if it worked out ok. */
2816struct crypto_hash *drbd_crypto_alloc_digest_safe(const struct drbd_conf *mdev,
2817 const char *alg, const char *name)
2818{
2819 struct crypto_hash *tfm;
2820
2821 if (!alg[0])
2822 return NULL;
2823
2824 tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC);
2825 if (IS_ERR(tfm)) {
2826 dev_err(DEV, "Can not allocate \"%s\" as %s (reason: %ld)\n",
2827 alg, name, PTR_ERR(tfm));
2828 return tfm;
2829 }
2830 if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
2831 crypto_free_hash(tfm);
2832 dev_err(DEV, "\"%s\" is not a digest (%s)\n", alg, name);
2833 return ERR_PTR(-EINVAL);
2834 }
2835 return tfm;
2836}
2837
d8763023
AG
2838static int receive_SyncParam(struct drbd_conf *mdev, enum drbd_packet cmd,
2839 unsigned int packet_size)
b411b363 2840{
81e84650 2841 int ok = true;
e42325a5 2842 struct p_rs_param_95 *p = &mdev->tconn->data.rbuf.rs_param_95;
b411b363
PR
2843 unsigned int header_size, data_size, exp_max_sz;
2844 struct crypto_hash *verify_tfm = NULL;
2845 struct crypto_hash *csums_tfm = NULL;
31890f4a 2846 const int apv = mdev->tconn->agreed_pro_version;
778f271d
PR
2847 int *rs_plan_s = NULL;
2848 int fifo_size = 0;
b411b363
PR
2849
2850 exp_max_sz = apv <= 87 ? sizeof(struct p_rs_param)
2851 : apv == 88 ? sizeof(struct p_rs_param)
2852 + SHARED_SECRET_MAX
8e26f9cc
PR
2853 : apv <= 94 ? sizeof(struct p_rs_param_89)
2854 : /* apv >= 95 */ sizeof(struct p_rs_param_95);
b411b363 2855
02918be2 2856 if (packet_size > exp_max_sz) {
b411b363 2857 dev_err(DEV, "SyncParam packet too long: received %u, expected <= %u bytes\n",
02918be2 2858 packet_size, exp_max_sz);
81e84650 2859 return false;
b411b363
PR
2860 }
2861
2862 if (apv <= 88) {
257d0af6 2863 header_size = sizeof(struct p_rs_param) - sizeof(struct p_header);
02918be2 2864 data_size = packet_size - header_size;
8e26f9cc 2865 } else if (apv <= 94) {
257d0af6 2866 header_size = sizeof(struct p_rs_param_89) - sizeof(struct p_header);
02918be2 2867 data_size = packet_size - header_size;
b411b363 2868 D_ASSERT(data_size == 0);
8e26f9cc 2869 } else {
257d0af6 2870 header_size = sizeof(struct p_rs_param_95) - sizeof(struct p_header);
02918be2 2871 data_size = packet_size - header_size;
b411b363
PR
2872 D_ASSERT(data_size == 0);
2873 }
2874
2875 /* initialize verify_alg and csums_alg */
2876 memset(p->verify_alg, 0, 2 * SHARED_SECRET_MAX);
2877
02918be2 2878 if (drbd_recv(mdev, &p->head.payload, header_size) != header_size)
81e84650 2879 return false;
b411b363
PR
2880
2881 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2882
2883 if (apv >= 88) {
2884 if (apv == 88) {
2885 if (data_size > SHARED_SECRET_MAX) {
2886 dev_err(DEV, "verify-alg too long, "
2887 "peer wants %u, accepting only %u byte\n",
2888 data_size, SHARED_SECRET_MAX);
81e84650 2889 return false;
b411b363
PR
2890 }
2891
2892 if (drbd_recv(mdev, p->verify_alg, data_size) != data_size)
81e84650 2893 return false;
b411b363
PR
2894
2895 /* we expect NUL terminated string */
2896 /* but just in case someone tries to be evil */
2897 D_ASSERT(p->verify_alg[data_size-1] == 0);
2898 p->verify_alg[data_size-1] = 0;
2899
2900 } else /* apv >= 89 */ {
2901 /* we still expect NUL terminated strings */
2902 /* but just in case someone tries to be evil */
2903 D_ASSERT(p->verify_alg[SHARED_SECRET_MAX-1] == 0);
2904 D_ASSERT(p->csums_alg[SHARED_SECRET_MAX-1] == 0);
2905 p->verify_alg[SHARED_SECRET_MAX-1] = 0;
2906 p->csums_alg[SHARED_SECRET_MAX-1] = 0;
2907 }
2908
2909 if (strcmp(mdev->sync_conf.verify_alg, p->verify_alg)) {
2910 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2911 dev_err(DEV, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
2912 mdev->sync_conf.verify_alg, p->verify_alg);
2913 goto disconnect;
2914 }
2915 verify_tfm = drbd_crypto_alloc_digest_safe(mdev,
2916 p->verify_alg, "verify-alg");
2917 if (IS_ERR(verify_tfm)) {
2918 verify_tfm = NULL;
2919 goto disconnect;
2920 }
2921 }
2922
2923 if (apv >= 89 && strcmp(mdev->sync_conf.csums_alg, p->csums_alg)) {
2924 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2925 dev_err(DEV, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
2926 mdev->sync_conf.csums_alg, p->csums_alg);
2927 goto disconnect;
2928 }
2929 csums_tfm = drbd_crypto_alloc_digest_safe(mdev,
2930 p->csums_alg, "csums-alg");
2931 if (IS_ERR(csums_tfm)) {
2932 csums_tfm = NULL;
2933 goto disconnect;
2934 }
2935 }
2936
8e26f9cc
PR
2937 if (apv > 94) {
2938 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2939 mdev->sync_conf.c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
2940 mdev->sync_conf.c_delay_target = be32_to_cpu(p->c_delay_target);
2941 mdev->sync_conf.c_fill_target = be32_to_cpu(p->c_fill_target);
2942 mdev->sync_conf.c_max_rate = be32_to_cpu(p->c_max_rate);
778f271d
PR
2943
2944 fifo_size = (mdev->sync_conf.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
2945 if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
2946 rs_plan_s = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
2947 if (!rs_plan_s) {
2948 dev_err(DEV, "kmalloc of fifo_buffer failed");
2949 goto disconnect;
2950 }
2951 }
8e26f9cc 2952 }
b411b363
PR
2953
2954 spin_lock(&mdev->peer_seq_lock);
2955 /* lock against drbd_nl_syncer_conf() */
2956 if (verify_tfm) {
2957 strcpy(mdev->sync_conf.verify_alg, p->verify_alg);
2958 mdev->sync_conf.verify_alg_len = strlen(p->verify_alg) + 1;
2959 crypto_free_hash(mdev->verify_tfm);
2960 mdev->verify_tfm = verify_tfm;
2961 dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
2962 }
2963 if (csums_tfm) {
2964 strcpy(mdev->sync_conf.csums_alg, p->csums_alg);
2965 mdev->sync_conf.csums_alg_len = strlen(p->csums_alg) + 1;
2966 crypto_free_hash(mdev->csums_tfm);
2967 mdev->csums_tfm = csums_tfm;
2968 dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
2969 }
778f271d
PR
2970 if (fifo_size != mdev->rs_plan_s.size) {
2971 kfree(mdev->rs_plan_s.values);
2972 mdev->rs_plan_s.values = rs_plan_s;
2973 mdev->rs_plan_s.size = fifo_size;
2974 mdev->rs_planed = 0;
2975 }
b411b363
PR
2976 spin_unlock(&mdev->peer_seq_lock);
2977 }
2978
2979 return ok;
2980disconnect:
2981 /* just for completeness: actually not needed,
2982 * as this is not reached if csums_tfm was ok. */
2983 crypto_free_hash(csums_tfm);
2984 /* but free the verify_tfm again, if csums_tfm did not work out */
2985 crypto_free_hash(verify_tfm);
2986 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2987 return false;
b411b363
PR
2988}
2989
b411b363
PR
2990/* warn if the arguments differ by more than 12.5% */
2991static void warn_if_differ_considerably(struct drbd_conf *mdev,
2992 const char *s, sector_t a, sector_t b)
2993{
2994 sector_t d;
2995 if (a == 0 || b == 0)
2996 return;
2997 d = (a > b) ? (a - b) : (b - a);
2998 if (d > (a>>3) || d > (b>>3))
2999 dev_warn(DEV, "Considerable difference in %s: %llus vs. %llus\n", s,
3000 (unsigned long long)a, (unsigned long long)b);
3001}
3002
d8763023
AG
3003static int receive_sizes(struct drbd_conf *mdev, enum drbd_packet cmd,
3004 unsigned int data_size)
b411b363 3005{
e42325a5 3006 struct p_sizes *p = &mdev->tconn->data.rbuf.sizes;
b411b363 3007 enum determine_dev_size dd = unchanged;
b411b363
PR
3008 sector_t p_size, p_usize, my_usize;
3009 int ldsc = 0; /* local disk size changed */
e89b591c 3010 enum dds_flags ddsf;
b411b363 3011
b411b363
PR
3012 p_size = be64_to_cpu(p->d_size);
3013 p_usize = be64_to_cpu(p->u_size);
3014
3015 if (p_size == 0 && mdev->state.disk == D_DISKLESS) {
3016 dev_err(DEV, "some backing storage is needed\n");
3017 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3018 return false;
b411b363
PR
3019 }
3020
3021 /* just store the peer's disk size for now.
3022 * we still need to figure out whether we accept that. */
3023 mdev->p_size = p_size;
3024
b411b363
PR
3025 if (get_ldev(mdev)) {
3026 warn_if_differ_considerably(mdev, "lower level device sizes",
3027 p_size, drbd_get_max_capacity(mdev->ldev));
3028 warn_if_differ_considerably(mdev, "user requested size",
3029 p_usize, mdev->ldev->dc.disk_size);
3030
3031 /* if this is the first connect, or an otherwise expected
3032 * param exchange, choose the minimum */
3033 if (mdev->state.conn == C_WF_REPORT_PARAMS)
3034 p_usize = min_not_zero((sector_t)mdev->ldev->dc.disk_size,
3035 p_usize);
3036
3037 my_usize = mdev->ldev->dc.disk_size;
3038
3039 if (mdev->ldev->dc.disk_size != p_usize) {
3040 mdev->ldev->dc.disk_size = p_usize;
3041 dev_info(DEV, "Peer sets u_size to %lu sectors\n",
3042 (unsigned long)mdev->ldev->dc.disk_size);
3043 }
3044
3045 /* Never shrink a device with usable data during connect.
