]> bbs.cooldavid.org Git - net-next-2.6.git/blame - drivers/block/drbd/drbd_nl.c
block: Consolidate phys_segment and hw_segment limits
[net-next-2.6.git] / drivers / block / drbd / drbd_nl.c
CommitLineData
b411b363
PR
1/*
2 drbd_nl.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23
24 */
25
b411b363
PR
26#include <linux/module.h>
27#include <linux/drbd.h>
28#include <linux/in.h>
29#include <linux/fs.h>
30#include <linux/file.h>
31#include <linux/slab.h>
32#include <linux/connector.h>
33#include <linux/blkpg.h>
34#include <linux/cpumask.h>
35#include "drbd_int.h"
b411b363
PR
36#include "drbd_wrappers.h"
37#include <asm/unaligned.h>
38#include <linux/drbd_tag_magic.h>
39#include <linux/drbd_limits.h>
40
41static unsigned short *tl_add_blob(unsigned short *, enum drbd_tags, const void *, int);
42static unsigned short *tl_add_str(unsigned short *, enum drbd_tags, const char *);
43static unsigned short *tl_add_int(unsigned short *, enum drbd_tags, const void *);
44
45/* see get_sb_bdev and bd_claim */
46static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
47
48/* Generate the tag_list to struct functions */
49#define NL_PACKET(name, number, fields) \
50static int name ## _from_tags(struct drbd_conf *mdev, \
51 unsigned short *tags, struct name *arg) __attribute__ ((unused)); \
52static int name ## _from_tags(struct drbd_conf *mdev, \
53 unsigned short *tags, struct name *arg) \
54{ \
55 int tag; \
56 int dlen; \
57 \
58 while ((tag = get_unaligned(tags++)) != TT_END) { \
59 dlen = get_unaligned(tags++); \
60 switch (tag_number(tag)) { \
61 fields \
62 default: \
63 if (tag & T_MANDATORY) { \
64 dev_err(DEV, "Unknown tag: %d\n", tag_number(tag)); \
65 return 0; \
66 } \
67 } \
68 tags = (unsigned short *)((char *)tags + dlen); \
69 } \
70 return 1; \
71}
72#define NL_INTEGER(pn, pr, member) \
73 case pn: /* D_ASSERT( tag_type(tag) == TT_INTEGER ); */ \
74 arg->member = get_unaligned((int *)(tags)); \
75 break;
76#define NL_INT64(pn, pr, member) \
77 case pn: /* D_ASSERT( tag_type(tag) == TT_INT64 ); */ \
78 arg->member = get_unaligned((u64 *)(tags)); \
79 break;
80#define NL_BIT(pn, pr, member) \
81 case pn: /* D_ASSERT( tag_type(tag) == TT_BIT ); */ \
82 arg->member = *(char *)(tags) ? 1 : 0; \
83 break;
84#define NL_STRING(pn, pr, member, len) \
85 case pn: /* D_ASSERT( tag_type(tag) == TT_STRING ); */ \
86 if (dlen > len) { \
87 dev_err(DEV, "arg too long: %s (%u wanted, max len: %u bytes)\n", \
88 #member, dlen, (unsigned int)len); \
89 return 0; \
90 } \
91 arg->member ## _len = dlen; \
92 memcpy(arg->member, tags, min_t(size_t, dlen, len)); \
93 break;
94#include "linux/drbd_nl.h"
95
96/* Generate the struct to tag_list functions */
97#define NL_PACKET(name, number, fields) \
98static unsigned short* \
99name ## _to_tags(struct drbd_conf *mdev, \
100 struct name *arg, unsigned short *tags) __attribute__ ((unused)); \
101static unsigned short* \
102name ## _to_tags(struct drbd_conf *mdev, \
103 struct name *arg, unsigned short *tags) \
104{ \
105 fields \
106 return tags; \
107}
108
109#define NL_INTEGER(pn, pr, member) \
110 put_unaligned(pn | pr | TT_INTEGER, tags++); \
111 put_unaligned(sizeof(int), tags++); \
112 put_unaligned(arg->member, (int *)tags); \
113 tags = (unsigned short *)((char *)tags+sizeof(int));
114#define NL_INT64(pn, pr, member) \
115 put_unaligned(pn | pr | TT_INT64, tags++); \
116 put_unaligned(sizeof(u64), tags++); \
117 put_unaligned(arg->member, (u64 *)tags); \
118 tags = (unsigned short *)((char *)tags+sizeof(u64));
119#define NL_BIT(pn, pr, member) \