3046 But allow online shrinking if we are connected. */
a393db6f 3047 if (drbd_new_dev_size(mdev, mdev->ldev, 0) <
b411b363
PR
3048 drbd_get_capacity(mdev->this_bdev) &&
3049 mdev->state.disk >= D_OUTDATED &&
3050 mdev->state.conn < C_CONNECTED) {
3051 dev_err(DEV, "The peer's disk size is too small!\n");
3052 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
3053 mdev->ldev->dc.disk_size = my_usize;
3054 put_ldev(mdev);
81e84650 3055 return false;
b411b363
PR
3056 }
3057 put_ldev(mdev);
3058 }
b411b363 3059
e89b591c 3060 ddsf = be16_to_cpu(p->dds_flags);
b411b363 3061 if (get_ldev(mdev)) {
24c4830c 3062 dd = drbd_determine_dev_size(mdev, ddsf);
b411b363
PR
3063 put_ldev(mdev);
3064 if (dd == dev_size_error)
81e84650 3065 return false;
b411b363
PR
3066 drbd_md_sync(mdev);
3067 } else {
3068 /* I am diskless, need to accept the peer's size. */
3069 drbd_set_my_capacity(mdev, p_size);
3070 }
3071
99432fcc
PR
3072 mdev->peer_max_bio_size = be32_to_cpu(p->max_bio_size);
3073 drbd_reconsider_max_bio_size(mdev);
3074
b411b363
PR
3075 if (get_ldev(mdev)) {
3076 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) {
3077 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
3078 ldsc = 1;
3079 }
3080
b411b363
PR
3081 put_ldev(mdev);
3082 }
3083
3084 if (mdev->state.conn > C_WF_REPORT_PARAMS) {
3085 if (be64_to_cpu(p->c_size) !=
3086 drbd_get_capacity(mdev->this_bdev) || ldsc) {
3087 /* we have different sizes, probably peer
3088 * needs to know my new size... */
e89b591c 3089 drbd_send_sizes(mdev, 0, ddsf);
b411b363
PR
3090 }
3091 if (test_and_clear_bit(RESIZE_PENDING, &mdev->flags) ||
3092 (dd == grew && mdev->state.conn == C_CONNECTED)) {
3093 if (mdev->state.pdsk >= D_INCONSISTENT &&
e89b591c
PR
3094 mdev->state.disk >= D_INCONSISTENT) {
3095 if (ddsf & DDSF_NO_RESYNC)
3096 dev_info(DEV, "Resync of new storage suppressed with --assume-clean\n");
3097 else
3098 resync_after_online_grow(mdev);
3099 } else
b411b363
PR
3100 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
3101 }
3102 }
3103
81e84650 3104 return true;
b411b363
PR
3105}
3106
d8763023
AG
3107static int receive_uuids(struct drbd_conf *mdev, enum drbd_packet cmd,
3108 unsigned int data_size)
b411b363 3109{
e42325a5 3110 struct p_uuids *p = &mdev->tconn->data.rbuf.uuids;
b411b363 3111 u64 *p_uuid;
62b0da3a 3112 int i, updated_uuids = 0;
b411b363 3113
b411b363
PR
3114 p_uuid = kmalloc(sizeof(u64)*UI_EXTENDED_SIZE, GFP_NOIO);
3115
3116 for (i = UI_CURRENT; i < UI_EXTENDED_SIZE; i++)
3117 p_uuid[i] = be64_to_cpu(p->uuid[i]);
3118
3119 kfree(mdev->p_uuid);
3120 mdev->p_uuid = p_uuid;
3121
3122 if (mdev->state.conn < C_CONNECTED &&
3123 mdev->state.disk < D_INCONSISTENT &&
3124 mdev->state.role == R_PRIMARY &&
3125 (mdev->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) {
3126 dev_err(DEV, "Can only connect to data with current UUID=%016llX\n",
3127 (unsigned long long)mdev->ed_uuid);
3128 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3129 return false;
b411b363
PR
3130 }
3131
3132 if (get_ldev(mdev)) {
3133 int skip_initial_sync =
3134 mdev->state.conn == C_CONNECTED &&
31890f4a 3135 mdev->tconn->agreed_pro_version >= 90 &&
b411b363
PR
3136 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED &&
3137 (p_uuid[UI_FLAGS] & 8);
3138 if (skip_initial_sync) {
3139 dev_info(DEV, "Accepted new current UUID, preparing to skip initial sync\n");
3140 drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
20ceb2b2
LE
3141 "clear_n_write from receive_uuids",
3142 BM_LOCKED_TEST_ALLOWED);
b411b363
PR
3143 _drbd_uuid_set(mdev, UI_CURRENT, p_uuid[UI_CURRENT]);
3144 _drbd_uuid_set(mdev, UI_BITMAP, 0);
3145 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
3146 CS_VERBOSE, NULL);
3147 drbd_md_sync(mdev);
62b0da3a 3148 updated_uuids = 1;
b411b363
PR
3149 }
3150 put_ldev(mdev);
18a50fa2
PR
3151 } else if (mdev->state.disk < D_INCONSISTENT &&
3152 mdev->state.role == R_PRIMARY) {
3153 /* I am a diskless primary, the peer just created a new current UUID
3154 for me. */
62b0da3a 3155 updated_uuids = drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
b411b363
PR
3156 }
3157
3158 /* Before we test for the disk state, we should wait until an eventually
3159 ongoing cluster wide state change is finished. That is important if
3160 we are primary and are detaching from our disk. We need to see the
3161 new disk state... */
3162 wait_event(mdev->misc_wait, !test_bit(CLUSTER_ST_CHANGE, &mdev->flags));
3163 if (mdev->state.conn >= C_CONNECTED && mdev->state.disk < D_INCONSISTENT)
62b0da3a
LE
3164 updated_uuids |= drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
3165
3166 if (updated_uuids)
3167 drbd_print_uuids(mdev, "receiver updated UUIDs to");
b411b363 3168
81e84650 3169 return true;
b411b363
PR
3170}
3171
3172/**
3173 * convert_state() - Converts the peer's view of the cluster state to our point of view
3174 * @ps: The state as seen by the peer.
3175 */
3176static union drbd_state convert_state(union drbd_state ps)
3177{
3178 union drbd_state ms;
3179
3180 static enum drbd_conns c_tab[] = {
3181 [C_CONNECTED] = C_CONNECTED,
3182
3183 [C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
3184 [C_STARTING_SYNC_T] = C_STARTING_SYNC_S,
3185 [C_DISCONNECTING] = C_TEAR_DOWN, /* C_NETWORK_FAILURE, */
3186 [C_VERIFY_S] = C_VERIFY_T,
3187 [C_MASK] = C_MASK,
3188 };
3189
3190 ms.i = ps.i;
3191
3192 ms.conn = c_tab[ps.conn];
3193 ms.peer = ps.role;
3194 ms.role = ps.peer;
3195 ms.pdsk = ps.disk;
3196 ms.disk = ps.pdsk;
3197 ms.peer_isp = (ps.aftr_isp | ps.user_isp);
3198
3199 return ms;
3200}
3201
d8763023
AG
3202static int receive_req_state(struct drbd_conf *mdev, enum drbd_packet cmd,
3203 unsigned int data_size)
b411b363 3204{
e42325a5 3205 struct p_req_state *p = &mdev->tconn->data.rbuf.req_state;
b411b363 3206 union drbd_state mask, val;
bf885f8a 3207 enum drbd_state_rv rv;
b411b363 3208
b411b363
PR
3209 mask.i = be32_to_cpu(p->mask);
3210 val.i = be32_to_cpu(p->val);
3211
25703f83 3212 if (test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags) &&
b411b363
PR
3213 test_bit(CLUSTER_ST_CHANGE, &mdev->flags)) {
3214 drbd_send_sr_reply(mdev, SS_CONCURRENT_ST_CHG);
81e84650 3215 return true;
b411b363
PR
3216 }
3217
3218 mask = convert_state(mask);
3219 val = convert_state(val);
3220
3221 rv = drbd_change_state(mdev, CS_VERBOSE, mask, val);
3222
3223 drbd_send_sr_reply(mdev, rv);
3224 drbd_md_sync(mdev);
3225
81e84650 3226 return true;
b411b363
PR
3227}
3228
d8763023
AG
3229static int receive_state(struct drbd_conf *mdev, enum drbd_packet cmd,
3230 unsigned int data_size)
b411b363 3231{
e42325a5 3232 struct p_state *p = &mdev->tconn->data.rbuf.state;
4ac4aada 3233 union drbd_state os, ns, peer_state;
b411b363 3234 enum drbd_disk_state real_peer_disk;
65d922c3 3235 enum chg_state_flags cs_flags;
b411b363
PR
3236 int rv;
3237
b411b363
PR
3238 peer_state.i = be32_to_cpu(p->state);
3239
3240 real_peer_disk = peer_state.disk;
3241 if (peer_state.disk == D_NEGOTIATING) {
3242 real_peer_disk = mdev->p_uuid[UI_FLAGS] & 4 ? D_INCONSISTENT : D_CONSISTENT;
3243 dev_info(DEV, "real peer disk state = %s\n", drbd_disk_str(real_peer_disk));
3244 }
3245
87eeee41 3246 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 3247 retry:
4ac4aada 3248 os = ns = mdev->state;
87eeee41 3249 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 3250
e9ef7bb6
LE
3251 /* peer says his disk is uptodate, while we think it is inconsistent,
3252 * and this happens while we think we have a sync going on. */
3253 if (os.pdsk == D_INCONSISTENT && real_peer_disk == D_UP_TO_DATE &&
3254 os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
3255 /* If we are (becoming) SyncSource, but peer is still in sync
3256 * preparation, ignore its uptodate-ness to avoid flapping, it
3257 * will change to inconsistent once the peer reaches active
3258 * syncing states.
3259 * It may have changed syncer-paused flags, however, so we
3260 * cannot ignore this completely. */
3261 if (peer_state.conn > C_CONNECTED &&
3262 peer_state.conn < C_SYNC_SOURCE)
3263 real_peer_disk = D_INCONSISTENT;
3264
3265 /* if peer_state changes to connected at the same time,
3266 * it explicitly notifies us that it finished resync.
3267 * Maybe we should finish it up, too? */
3268 else if (os.conn >= C_SYNC_SOURCE &&
3269 peer_state.conn == C_CONNECTED) {
3270 if (drbd_bm_total_weight(mdev) <= mdev->rs_failed)
3271 drbd_resync_finished(mdev);
81e84650 3272 return true;
e9ef7bb6
LE
3273 }
3274 }
3275
3276 /* peer says his disk is inconsistent, while we think it is uptodate,
3277 * and this happens while the peer still thinks we have a sync going on,
3278 * but we think we are already done with the sync.
3279 * We ignore this to avoid flapping pdsk.
3280 * This should not happen, if the peer is a recent version of drbd. */
3281 if (os.pdsk == D_UP_TO_DATE && real_peer_disk == D_INCONSISTENT &&
3282 os.conn == C_CONNECTED && peer_state.conn > C_SYNC_SOURCE)
3283 real_peer_disk = D_UP_TO_DATE;
3284
4ac4aada
LE
3285 if (ns.conn == C_WF_REPORT_PARAMS)
3286 ns.conn = C_CONNECTED;
b411b363 3287
67531718
PR
3288 if (peer_state.conn == C_AHEAD)
3289 ns.conn = C_BEHIND;
3290
b411b363
PR
3291 if (mdev->p_uuid && peer_state.disk >= D_NEGOTIATING &&
3292 get_ldev_if_state(mdev, D_NEGOTIATING)) {
3293 int cr; /* consider resync */
3294
3295 /* if we established a new connection */
4ac4aada 3296 cr = (os.conn < C_CONNECTED);
b411b363
PR
3297 /* if we had an established connection
3298 * and one of the nodes newly attaches a disk */
4ac4aada 3299 cr |= (os.conn == C_CONNECTED &&
b411b363 3300 (peer_state.disk == D_NEGOTIATING ||
4ac4aada 3301 os.disk == D_NEGOTIATING));
b411b363
PR
3302 /* if we have both been inconsistent, and the peer has been
3303 * forced to be UpToDate with --overwrite-data */
3304 cr |= test_bit(CONSIDER_RESYNC, &mdev->flags);
3305 /* if we had been plain connected, and the admin requested to
3306 * start a sync by "invalidate" or "invalidate-remote" */
4ac4aada 3307 cr |= (os.conn == C_CONNECTED &&
b411b363
PR
3308 (peer_state.conn >= C_STARTING_SYNC_S &&
3309 peer_state.conn <= C_WF_BITMAP_T));
3310
3311 if (cr)
4ac4aada 3312 ns.conn = drbd_sync_handshake(mdev, peer_state.role, real_peer_disk);
b411b363
PR
3313
3314 put_ldev(mdev);
4ac4aada
LE
3315 if (ns.conn == C_MASK) {
3316 ns.conn = C_CONNECTED;
b411b363 3317 if (mdev->state.disk == D_NEGOTIATING) {
82f59cc6 3318 drbd_force_state(mdev, NS(disk, D_FAILED));
b411b363
PR
3319 } else if (peer_state.disk == D_NEGOTIATING) {
3320 dev_err(DEV, "Disk attach process on the peer node was aborted.\n");
3321 peer_state.disk = D_DISKLESS;
580b9767 3322 real_peer_disk = D_DISKLESS;
b411b363 3323 } else {
cf14c2e9 3324 if (test_and_clear_bit(CONN_DRY_RUN, &mdev->flags))
81e84650 3325 return false;
4ac4aada 3326 D_ASSERT(os.conn == C_WF_REPORT_PARAMS);
b411b363 3327 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3328 return false;
b411b363
PR
3329 }
3330 }
3331 }
3332
87eeee41 3333 spin_lock_irq(&mdev->tconn->req_lock);
4ac4aada 3334 if (mdev->state.i != os.i)
b411b363
PR
3335 goto retry;
3336 clear_bit(CONSIDER_RESYNC, &mdev->flags);
b411b363
PR
3337 ns.peer = peer_state.role;
3338 ns.pdsk = real_peer_disk;
3339 ns.peer_isp = (peer_state.aftr_isp | peer_state.user_isp);
4ac4aada 3340 if ((ns.conn == C_CONNECTED || ns.conn == C_WF_BITMAP_S) && ns.disk == D_NEGOTIATING)
b411b363 3341 ns.disk = mdev->new_state_tmp.disk;
4ac4aada
LE
3342 cs_flags = CS_VERBOSE + (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED ? 0 : CS_HARD);
3343 if (ns.pdsk == D_CONSISTENT && is_susp(ns) && ns.conn == C_CONNECTED && os.conn < C_CONNECTED &&
481c6f50 3344 test_bit(NEW_CUR_UUID, &mdev->flags)) {
8554df1c 3345 /* Do not allow tl_restart(RESEND) for a rebooted peer. We can only allow this
481c6f50 3346 for temporal network outages! */
87eeee41 3347 spin_unlock_irq(&mdev->tconn->req_lock);
481c6f50
PR
3348 dev_err(DEV, "Aborting Connect, can not thaw IO with an only Consistent peer\n");
3349 tl_clear(mdev);
3350 drbd_uuid_new_current(mdev);
3351 clear_bit(NEW_CUR_UUID, &mdev->flags);
3352 drbd_force_state(mdev, NS2(conn, C_PROTOCOL_ERROR, susp, 0));
81e84650 3353 return false;
481c6f50 3354 }
65d922c3 3355 rv = _drbd_set_state(mdev, ns, cs_flags, NULL);
b411b363 3356 ns = mdev->state;
87eeee41 3357 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3358
3359 if (rv < SS_SUCCESS) {
3360 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3361 return false;
b411b363
PR
3362 }
3363
4ac4aada
LE
3364 if (os.conn > C_WF_REPORT_PARAMS) {
3365 if (ns.conn > C_CONNECTED && peer_state.conn <= C_CONNECTED &&
b411b363
PR
3366 peer_state.disk != D_NEGOTIATING ) {
3367 /* we want resync, peer has not yet decided to sync... */
3368 /* Nowadays only used when forcing a node into primary role and
3369 setting its disk to UpToDate with that */
3370 drbd_send_uuids(mdev);
3371 drbd_send_state(mdev);
3372 }
3373 }
3374
89e58e75 3375 mdev->tconn->net_conf->want_lose = 0;
b411b363
PR
3376
3377 drbd_md_sync(mdev); /* update connected indicator, la_size, ... */
3378
81e84650 3379 return true;
b411b363
PR
3380}
3381
d8763023
AG
3382static int receive_sync_uuid(struct drbd_conf *mdev, enum drbd_packet cmd,
3383 unsigned int data_size)
b411b363 3384{
e42325a5 3385 struct p_rs_uuid *p = &mdev->tconn->data.rbuf.rs_uuid;
b411b363
PR
3386
3387 wait_event(mdev->misc_wait,
3388 mdev->state.conn == C_WF_SYNC_UUID ||
c4752ef1 3389 mdev->state.conn == C_BEHIND ||
b411b363
PR
3390 mdev->state.conn < C_CONNECTED ||
3391 mdev->state.disk < D_NEGOTIATING);
3392
3393 /* D_ASSERT( mdev->state.conn == C_WF_SYNC_UUID ); */
3394
b411b363
PR
3395 /* Here the _drbd_uuid_ functions are right, current should
3396 _not_ be rotated into the history */
3397 if (get_ldev_if_state(mdev, D_NEGOTIATING)) {
3398 _drbd_uuid_set(mdev, UI_CURRENT, be64_to_cpu(p->uuid));
3399 _drbd_uuid_set(mdev, UI_BITMAP, 0UL);
3400
62b0da3a 3401 drbd_print_uuids(mdev, "updated sync uuid");
b411b363
PR
3402 drbd_start_resync(mdev, C_SYNC_TARGET);
3403
3404 put_ldev(mdev);
3405 } else
3406 dev_err(DEV, "Ignoring SyncUUID packet!\n");
3407
81e84650 3408 return true;
b411b363
PR
3409}
3410
2c46407d
AG
3411/**
3412 * receive_bitmap_plain
3413 *
3414 * Return 0 when done, 1 when another iteration is needed, and a negative error
3415 * code upon failure.
3416 */
3417static int
02918be2
PR
3418receive_bitmap_plain(struct drbd_conf *mdev, unsigned int data_size,
3419 unsigned long *buffer, struct bm_xfer_ctx *c)
b411b363
PR
3420{
3421 unsigned num_words = min_t(size_t, BM_PACKET_WORDS, c->bm_words - c->word_offset);
3422 unsigned want = num_words * sizeof(long);
2c46407d 3423 int err;
b411b363 3424
02918be2
PR
3425 if (want != data_size) {
3426 dev_err(DEV, "%s:want (%u) != data_size (%u)\n", __func__, want, data_size);
2c46407d 3427 return -EIO;
b411b363
PR
3428 }
3429 if (want == 0)
2c46407d
AG
3430 return 0;
3431 err = drbd_recv(mdev, buffer, want);
3432 if (err != want) {
3433 if (err >= 0)
3434 err = -EIO;
3435 return err;
3436 }
b411b363
PR
3437
3438 drbd_bm_merge_lel(mdev, c->word_offset, num_words, buffer);
3439
3440 c->word_offset += num_words;
3441 c->bit_offset = c->word_offset * BITS_PER_LONG;
3442 if (c->bit_offset > c->bm_bits)
3443 c->bit_offset = c->bm_bits;
3444
2c46407d 3445 return 1;
b411b363
PR
3446}
3447
2c46407d
AG
3448/**
3449 * recv_bm_rle_bits
3450 *
3451 * Return 0 when done, 1 when another iteration is needed, and a negative error
3452 * code upon failure.
3453 */
3454static int
b411b363
PR
3455recv_bm_rle_bits(struct drbd_conf *mdev,
3456 struct p_compressed_bm *p,
c6d25cfe
PR
3457 struct bm_xfer_ctx *c,
3458 unsigned int len)
b411b363
PR
3459{
3460 struct bitstream bs;
3461 u64 look_ahead;
3462 u64 rl;
3463 u64 tmp;
3464 unsigned long s = c->bit_offset;
3465 unsigned long e;
b411b363
PR
3466 int toggle = DCBP_get_start(p);
3467 int have;
3468 int bits;
3469
3470 bitstream_init(&bs, p->code, len, DCBP_get_pad_bits(p));
3471
3472 bits = bitstream_get_bits(&bs, &look_ahead, 64);
3473 if (bits < 0)
2c46407d 3474 return -EIO;
b411b363
PR
3475
3476 for (have = bits; have > 0; s += rl, toggle = !toggle) {
3477 bits = vli_decode_bits(&rl, look_ahead);
3478 if (bits <= 0)
2c46407d 3479 return -EIO;
b411b363
PR
3480
3481 if (toggle) {
3482 e = s + rl -1;
3483 if (e >= c->bm_bits) {
3484 dev_err(DEV, "bitmap overflow (e:%lu) while decoding bm RLE packet\n", e);
2c46407d 3485 return -EIO;
b411b363
PR
3486 }
3487 _drbd_bm_set_bits(mdev, s, e);
3488 }
3489
3490 if (have < bits) {
3491 dev_err(DEV, "bitmap decoding error: h:%d b:%d la:0x%08llx l:%u/%u\n",
3492 have, bits, look_ahead,
3493 (unsigned int)(bs.cur.b - p->code),
3494 (unsigned int)bs.buf_len);
2c46407d 3495 return -EIO;
b411b363
PR
3496 }
3497 look_ahead >>= bits;
3498 have -= bits;
3499
3500 bits = bitstream_get_bits(&bs, &tmp, 64 - have);
3501 if (bits < 0)
2c46407d 3502 return -EIO;
b411b363
PR
3503 look_ahead |= tmp << have;
3504 have += bits;
3505 }
3506
3507 c->bit_offset = s;
3508 bm_xfer_ctx_bit_to_word_offset(c);
3509
2c46407d 3510 return (s != c->bm_bits);
b411b363
PR
3511}
3512
2c46407d
AG
3513/**
3514 * decode_bitmap_c
3515 *
3516 * Return 0 when done, 1 when another iteration is needed, and a negative error
3517 * code upon failure.