120 put_unaligned(pn | pr | TT_BIT, tags++); \
121 put_unaligned(sizeof(char), tags++); \
122 *(char *)tags = arg->member; \
123 tags = (unsigned short *)((char *)tags+sizeof(char));
124#define NL_STRING(pn, pr, member, len) \
125 put_unaligned(pn | pr | TT_STRING, tags++); \
126 put_unaligned(arg->member ## _len, tags++); \
127 memcpy(tags, arg->member, arg->member ## _len); \
128 tags = (unsigned short *)((char *)tags + arg->member ## _len);
129#include "linux/drbd_nl.h"
130
131void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name);
132void drbd_nl_send_reply(struct cn_msg *, int);
133
134int drbd_khelper(struct drbd_conf *mdev, char *cmd)
135{
136 char *envp[] = { "HOME=/",
137 "TERM=linux",
138 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
139 NULL, /* Will be set to address family */
140 NULL, /* Will be set to address */
141 NULL };
142
143 char mb[12], af[20], ad[60], *afs;
144 char *argv[] = {usermode_helper, cmd, mb, NULL };
145 int ret;
146
147 snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
148
149 if (get_net_conf(mdev)) {
150 switch (((struct sockaddr *)mdev->net_conf->peer_addr)->sa_family) {
151 case AF_INET6:
152 afs = "ipv6";
153 snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI6",
154 &((struct sockaddr_in6 *)mdev->net_conf->peer_addr)->sin6_addr);
155 break;
156 case AF_INET:
157 afs = "ipv4";
158 snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
159 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
160 break;
161 default:
162 afs = "ssocks";
163 snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
164 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
165 }
166 snprintf(af, 20, "DRBD_PEER_AF=%s", afs);
167 envp[3]=af;
168 envp[4]=ad;
169 put_net_conf(mdev);
170 }
171
172 dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
173
174 drbd_bcast_ev_helper(mdev, cmd);
175 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
176 if (ret)
177 dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
178 usermode_helper, cmd, mb,
179 (ret >> 8) & 0xff, ret);
180 else
181 dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
182 usermode_helper, cmd, mb,
183 (ret >> 8) & 0xff, ret);
184
185 if (ret < 0) /* Ignore any ERRNOs we got. */
186 ret = 0;
187
188 return ret;
189}
190
191enum drbd_disk_state drbd_try_outdate_peer(struct drbd_conf *mdev)
192{
193 char *ex_to_string;
194 int r;
195 enum drbd_disk_state nps;
196 enum drbd_fencing_p fp;
197
198 D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
199
200 if (get_ldev_if_state(mdev, D_CONSISTENT)) {
201 fp = mdev->ldev->dc.fencing;
202 put_ldev(mdev);
203 } else {
204 dev_warn(DEV, "Not fencing peer, I'm not even Consistent myself.\n");
205 return mdev->state.pdsk;
206 }
207
208 if (fp == FP_STONITH)
209 _drbd_request_state(mdev, NS(susp, 1), CS_WAIT_COMPLETE);
210
211 r = drbd_khelper(mdev, "fence-peer");
212
213 switch ((r>>8) & 0xff) {
214 case 3: /* peer is inconsistent */
215 ex_to_string = "peer is inconsistent or worse";
216 nps = D_INCONSISTENT;
217 break;
218 case 4: /* peer got outdated, or was already outdated */
219 ex_to_string = "peer was fenced";
220 nps = D_OUTDATED;
221 break;
222 case 5: /* peer was down */
223 if (mdev->state.disk == D_UP_TO_DATE) {
224 /* we will(have) create(d) a new UUID anyways... */
225 ex_to_string = "peer is unreachable, assumed to be dead";
226 nps = D_OUTDATED;
227 } else {
228 ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
229 nps = mdev->state.pdsk;
230 }
231 break;
232 case 6: /* Peer is primary, voluntarily outdate myself.