3518 */
3519static int
b411b363
PR
3520decode_bitmap_c(struct drbd_conf *mdev,
3521 struct p_compressed_bm *p,
c6d25cfe
PR
3522 struct bm_xfer_ctx *c,
3523 unsigned int len)
b411b363
PR
3524{
3525 if (DCBP_get_code(p) == RLE_VLI_Bits)
c6d25cfe 3526 return recv_bm_rle_bits(mdev, p, c, len);
b411b363
PR
3527
3528 /* other variants had been implemented for evaluation,
3529 * but have been dropped as this one turned out to be "best"
3530 * during all our tests. */
3531
3532 dev_err(DEV, "receive_bitmap_c: unknown encoding %u\n", p->encoding);
3533 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
2c46407d 3534 return -EIO;
b411b363
PR
3535}
3536
3537void INFO_bm_xfer_stats(struct drbd_conf *mdev,
3538 const char *direction, struct bm_xfer_ctx *c)
3539{
3540 /* what would it take to transfer it "plaintext" */
c012949a 3541 unsigned plain = sizeof(struct p_header) *
b411b363
PR
3542 ((c->bm_words+BM_PACKET_WORDS-1)/BM_PACKET_WORDS+1)
3543 + c->bm_words * sizeof(long);
3544 unsigned total = c->bytes[0] + c->bytes[1];
3545 unsigned r;
3546
3547 /* total can not be zero. but just in case: */
3548 if (total == 0)
3549 return;
3550
3551 /* don't report if not compressed */
3552 if (total >= plain)
3553 return;
3554
3555 /* total < plain. check for overflow, still */
3556 r = (total > UINT_MAX/1000) ? (total / (plain/1000))
3557 : (1000 * total / plain);
3558
3559 if (r > 1000)
3560 r = 1000;
3561
3562 r = 1000 - r;
3563 dev_info(DEV, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), "
3564 "total %u; compression: %u.%u%%\n",
3565 direction,
3566 c->bytes[1], c->packets[1],
3567 c->bytes[0], c->packets[0],
3568 total, r/10, r % 10);
3569}
3570
3571/* Since we are processing the bitfield from lower addresses to higher,
3572 it does not matter if the process it in 32 bit chunks or 64 bit
3573 chunks as long as it is little endian. (Understand it as byte stream,
3574 beginning with the lowest byte...) If we would use big endian
3575 we would need to process it from the highest address to the lowest,
3576 in order to be agnostic to the 32 vs 64 bits issue.
3577
3578 returns 0 on failure, 1 if we successfully received it. */
d8763023
AG
3579static int receive_bitmap(struct drbd_conf *mdev, enum drbd_packet cmd,
3580 unsigned int data_size)
b411b363
PR
3581{
3582 struct bm_xfer_ctx c;
3583 void *buffer;
2c46407d 3584 int err;
81e84650 3585 int ok = false;
257d0af6 3586 struct p_header *h = &mdev->tconn->data.rbuf.header;
b411b363 3587
20ceb2b2
LE
3588 drbd_bm_lock(mdev, "receive bitmap", BM_LOCKED_SET_ALLOWED);
3589 /* you are supposed to send additional out-of-sync information
3590 * if you actually set bits during this phase */
b411b363
PR
3591
3592 /* maybe we should use some per thread scratch page,
3593 * and allocate that during initial device creation? */
3594 buffer = (unsigned long *) __get_free_page(GFP_NOIO);
3595 if (!buffer) {
3596 dev_err(DEV, "failed to allocate one page buffer in %s\n", __func__);
3597 goto out;
3598 }
3599
3600 c = (struct bm_xfer_ctx) {
3601 .bm_bits = drbd_bm_bits(mdev),
3602 .bm_words = drbd_bm_words(mdev),
3603 };
3604
2c46407d 3605 for(;;) {
02918be2 3606 if (cmd == P_BITMAP) {
2c46407d 3607 err = receive_bitmap_plain(mdev, data_size, buffer, &c);
02918be2 3608 } else if (cmd == P_COMPRESSED_BITMAP) {
b411b363
PR
3609 /* MAYBE: sanity check that we speak proto >= 90,
3610 * and the feature is enabled! */
3611 struct p_compressed_bm *p;
3612
02918be2 3613 if (data_size > BM_PACKET_PAYLOAD_BYTES) {
b411b363
PR
3614 dev_err(DEV, "ReportCBitmap packet too large\n");
3615 goto out;
3616 }
3617 /* use the page buff */
3618 p = buffer;
3619 memcpy(p, h, sizeof(*h));
02918be2 3620 if (drbd_recv(mdev, p->head.payload, data_size) != data_size)
b411b363 3621 goto out;
004352fa
LE
3622 if (data_size <= (sizeof(*p) - sizeof(p->head))) {
3623 dev_err(DEV, "ReportCBitmap packet too small (l:%u)\n", data_size);
78fcbdae 3624 goto out;
b411b363 3625 }
c6d25cfe 3626 err = decode_bitmap_c(mdev, p, &c, data_size);
b411b363 3627 } else {
02918be2 3628 dev_warn(DEV, "receive_bitmap: cmd neither ReportBitMap nor ReportCBitMap (is 0x%x)", cmd);
b411b363
PR
3629 goto out;
3630 }
3631
02918be2 3632 c.packets[cmd == P_BITMAP]++;
257d0af6 3633 c.bytes[cmd == P_BITMAP] += sizeof(struct p_header) + data_size;
b411b363 3634
2c46407d
AG
3635 if (err <= 0) {
3636 if (err < 0)
3637 goto out;
b411b363 3638 break;
2c46407d 3639 }
02918be2 3640 if (!drbd_recv_header(mdev, &cmd, &data_size))
b411b363 3641 goto out;
2c46407d 3642 }
b411b363
PR
3643
3644 INFO_bm_xfer_stats(mdev, "receive", &c);
3645
3646 if (mdev->state.conn == C_WF_BITMAP_T) {
de1f8e4a
AG
3647 enum drbd_state_rv rv;
3648
b411b363
PR
3649 ok = !drbd_send_bitmap(mdev);
3650 if (!ok)
3651 goto out;
3652 /* Omit CS_ORDERED with this state transition to avoid deadlocks. */
de1f8e4a
AG
3653 rv = _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
3654 D_ASSERT(rv == SS_SUCCESS);
b411b363
PR
3655 } else if (mdev->state.conn != C_WF_BITMAP_S) {
3656 /* admin may have requested C_DISCONNECTING,
3657 * other threads may have noticed network errors */
3658 dev_info(DEV, "unexpected cstate (%s) in receive_bitmap\n",
3659 drbd_conn_str(mdev->state.conn));
3660 }
3661
81e84650 3662 ok = true;
b411b363 3663 out:
20ceb2b2 3664 drbd_bm_unlock(mdev);
b411b363
PR
3665 if (ok && mdev->state.conn == C_WF_BITMAP_S)
3666 drbd_start_resync(mdev, C_SYNC_SOURCE);
3667 free_page((unsigned long) buffer);
3668 return ok;
3669}
3670
d8763023
AG
3671static int receive_skip(struct drbd_conf *mdev, enum drbd_packet cmd,
3672 unsigned int data_size)
b411b363
PR
3673{
3674 /* TODO zero copy sink :) */
3675 static char sink[128];
3676 int size, want, r;
3677
02918be2
PR
3678 dev_warn(DEV, "skipping unknown optional packet type %d, l: %d!\n",
3679 cmd, data_size);
b411b363 3680
02918be2 3681 size = data_size;
b411b363
PR
3682 while (size > 0) {
3683 want = min_t(int, size, sizeof(sink));
3684 r = drbd_recv(mdev, sink, want);
841ce241
AG
3685 if (!expect(r > 0))
3686 break;
b411b363
PR
3687 size -= r;
3688 }
3689 return size == 0;
3690}
3691
d8763023
AG
3692static int receive_UnplugRemote(struct drbd_conf *mdev, enum drbd_packet cmd,
3693 unsigned int data_size)
0ced55a3 3694{
e7f52dfb
LE
3695 /* Make sure we've acked all the TCP data associated
3696 * with the data requests being unplugged */
e42325a5 3697 drbd_tcp_quickack(mdev->tconn->data.socket);
0ced55a3 3698
81e84650 3699 return true;
0ced55a3
PR
3700}
3701
d8763023
AG
3702static int receive_out_of_sync(struct drbd_conf *mdev, enum drbd_packet cmd,
3703 unsigned int data_size)
73a01a18 3704{
e42325a5 3705 struct p_block_desc *p = &mdev->tconn->data.rbuf.block_desc;
73a01a18 3706
f735e363
LE
3707 switch (mdev->state.conn) {
3708 case C_WF_SYNC_UUID:
3709 case C_WF_BITMAP_T:
3710 case C_BEHIND:
3711 break;
3712 default:
3713 dev_err(DEV, "ASSERT FAILED cstate = %s, expected: WFSyncUUID|WFBitMapT|Behind\n",
3714 drbd_conn_str(mdev->state.conn));
3715 }
3716
73a01a18
PR
3717 drbd_set_out_of_sync(mdev, be64_to_cpu(p->sector), be32_to_cpu(p->blksize));
3718
81e84650 3719 return true;
73a01a18
PR
3720}
3721
d8763023
AG
3722typedef int (*drbd_cmd_handler_f)(struct drbd_conf *, enum drbd_packet cmd,
3723 unsigned int to_receive);
02918be2
PR
3724
3725struct data_cmd {
3726 int expect_payload;
3727 size_t pkt_size;
3728 drbd_cmd_handler_f function;
3729};
3730
3731static struct data_cmd drbd_cmd_handler[] = {
3732 [P_DATA] = { 1, sizeof(struct p_data), receive_Data },
3733 [P_DATA_REPLY] = { 1, sizeof(struct p_data), receive_DataReply },
3734 [P_RS_DATA_REPLY] = { 1, sizeof(struct p_data), receive_RSDataReply } ,
3735 [P_BARRIER] = { 0, sizeof(struct p_barrier), receive_Barrier } ,
257d0af6
PR
3736 [P_BITMAP] = { 1, sizeof(struct p_header), receive_bitmap } ,
3737 [P_COMPRESSED_BITMAP] = { 1, sizeof(struct p_header), receive_bitmap } ,
3738 [P_UNPLUG_REMOTE] = { 0, sizeof(struct p_header), receive_UnplugRemote },
02918be2
PR
3739 [P_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3740 [P_RS_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
257d0af6
PR
3741 [P_SYNC_PARAM] = { 1, sizeof(struct p_header), receive_SyncParam },
3742 [P_SYNC_PARAM89] = { 1, sizeof(struct p_header), receive_SyncParam },
02918be2
PR
3743 [P_PROTOCOL] = { 1, sizeof(struct p_protocol), receive_protocol },
3744 [P_UUIDS] = { 0, sizeof(struct p_uuids), receive_uuids },
3745 [P_SIZES] = { 0, sizeof(struct p_sizes), receive_sizes },
3746 [P_STATE] = { 0, sizeof(struct p_state), receive_state },
3747 [P_STATE_CHG_REQ] = { 0, sizeof(struct p_req_state), receive_req_state },
3748 [P_SYNC_UUID] = { 0, sizeof(struct p_rs_uuid), receive_sync_uuid },
3749 [P_OV_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3750 [P_OV_REPLY] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3751 [P_CSUM_RS_REQUEST] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3752 [P_DELAY_PROBE] = { 0, sizeof(struct p_delay_probe93), receive_skip },
73a01a18 3753 [P_OUT_OF_SYNC] = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
b411b363
PR
3754 /* anything missing from this table is in
3755 * the asender_tbl, see get_asender_cmd */
02918be2 3756 [P_MAX_CMD] = { 0, 0, NULL },
b411b363
PR
3757};
3758
02918be2 3759/* All handler functions that expect a sub-header get that sub-heder in
e42325a5 3760 mdev->tconn->data.rbuf.header.head.payload.
02918be2 3761
e42325a5 3762 Usually in mdev->tconn->data.rbuf.header.head the callback can find the usual
02918be2
PR
3763 p_header, but they may not rely on that. Since there is also p_header95 !
3764 */
b411b363
PR
3765
3766static void drbdd(struct drbd_conf *mdev)
3767{
c012949a 3768 struct p_header *header = &mdev->tconn->data.rbuf.header;
02918be2 3769 unsigned int packet_size;
d8763023 3770 enum drbd_packet cmd;
02918be2
PR
3771 size_t shs; /* sub header size */
3772 int rv;
b411b363 3773
e6b3ea83 3774 while (get_t_state(&mdev->tconn->receiver) == RUNNING) {
bc31fe33 3775 drbd_thread_current_set_cpu(mdev, &mdev->tconn->receiver);
02918be2
PR
3776 if (!drbd_recv_header(mdev, &cmd, &packet_size))
3777 goto err_out;
b411b363 3778
02918be2
PR
3779 if (unlikely(cmd >= P_MAX_CMD || !drbd_cmd_handler[cmd].function)) {
3780 dev_err(DEV, "unknown packet type %d, l: %d!\n", cmd, packet_size);
3781 goto err_out;
0b33a916 3782 }
b411b363 3783
c012949a 3784 shs = drbd_cmd_handler[cmd].pkt_size - sizeof(struct p_header);
02918be2
PR
3785 if (packet_size - shs > 0 && !drbd_cmd_handler[cmd].expect_payload) {
3786 dev_err(DEV, "No payload expected %s l:%d\n", cmdname(cmd), packet_size);
3787 goto err_out;
b411b363 3788 }
b411b363 3789
c13f7e1a 3790 if (shs) {
c012949a 3791 rv = drbd_recv(mdev, &header->payload, shs);
c13f7e1a 3792 if (unlikely(rv != shs)) {
0ddc5549
LE
3793 if (!signal_pending(current))
3794 dev_warn(DEV, "short read while reading sub header: rv=%d\n", rv);
c13f7e1a
LE
3795 goto err_out;
3796 }
3797 }
3798
02918be2 3799 rv = drbd_cmd_handler[cmd].function(mdev, cmd, packet_size - shs);
b411b363 3800
02918be2 3801 if (unlikely(!rv)) {
b411b363 3802 dev_err(DEV, "error receiving %s, l: %d!\n",
02918be2
PR
3803 cmdname(cmd), packet_size);
3804 goto err_out;
b411b363
PR
3805 }
3806 }
b411b363 3807
02918be2
PR
3808 if (0) {
3809 err_out:
3810 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
3811 }
856c50c7
LE
3812 /* If we leave here, we probably want to update at least the
3813 * "Connected" indicator on stable storage. Do so explicitly here. */
3814 drbd_md_sync(mdev);
b411b363
PR
3815}
3816
191d3cc8 3817void drbd_flush_workqueue(struct drbd_tconn *tconn)
b411b363
PR
3818{
3819 struct drbd_wq_barrier barr;
3820
3821 barr.w.cb = w_prev_work_done;
3822 init_completion(&barr.done);
191d3cc8 3823 drbd_queue_work(&tconn->data.work, &barr.w);
b411b363
PR
3824 wait_for_completion(&barr.done);
3825}
3826
3827static void drbd_disconnect(struct drbd_conf *mdev)
3828{
3829 enum drbd_fencing_p fp;
3830 union drbd_state os, ns;
3831 int rv = SS_UNKNOWN_ERROR;
3832 unsigned int i;
3833
3834 if (mdev->state.conn == C_STANDALONE)
3835 return;
b411b363
PR
3836
3837 /* asender does not clean up anything. it must not interfere, either */
e6b3ea83 3838 drbd_thread_stop(&mdev->tconn->asender);
b411b363 3839 drbd_free_sock(mdev);
b411b363 3840
85719573 3841 /* wait for current activity to cease. */
87eeee41 3842 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
3843 _drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
3844 _drbd_wait_ee_list_empty(mdev, &mdev->sync_ee);
3845 _drbd_wait_ee_list_empty(mdev, &mdev->read_ee);
87eeee41 3846 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3847
3848 /* We do not have data structures that would allow us to
3849 * get the rs_pending_cnt down to 0 again.
3850 * * On C_SYNC_TARGET we do not have any data structures describing
3851 * the pending RSDataRequest's we have sent.
3852 * * On C_SYNC_SOURCE there is no data structure that tracks
3853 * the P_RS_DATA_REPLY blocks that we sent to the SyncTarget.
3854 * And no, it is not the sum of the reference counts in the
3855 * resync_LRU. The resync_LRU tracks the whole operation including
3856 * the disk-IO, while the rs_pending_cnt only tracks the blocks
3857 * on the fly. */
3858 drbd_rs_cancel_all(mdev);
3859 mdev->rs_total = 0;
3860 mdev->rs_failed = 0;
3861 atomic_set(&mdev->rs_pending_cnt, 0);
3862 wake_up(&mdev->misc_wait);
3863
7fde2be9
PR
3864 del_timer(&mdev->request_timer);
3865
b411b363
PR
3866 /* make sure syncer is stopped and w_resume_next_sg queued */
3867 del_timer_sync(&mdev->resync_timer);
b411b363
PR
3868 resync_timer_fn((unsigned long)mdev);
3869
b411b363
PR
3870 /* wait for all w_e_end_data_req, w_e_end_rsdata_req, w_send_barrier,
3871 * w_make_resync_request etc. which may still be on the worker queue
3872 * to be "canceled" */
191d3cc8 3873 drbd_flush_workqueue(mdev->tconn);
b411b363
PR
3874
3875 /* This also does reclaim_net_ee(). If we do this too early, we might
3876 * miss some resync ee and pages.*/
3877 drbd_process_done_ee(mdev);
3878
3879 kfree(mdev->p_uuid);
3880 mdev->p_uuid = NULL;
3881
fb22c402 3882 if (!is_susp(mdev->state))
b411b363
PR
3883 tl_clear(mdev);
3884
b411b363
PR
3885 dev_info(DEV, "Connection closed\n");
3886
3887 drbd_md_sync(mdev);
3888
3889 fp = FP_DONT_CARE;
3890 if (get_ldev(mdev)) {
3891 fp = mdev->ldev->dc.fencing;
3892 put_ldev(mdev);
3893 }
3894
87f7be4c
PR
3895 if (mdev->state.role == R_PRIMARY && fp >= FP_RESOURCE && mdev->state.pdsk >= D_UNKNOWN)
3896 drbd_try_outdate_peer_async(mdev);
b411b363 3897
87eeee41 3898 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
3899 os = mdev->state;
3900 if (os.conn >= C_UNCONNECTED) {
3901 /* Do not restart in case we are C_DISCONNECTING */
3902 ns = os;
3903 ns.conn = C_UNCONNECTED;
3904 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
3905 }
87eeee41 3906 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3907
3908 if (os.conn == C_DISCONNECTING) {
b2fb6dbe 3909 wait_event(mdev->tconn->net_cnt_wait, atomic_read(&mdev->tconn->net_cnt) == 0);
b411b363 3910
a0638456
PR
3911 crypto_free_hash(mdev->tconn->cram_hmac_tfm);
3912 mdev->tconn->cram_hmac_tfm = NULL;
b411b363 3913
89e58e75
PR
3914 kfree(mdev->tconn->net_conf);
3915 mdev->tconn->net_conf = NULL;
b411b363
PR
3916 drbd_request_state(mdev, NS(conn, C_STANDALONE));
3917 }
3918
20ceb2b2
LE
3919 /* serialize with bitmap writeout triggered by the state change,
3920 * if any. */
3921 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
3922
b411b363
PR
3923 /* tcp_close and release of sendpage pages can be deferred. I don't
3924 * want to use SO_LINGER, because apparently it can be deferred for
3925 * more than 20 seconds (longest time I checked).
3926 *
3927 * Actually we don't care for exactly when the network stack does its
3928 * put_page(), but release our reference on these pages right here.
3929 */
3930 i = drbd_release_ee(mdev, &mdev->net_ee);
3931 if (i)
3932 dev_info(DEV, "net_ee not empty, killed %u entries\n", i);
435f0740
LE
3933 i = atomic_read(&mdev->pp_in_use_by_net);
3934 if (i)
3935 dev_info(DEV, "pp_in_use_by_net = %d, expected 0\n", i);
b411b363
PR
3936 i = atomic_read(&mdev->pp_in_use);
3937 if (i)
45bb912b 3938 dev_info(DEV, "pp_in_use = %d, expected 0\n", i);
b411b363
PR
3939
3940 D_ASSERT(list_empty(&mdev->read_ee));
3941 D_ASSERT(list_empty(&mdev->active_ee));
3942 D_ASSERT(list_empty(&mdev->sync_ee));
3943 D_ASSERT(list_empty(&mdev->done_ee));
3944
3945 /* ok, no more ee's on the fly, it is safe to reset the epoch_size */
3946 atomic_set(&mdev->current_epoch->epoch_size, 0);
3947 D_ASSERT(list_empty(&mdev->current_epoch->list));
3948}
3949
3950/*
3951 * We support PRO_VERSION_MIN to PRO_VERSION_MAX. The protocol version
3952 * we can agree on is stored in agreed_pro_version.
3953 *
3954 * feature flags and the reserved array should be enough room for future
3955 * enhancements of the handshake protocol, and possible plugins...
3956 *
3957 * for now, they are expected to be zero, but ignored.
3958 */
3959static int drbd_send_handshake(struct drbd_conf *mdev)
3960{
e6b3ea83 3961 /* ASSERT current == mdev->tconn->receiver ... */
e42325a5 3962 struct p_handshake *p = &mdev->tconn->data.sbuf.handshake;
b411b363
PR
3963 int ok;
3964
e42325a5 3965 if (mutex_lock_interruptible(&mdev->tconn->data.mutex)) {
b411b363
PR
3966 dev_err(DEV, "interrupted during initial handshake\n");
3967 return 0; /* interrupted. not ok. */
3968 }
3969
e42325a5
PR
3970 if (mdev->tconn->data.socket == NULL) {
3971 mutex_unlock(&mdev->tconn->data.mutex);
b411b363
PR
3972 return 0;
3973 }
3974
3975 memset(p, 0, sizeof(*p));
3976 p->protocol_min = cpu_to_be32(PRO_VERSION_MIN);
3977 p->protocol_max = cpu_to_be32(PRO_VERSION_MAX);
c012949a
PR
3978 ok = _drbd_send_cmd(mdev, mdev->tconn->data.socket, P_HAND_SHAKE,
3979 &p->head, sizeof(*p), 0 );
e42325a5 3980 mutex_unlock(&mdev->tconn->data.mutex);
b411b363
PR
3981 return ok;
3982}
3983
3984/*
3985 * return values:
3986 * 1 yes, we have a valid connection
3987 * 0 oops, did not work out, please try again
3988 * -1 peer talks different language,
3989 * no point in trying again, please go standalone.
3990 */
3991static int drbd_do_handshake(struct drbd_conf *mdev)
3992{
e6b3ea83 3993 /* ASSERT current == mdev->tconn->receiver ... */
e42325a5 3994 struct p_handshake *p = &mdev->tconn->data.rbuf.handshake;
02918be2
PR
3995 const int expect = sizeof(struct p_handshake) - sizeof(struct p_header80);
3996 unsigned int length;
d8763023 3997 enum drbd_packet cmd;
b411b363
PR
3998 int rv;
3999
4000 rv = drbd_send_handshake(mdev);
4001 if (!rv)
4002 return 0;
4003
02918be2 4004 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4005 if (!rv)
4006 return 0;
4007
02918be2 4008 if (cmd != P_HAND_SHAKE) {
b411b363 4009 dev_err(DEV, "expected HandShake packet, received: %s (0x%04x)\n",
02918be2 4010 cmdname(cmd), cmd);
b411b363
PR
4011 return -1;
4012 }
4013
02918be2 4014 if (length != expect) {
b411b363 4015 dev_err(DEV, "expected HandShake length: %u, received: %u\n",
02918be2 4016 expect, length);
b411b363
PR
4017 return -1;
4018 }
4019
4020 rv = drbd_recv(mdev, &p->head.payload, expect);
4021
4022 if (rv != expect) {
0ddc5549
LE
4023 if (!signal_pending(current))
4024 dev_warn(DEV, "short read receiving handshake packet: l=%u\n", rv);
b411b363
PR
4025 return 0;
4026 }
4027
b411b363
PR
4028 p->protocol_min = be32_to_cpu(p->protocol_min);
4029 p->protocol_max = be32_to_cpu(p->protocol_max);
4030 if (p->protocol_max == 0)
4031 p->protocol_max = p->protocol_min;
4032
4033 if (PRO_VERSION_MAX < p->protocol_min ||
4034 PRO_VERSION_MIN > p->protocol_max)
4035 goto incompat;
4036
31890f4a 4037 mdev->tconn->agreed_pro_version = min_t(int, PRO_VERSION_MAX, p->protocol_max);
b411b363
PR
4038
4039 dev_info(DEV, "Handshake successful: "
31890f4a 4040 "Agreed network protocol version %d\n", mdev->tconn->agreed_pro_version);
b411b363
PR
4041
4042 return 1;
4043
4044 incompat:
4045 dev_err(DEV, "incompatible DRBD dialects: "
4046 "I support %d-%d, peer supports %d-%d\n",
4047 PRO_VERSION_MIN, PRO_VERSION_MAX,
4048 p->protocol_min, p->protocol_max);
4049 return -1;
4050}
4051
4052#if !defined(CONFIG_CRYPTO_HMAC) && !defined(CONFIG_CRYPTO_HMAC_MODULE)
4053static int drbd_do_auth(struct drbd_conf *mdev)
4054{
4055 dev_err(DEV, "This kernel was build without CONFIG_CRYPTO_HMAC.\n");
4056 dev_err(DEV, "You need to disable 'cram-hmac-alg' in drbd.conf.\n");
b10d96cb 4057 return -1;
b411b363
PR
4058}
4059#else
4060#define CHALLENGE_LEN 64
b10d96cb
JT
4061
4062/* Return value:
4063 1 - auth succeeded,
4064 0 - failed, try again (network error),
4065 -1 - auth failed, don't try again.
4066*/
4067
b411b363
PR
4068static int drbd_do_auth(struct drbd_conf *mdev)
4069{
4070 char my_challenge[CHALLENGE_LEN]; /* 64 Bytes... */
4071 struct scatterlist sg;
4072 char *response = NULL;
4073 char *right_response = NULL;
4074 char *peers_ch = NULL;
89e58e75 4075 unsigned int key_len = strlen(mdev->tconn->net_conf->shared_secret);
b411b363
PR
4076 unsigned int resp_size;
4077 struct hash_desc desc;
d8763023 4078 enum drbd_packet cmd;
02918be2 4079 unsigned int length;
b411b363
PR
4080 int rv;
4081
a0638456 4082 desc.tfm = mdev->tconn->cram_hmac_tfm;
b411b363
PR
4083 desc.flags = 0;
4084
a0638456 4085 rv = crypto_hash_setkey(mdev->tconn->cram_hmac_tfm,
89e58e75 4086 (u8 *)mdev->tconn->net_conf->shared_secret, key_len);
b411b363
PR
4087 if (rv) {
4088 dev_err(DEV, "crypto_hash_setkey() failed with %d\n", rv);
b10d96cb 4089 rv = -1;
b411b363
PR
4090 goto fail;
4091 }
4092
4093 get_random_bytes(my_challenge, CHALLENGE_LEN);
4094
4095 rv = drbd_send_cmd2(mdev, P_AUTH_CHALLENGE, my_challenge, CHALLENGE_LEN);
4096 if (!rv)
4097 goto fail;
4098
02918be2 4099 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4100 if (!rv)
4101 goto fail;
4102
02918be2 4103 if (cmd != P_AUTH_CHALLENGE) {
b411b363 4104 dev_err(DEV, "expected AuthChallenge packet, received: %s (0x%04x)\n",
02918be2 4105 cmdname(cmd), cmd);
b411b363
PR
4106 rv = 0;
4107 goto fail;
4108 }
4109
02918be2 4110 if (length > CHALLENGE_LEN * 2) {
b411b363 4111 dev_err(DEV, "expected AuthChallenge payload too big.\n");
b10d96cb 4112 rv = -1;
b411b363
PR
4113 goto fail;
4114 }
4115
02918be2 4116 peers_ch = kmalloc(length, GFP_NOIO);
b411b363
PR
4117 if (peers_ch == NULL) {
4118 dev_err(DEV, "kmalloc of peers_ch failed\n");
b10d96cb 4119 rv = -1;
b411b363
PR
4120 goto fail;
4121 }
4122
02918be2 4123 rv = drbd_recv(mdev, peers_ch, length);
b411b363 4124
02918be2 4125 if (rv != length) {
0ddc5549
LE
4126 if (!signal_pending(current))
4127 dev_warn(DEV, "short read AuthChallenge: l=%u\n", rv);
b411b363
PR
4128 rv = 0;
4129 goto fail;
4130 }
4131
a0638456 4132 resp_size = crypto_hash_digestsize(mdev->tconn->cram_hmac_tfm);
b411b363
PR
4133 response = kmalloc(resp_size, GFP_NOIO);
4134 if (response == NULL) {
4135 dev_err(DEV, "kmalloc of response failed\n");
b10d96cb 4136 rv = -1;
b411b363
PR
4137 goto fail;
4138 }
4139
4140 sg_init_table(&sg, 1);
02918be2 4141 sg_set_buf(&sg, peers_ch, length);
b411b363
PR
4142
4143 rv = crypto_hash_digest(&desc, &sg, sg.length, response);
4144 if (rv) {
4145 dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4146 rv = -1;
b411b363
PR
4147 goto fail;
4148 }
4149
4150 rv = drbd_send_cmd2(mdev, P_AUTH_RESPONSE, response, resp_size);
4151 if (!rv)
4152 goto fail;
4153
02918be2 4154 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4155 if (!rv)
4156 goto fail;
4157
02918be2 4158 if (cmd != P_AUTH_RESPONSE) {
b411b363 4159 dev_err(DEV, "expected AuthResponse packet, received: %s (0x%04x)\n",
02918be2 4160 cmdname(cmd), cmd);
b411b363
PR
4161 rv = 0;
4162 goto fail;
4163 }
4164
02918be2 4165 if (length != resp_size) {
b411b363
PR
4166 dev_err(DEV, "expected AuthResponse payload of wrong size\n");
4167 rv = 0;
4168 goto fail;
4169 }
4170
4171 rv = drbd_recv(mdev, response , resp_size);
4172
4173 if (rv != resp_size) {
0ddc5549
LE
4174 if (!signal_pending(current))
4175 dev_warn(DEV, "short read receiving AuthResponse: l=%u\n", rv);
b411b363
PR
4176 rv = 0;
4177 goto fail;
4178 }
4179
4180 right_response = kmalloc(resp_size, GFP_NOIO);
2d1ee87d 4181 if (right_response == NULL) {
b411b363 4182 dev_err(DEV, "kmalloc of right_response failed\n");
b10d96cb 4183 rv = -1;
b411b363
PR
4184 goto fail;
4185 }
4186
4187 sg_set_buf(&sg, my_challenge, CHALLENGE_LEN);
4188
4189 rv = crypto_hash_digest(&desc, &sg, sg.length, right_response);
4190 if (rv) {
4191 dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4192 rv = -1;
b411b363
PR
4193 goto fail;
4194 }
4195
4196 rv = !memcmp(response, right_response, resp_size);
4197
4198 if (rv)
4199 dev_info(DEV, "Peer authenticated using %d bytes of '%s' HMAC\n",
89e58e75 4200 resp_size, mdev->tconn->net_conf->cram_hmac_alg);
b10d96cb
JT
4201 else
4202 rv = -1;
b411b363
PR
4203
4204 fail:
4205 kfree(peers_ch);
4206 kfree(response);
4207 kfree(right_response);
4208
4209 return rv;
4210}
4211#endif
4212
4213int drbdd_init(struct drbd_thread *thi)
4214{
4215 struct drbd_conf *mdev = thi->mdev;
4216 unsigned int minor = mdev_to_minor(mdev);
4217 int h;
4218
4219 sprintf(current->comm, "drbd%d_receiver", minor);
4220
4221 dev_info(DEV, "receiver (re)started\n");
4222
4223 do {
4224 h = drbd_connect(mdev);
4225 if (h == 0) {
4226 drbd_disconnect(mdev);
20ee6390 4227 schedule_timeout_interruptible(HZ);
b411b363
PR
4228 }
4229 if (h == -1) {
4230 dev_warn(DEV, "Discarding network configuration.\n");
4231 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
4232 }
4233 } while (h == 0);
4234
4235 if (h > 0) {
b2fb6dbe 4236 if (get_net_conf(mdev->tconn)) {
b411b363 4237 drbdd(mdev);
b2fb6dbe 4238 put_net_conf(mdev->tconn);
b411b363
PR
4239 }
4240 }
4241
4242 drbd_disconnect(mdev);
4243
4244 dev_info(DEV, "receiver terminated\n");
4245 return 0;
4246}
4247
4248/* ********* acknowledge sender ******** */
4249
d8763023 4250static int got_RqSReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4251{
257d0af6 4252 struct p_req_state_reply *p = &mdev->tconn->meta.rbuf.req_state_reply;
b411b363
PR
4253
4254 int retcode = be32_to_cpu(p->retcode);
4255
4256 if (retcode >= SS_SUCCESS) {
4257 set_bit(CL_ST_CHG_SUCCESS, &mdev->flags);
4258 } else {
4259 set_bit(CL_ST_CHG_FAIL, &mdev->flags);
4260 dev_err(DEV, "Requested state change failed by peer: %s (%d)\n",
4261 drbd_set_st_err_str(retcode), retcode);
4262 }
4263 wake_up(&mdev->state_wait);
4264
81e84650 4265 return true;
b411b363
PR
4266}
4267
d8763023 4268static int got_Ping(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4269{
4270 return drbd_send_ping_ack(mdev);
4271
4272}
4273
d8763023 4274static int got_PingAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4275{
4276 /* restore idle timeout */
e42325a5 4277 mdev->tconn->meta.socket->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_int*HZ;
309d1608
PR
4278 if (!test_and_set_bit(GOT_PING_ACK, &mdev->flags))
4279 wake_up(&mdev->misc_wait);
b411b363 4280
81e84650 4281 return true;
b411b363
PR
4282}
4283
d8763023 4284static int got_IsInSync(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4285{
257d0af6 4286 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4287 sector_t sector = be64_to_cpu(p->sector);
4288 int blksize = be32_to_cpu(p->blksize);
4289
31890f4a 4290 D_ASSERT(mdev->tconn->agreed_pro_version >= 89);
b411b363
PR
4291
4292 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4293
1d53f09e
LE
4294 if (get_ldev(mdev)) {
4295 drbd_rs_complete_io(mdev, sector);
4296 drbd_set_in_sync(mdev, sector, blksize);
4297 /* rs_same_csums is supposed to count in units of BM_BLOCK_SIZE */
4298 mdev->rs_same_csum += (blksize >> BM_BLOCK_SHIFT);
4299 put_ldev(mdev);
4300 }
b411b363 4301 dec_rs_pending(mdev);
778f271d 4302 atomic_add(blksize >> 9, &mdev->rs_sect_in);
b411b363 4303
81e84650 4304 return true;
b411b363
PR
4305}
4306
bc9c5c41
AG
4307static int
4308validate_req_change_req_state(struct drbd_conf *mdev, u64 id, sector_t sector,
4309 struct rb_root *root, const char *func,
4310 enum drbd_req_event what, bool missing_ok)
b411b363
PR
4311{
4312 struct drbd_request *req;
4313 struct bio_and_error m;
4314
87eeee41 4315 spin_lock_irq(&mdev->tconn->req_lock);
bc9c5c41 4316 req = find_request(mdev, root, id, sector, missing_ok, func);
b411b363 4317 if (unlikely(!req)) {
87eeee41 4318 spin_unlock_irq(&mdev->tconn->req_lock);
81e84650 4319 return false;
b411b363
PR
4320 }
4321 __req_mod(req, what, &m);
87eeee41 4322 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
4323
4324 if (m.bio)
4325 complete_master_bio(mdev, &m);
81e84650 4326 return true;
b411b363
PR
4327}
4328
d8763023 4329static int got_BlockAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4330{
257d0af6 4331 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4332 sector_t sector = be64_to_cpu(p->sector);
4333 int blksize = be32_to_cpu(p->blksize);
4334 enum drbd_req_event what;
4335
4336 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4337
579b57ed 4338 if (p->block_id == ID_SYNCER) {
b411b363
PR
4339 drbd_set_in_sync(mdev, sector, blksize);
4340 dec_rs_pending(mdev);
81e84650 4341 return true;
b411b363 4342 }
257d0af6 4343 switch (cmd) {
b411b363 4344 case P_RS_WRITE_ACK:
89e58e75 4345 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4346 what = WRITE_ACKED_BY_PEER_AND_SIS;
b411b363
PR
4347 break;
4348 case P_WRITE_ACK:
89e58e75 4349 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4350 what = WRITE_ACKED_BY_PEER;
b411b363
PR
4351 break;
4352 case P_RECV_ACK:
89e58e75 4353 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_B);
8554df1c 4354 what = RECV_ACKED_BY_PEER;
b411b363
PR
4355 break;
4356 case P_DISCARD_ACK:
89e58e75 4357 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4358 what = CONFLICT_DISCARDED_BY_PEER;
b411b363
PR
4359 break;
4360 default:
4361 D_ASSERT(0);
81e84650 4362 return false;
b411b363
PR
4363 }
4364
4365 return validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41
AG
4366 &mdev->write_requests, __func__,
4367 what, false);
b411b363
PR
4368}
4369
d8763023 4370static int got_NegAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4371{
257d0af6 4372 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363 4373 sector_t sector = be64_to_cpu(p->sector);
2deb8336 4374 int size = be32_to_cpu(p->blksize);
89e58e75
PR
4375 bool missing_ok = mdev->tconn->net_conf->wire_protocol == DRBD_PROT_A ||
4376 mdev->tconn->net_conf->wire_protocol == DRBD_PROT_B;
c3afd8f5 4377 bool found;
b411b363
PR
4378
4379 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4380
579b57ed 4381 if (p->block_id == ID_SYNCER) {
b411b363
PR
4382 dec_rs_pending(mdev);
4383 drbd_rs_failed_io(mdev, sector, size);
81e84650 4384 return true;
b411b363 4385 }
2deb8336 4386
c3afd8f5 4387 found = validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41 4388 &mdev->write_requests, __func__,
8554df1c 4389 NEG_ACKED, missing_ok);
c3afd8f5
AG
4390 if (!found) {
4391 /* Protocol A has no P_WRITE_ACKs, but has P_NEG_ACKs.
4392 The master bio might already be completed, therefore the
4393 request is no longer in the collision hash. */
4394 /* In Protocol B we might already have got a P_RECV_ACK
4395 but then get a P_NEG_ACK afterwards. */
4396 if (!missing_ok)
2deb8336 4397 return false;
c3afd8f5 4398 drbd_set_out_of_sync(mdev, sector, size);
2deb8336 4399 }
2deb8336 4400 return true;
b411b363
PR
4401}
4402
d8763023 4403static int got_NegDReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4404{
257d0af6 4405 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4406 sector_t sector = be64_to_cpu(p->sector);
4407
4408 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4409 dev_err(DEV, "Got NegDReply; Sector %llus, len %u; Fail original request.\n",
4410 (unsigned long long)sector, be32_to_cpu(p->blksize));
4411
4412 return validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41 4413 &mdev->read_requests, __func__,
8554df1c 4414 NEG_ACKED, false);
b411b363
PR
4415}
4416
d8763023 4417static int got_NegRSDReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4418{
4419 sector_t sector;
4420 int size;
257d0af6 4421 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4422
4423 sector = be64_to_cpu(p->sector);
4424 size = be32_to_cpu(p->blksize);
b411b363
PR
4425
4426 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4427
4428 dec_rs_pending(mdev);
4429
4430 if (get_ldev_if_state(mdev, D_FAILED)) {
4431 drbd_rs_complete_io(mdev, sector);
257d0af6 4432 switch (cmd) {
d612d309
PR
4433 case P_NEG_RS_DREPLY:
4434 drbd_rs_failed_io(mdev, sector, size);
4435 case P_RS_CANCEL:
4436 break;
4437 default:
4438 D_ASSERT(0);
4439 put_ldev(mdev);
4440 return false;
4441 }
b411b363
PR
4442 put_ldev(mdev);
4443 }
4444
81e84650 4445 return true;
b411b363
PR
4446}
4447
d8763023 4448static int got_BarrierAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4449{
257d0af6 4450 struct p_barrier_ack *p = &mdev->tconn->meta.rbuf.barrier_ack;
b411b363
PR
4451
4452 tl_release(mdev, p->barrier, be32_to_cpu(p->set_size));
4453
c4752ef1
PR
4454 if (mdev->state.conn == C_AHEAD &&
4455 atomic_read(&mdev->ap_in_flight) == 0 &&
370a43e7
PR
4456 !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->current_epoch->flags)) {
4457 mdev->start_resync_timer.expires = jiffies + HZ;
4458 add_timer(&mdev->start_resync_timer);
c4752ef1
PR
4459 }
4460
81e84650 4461 return true;
b411b363
PR
4462}
4463
d8763023 4464static int got_OVResult(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4465{
257d0af6 4466 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4467 struct drbd_work *w;
4468 sector_t sector;
4469 int size;
4470
4471 sector = be64_to_cpu(p->sector);
4472 size = be32_to_cpu(p->blksize);
4473
4474 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4475
4476 if (be64_to_cpu(p->block_id) == ID_OUT_OF_SYNC)
4477 drbd_ov_oos_found(mdev, sector, size);
4478 else
4479 ov_oos_print(mdev);
4480
1d53f09e 4481 if (!get_ldev(mdev))
81e84650 4482 return true;
1d53f09e 4483
b411b363
PR
4484 drbd_rs_complete_io(mdev, sector);
4485 dec_rs_pending(mdev);
4486
ea5442af
LE
4487 --mdev->ov_left;
4488
4489 /* let's advance progress step marks only for every other megabyte */
4490 if ((mdev->ov_left & 0x200) == 0x200)
4491 drbd_advance_rs_marks(mdev, mdev->ov_left);
4492
4493 if (mdev->ov_left == 0) {
b411b363
PR
4494 w = kmalloc(sizeof(*w), GFP_NOIO);
4495 if (w) {
4496 w->cb = w_ov_finished;
e42325a5 4497 drbd_queue_work_front(&mdev->tconn->data.work, w);
b411b363
PR
4498 } else {
4499 dev_err(DEV, "kmalloc(w) failed.");
4500 ov_oos_print(mdev);
4501 drbd_resync_finished(mdev);
4502 }
4503 }
1d53f09e 4504 put_ldev(mdev);
81e84650 4505 return true;
b411b363
PR
4506}
4507
d8763023 4508static int got_skip(struct drbd_conf *mdev, enum drbd_packet cmd)
0ced55a3 4509{
81e84650 4510 return true;
0ced55a3
PR
4511}
4512
b411b363
PR
4513struct asender_cmd {
4514 size_t pkt_size;
d8763023 4515 int (*process)(struct drbd_conf *mdev, enum drbd_packet cmd);
b411b363
PR
4516};
4517
4518static struct asender_cmd *get_asender_cmd(int cmd)
4519{
4520 static struct asender_cmd asender_tbl[] = {
4521 /* anything missing from this table is in
4522 * the drbd_cmd_handler (drbd_default_handler) table,
4523 * see the beginning of drbdd() */
257d0af6
PR
4524 [P_PING] = { sizeof(struct p_header), got_Ping },
4525 [P_PING_ACK] = { sizeof(struct p_header), got_PingAck },
b411b363
PR
4526 [P_RECV_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4527 [P_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4528 [P_RS_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4529 [P_DISCARD_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4530 [P_NEG_ACK] = { sizeof(struct p_block_ack), got_NegAck },
4531 [P_NEG_DREPLY] = { sizeof(struct p_block_ack), got_NegDReply },
4532 [P_NEG_RS_DREPLY] = { sizeof(struct p_block_ack), got_NegRSDReply},
4533 [P_OV_RESULT] = { sizeof(struct p_block_ack), got_OVResult },
4534 [P_BARRIER_ACK] = { sizeof(struct p_barrier_ack), got_BarrierAck },
4535 [P_STATE_CHG_REPLY] = { sizeof(struct p_req_state_reply), got_RqSReply },
4536 [P_RS_IS_IN_SYNC] = { sizeof(struct p_block_ack), got_IsInSync },
02918be2 4537 [P_DELAY_PROBE] = { sizeof(struct p_delay_probe93), got_skip },
d612d309 4538 [P_RS_CANCEL] = { sizeof(struct p_block_ack), got_NegRSDReply},
b411b363
PR
4539 [P_MAX_CMD] = { 0, NULL },
4540 };
4541 if (cmd > P_MAX_CMD || asender_tbl[cmd].process == NULL)
4542 return NULL;
4543 return &asender_tbl[cmd];
4544}
4545
4546int drbd_asender(struct drbd_thread *thi)
4547{
4548 struct drbd_conf *mdev = thi->mdev;
257d0af6 4549 struct p_header *h = &mdev->tconn->meta.rbuf.header;
b411b363
PR
4550 struct asender_cmd *cmd = NULL;
4551
257d0af6 4552 int rv;
b411b363
PR
4553 void *buf = h;
4554 int received = 0;
257d0af6 4555 int expect = sizeof(struct p_header);
f36af18c 4556 int ping_timeout_active = 0;
257d0af6 4557 int empty, pkt_size;
d8763023 4558 enum drbd_packet cmd_nr;
b411b363
PR
4559
4560 sprintf(current->comm, "drbd%d_asender", mdev_to_minor(mdev));
4561
4562 current->policy = SCHED_RR; /* Make this a realtime task! */
4563 current->rt_priority = 2; /* more important than all other tasks */
4564
e77a0a5c 4565 while (get_t_state(thi) == RUNNING) {
bc31fe33 4566 drbd_thread_current_set_cpu(mdev, thi);
e43ef195 4567 if (test_and_clear_bit(SEND_PING, &mdev->tconn->flags)) {
841ce241
AG
4568 if (!drbd_send_ping(mdev)) {
4569 dev_err(DEV, "drbd_send_ping has failed\n");
4570 goto reconnect;
4571 }
e42325a5 4572 mdev->tconn->meta.socket->sk->sk_rcvtimeo =
89e58e75 4573 mdev->tconn->net_conf->ping_timeo*HZ/10;
f36af18c 4574 ping_timeout_active = 1;
b411b363
PR
4575 }
4576
4577 /* conditionally cork;
4578 * it may hurt latency if we cork without much to send */
89e58e75 4579 if (!mdev->tconn->net_conf->no_cork &&
b411b363 4580 3 < atomic_read(&mdev->unacked_cnt))
e42325a5 4581 drbd_tcp_cork(mdev->tconn->meta.socket);
b411b363
PR
4582 while (1) {
4583 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4584 flush_signals(current);
0f8488e1 4585 if (!drbd_process_done_ee(mdev))
b411b363 4586 goto reconnect;
b411b363
PR
4587 /* to avoid race with newly queued ACKs */
4588 set_bit(SIGNAL_ASENDER, &mdev->flags);
87eeee41 4589 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 4590 empty = list_empty(&mdev->done_ee);
87eeee41 4591 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
4592 /* new ack may have been queued right here,
4593 * but then there is also a signal pending,
4594 * and we start over... */
4595 if (empty)
4596 break;
4597 }
4598 /* but unconditionally uncork unless disabled */
89e58e75 4599 if (!mdev->tconn->net_conf->no_cork)
e42325a5 4600 drbd_tcp_uncork(mdev->tconn->meta.socket);
b411b363
PR
4601
4602 /* short circuit, recv_msg would return EINTR anyways. */
4603 if (signal_pending(current))
4604 continue;
4605
e42325a5 4606 rv = drbd_recv_short(mdev, mdev->tconn->meta.socket,
b411b363
PR
4607 buf, expect-received, 0);
4608 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4609
4610 flush_signals(current);
4611
4612 /* Note:
4613 * -EINTR (on meta) we got a signal
4614 * -EAGAIN (on meta) rcvtimeo expired
4615 * -ECONNRESET other side closed the connection
4616 * -ERESTARTSYS (on data) we got a signal
4617 * rv < 0 other than above: unexpected error!
4618 * rv == expected: full header or command
4619 * rv < expected: "woken" by signal during receive
4620 * rv == 0 : "connection shut down by peer"
4621 */
4622 if (likely(rv > 0)) {
4623 received += rv;
4624 buf += rv;
4625 } else if (rv == 0) {
4626 dev_err(DEV, "meta connection shut down by peer.\n");
4627 goto reconnect;
4628 } else if (rv == -EAGAIN) {
cb6518cb
LE
4629 /* If the data socket received something meanwhile,
4630 * that is good enough: peer is still alive. */
31890f4a 4631 if (time_after(mdev->tconn->last_received,
e42325a5 4632 jiffies - mdev->tconn->meta.socket->sk->sk_rcvtimeo))
cb6518cb 4633 continue;
f36af18c 4634 if (ping_timeout_active) {
b411b363
PR
4635 dev_err(DEV, "PingAck did not arrive in time.\n");
4636 goto reconnect;
4637 }
e43ef195 4638 set_bit(SEND_PING, &mdev->tconn->flags);
b411b363
PR
4639 continue;
4640 } else if (rv == -EINTR) {
4641 continue;
4642 } else {
4643 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
4644 goto reconnect;
4645 }
4646
4647 if (received == expect && cmd == NULL) {
257d0af6 4648 if (!decode_header(mdev, h, &cmd_nr, &pkt_size))
b411b363 4649 goto reconnect;
257d0af6 4650 cmd = get_asender_cmd(cmd_nr);
b411b363 4651 if (unlikely(cmd == NULL)) {
257d0af6
PR
4652 dev_err(DEV, "unknown command %d on meta (l: %d)\n",
4653 cmd_nr, pkt_size);
b411b363
PR
4654 goto disconnect;
4655 }
4656 expect = cmd->pkt_size;
257d0af6
PR
4657 if (pkt_size != expect - sizeof(struct p_header)) {
4658 dev_err(DEV, "Wrong packet size on meta (c: %d, l: %d)\n",
4659 cmd_nr, pkt_size);
b411b363 4660 goto reconnect;
257d0af6 4661 }
b411b363
PR
4662 }
4663 if (received == expect) {
31890f4a 4664 mdev->tconn->last_received = jiffies;
b411b363 4665 D_ASSERT(cmd != NULL);
257d0af6 4666 if (!cmd->process(mdev, cmd_nr))
b411b363
PR
4667 goto reconnect;
4668
f36af18c
LE
4669 /* the idle_timeout (ping-int)
4670 * has been restored in got_PingAck() */
4671 if (cmd == get_asender_cmd(P_PING_ACK))
4672 ping_timeout_active = 0;
4673
b411b363
PR
4674 buf = h;
4675 received = 0;
257d0af6 4676 expect = sizeof(struct p_header);
b411b363
PR
4677 cmd = NULL;
4678 }
4679 }
4680
4681 if (0) {
4682reconnect:
4683 drbd_force_state(mdev, NS(conn, C_NETWORK_FAILURE));
856c50c7 4684 drbd_md_sync(mdev);
b411b363
PR
4685 }
4686 if (0) {
4687disconnect:
4688 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
856c50c7 4689 drbd_md_sync(mdev);
b411b363
PR
4690 }
4691 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4692
4693 D_ASSERT(mdev->state.conn < C_CONNECTED);
4694 dev_info(DEV, "asender terminated\n");
4695
4696 return 0;
4697}