233 * This is useful when an unconnected R_SECONDARY is asked to
234 * become R_PRIMARY, but finds the other peer being active. */
235 ex_to_string = "peer is active";
236 dev_warn(DEV, "Peer is primary, outdating myself.\n");
237 nps = D_UNKNOWN;
238 _drbd_request_state(mdev, NS(disk, D_OUTDATED), CS_WAIT_COMPLETE);
239 break;
240 case 7:
241 if (fp != FP_STONITH)
242 dev_err(DEV, "fence-peer() = 7 && fencing != Stonith !!!\n");
243 ex_to_string = "peer was stonithed";
244 nps = D_OUTDATED;
245 break;
246 default:
247 /* The script is broken ... */
248 nps = D_UNKNOWN;
249 dev_err(DEV, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
250 return nps;
251 }
252
253 dev_info(DEV, "fence-peer helper returned %d (%s)\n",
254 (r>>8) & 0xff, ex_to_string);
255 return nps;
256}
257
258
259int drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
260{
261 const int max_tries = 4;
262 int r = 0;
263 int try = 0;
264 int forced = 0;
265 union drbd_state mask, val;
266 enum drbd_disk_state nps;
267
268 if (new_role == R_PRIMARY)
269 request_ping(mdev); /* Detect a dead peer ASAP */
270
271 mutex_lock(&mdev->state_mutex);
272
273 mask.i = 0; mask.role = R_MASK;
274 val.i = 0; val.role = new_role;
275
276 while (try++ < max_tries) {
277 r = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
278
279 /* in case we first succeeded to outdate,
280 * but now suddenly could establish a connection */
281 if (r == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
282 val.pdsk = 0;
283 mask.pdsk = 0;
284 continue;
285 }
286
287 if (r == SS_NO_UP_TO_DATE_DISK && force &&
288 (mdev->state.disk == D_INCONSISTENT ||
289 mdev->state.disk == D_OUTDATED)) {
290 mask.disk = D_MASK;
291 val.disk = D_UP_TO_DATE;
292 forced = 1;
293 continue;
294 }
295
296 if (r == SS_NO_UP_TO_DATE_DISK &&
297 mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
298 D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
299 nps = drbd_try_outdate_peer(mdev);
300
301 if (nps == D_OUTDATED || nps == D_INCONSISTENT) {
302 val.disk = D_UP_TO_DATE;
303 mask.disk = D_MASK;
304 }
305
306 val.pdsk = nps;
307 mask.pdsk = D_MASK;
308
309 continue;
310 }
311
312 if (r == SS_NOTHING_TO_DO)
313 goto fail;
314 if (r == SS_PRIMARY_NOP && mask.pdsk == 0) {
315 nps = drbd_try_outdate_peer(mdev);
316
317 if (force && nps > D_OUTDATED) {
318 dev_warn(DEV, "Forced into split brain situation!\n");
319 nps = D_OUTDATED;
320 }
321
322 mask.pdsk = D_MASK;
323 val.pdsk = nps;
324
325 continue;
326 }
327 if (r == SS_TWO_PRIMARIES) {
328 /* Maybe the peer is detected as dead very soon...
329 retry at most once more in this case. */
330 __set_current_state(TASK_INTERRUPTIBLE);
331 schedule_timeout((mdev->net_conf->ping_timeo+1)*HZ/10);
332 if (try < max_tries)
333 try = max_tries - 1;
334 continue;
335 }
336 if (r < SS_SUCCESS) {
337 r = _drbd_request_state(mdev, mask, val,
338 CS_VERBOSE + CS_WAIT_COMPLETE);
339 if (r < SS_SUCCESS)
340 goto fail;
341 }
342 break;
343 }
344
345 if (r < SS_SUCCESS)
346 goto fail;
347
348 if (forced)
349 dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
350
351 /* Wait until nothing is on the fly :) */
352 wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
353
354 if (new_role == R_SECONDARY) {
355 set_disk_ro(mdev->vdisk, TRUE);
356 if (get_ldev(mdev)) {
357 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
358 put_ldev(mdev);
359 }
360 } else {
361 if (get_net_conf(mdev)) {
362 mdev->net_conf->want_lose = 0;
363 put_net_conf(mdev);
364 }
365 set_disk_ro(mdev->vdisk, FALSE);
366 if (get_ldev(mdev)) {
367 if (((mdev->state.conn < C_CONNECTED ||
368 mdev->state.pdsk <= D_FAILED)
369 && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
370 drbd_uuid_new_current(mdev);
371
372 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
373 put_ldev(mdev);
374 }
375 }
376
377 if ((new_role == R_SECONDARY) && get_ldev(mdev)) {
378 drbd_al_to_on_disk_bm(mdev);
379 put_ldev(mdev);
380 }
381
382 if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
383 /* if this was forced, we should consider sync */
384 if (forced)
385 drbd_send_uuids(mdev);
386 drbd_send_state(mdev);
387 }
388
389 drbd_md_sync(mdev);
390
391 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
392 fail:
393 mutex_unlock(&mdev->state_mutex);
394 return r;
395}
396
397
398static int drbd_nl_primary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
399 struct drbd_nl_cfg_reply *reply)
400{
401 struct primary primary_args;
402
403 memset(&primary_args, 0, sizeof(struct primary));
404 if (!primary_from_tags(mdev, nlp->tag_list, &primary_args)) {
405 reply->ret_code = ERR_MANDATORY_TAG;
406 return 0;
407 }
408
409 reply->ret_code =
410 drbd_set_role(mdev, R_PRIMARY, primary_args.overwrite_peer);
411
412 return 0;
413}
414
415static int drbd_nl_secondary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
416 struct drbd_nl_cfg_reply *reply)
417{
418 reply->ret_code = drbd_set_role(mdev, R_SECONDARY, 0);
419
420 return 0;
421}
422
423/* initializes the md.*_offset members, so we are able to find
424 * the on disk meta data */
425static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
426 struct drbd_backing_dev *bdev)
427{
428 sector_t md_size_sect = 0;
429 switch (bdev->dc.meta_dev_idx) {
430 default:
431 /* v07 style fixed size indexed meta data */
432 bdev->md.md_size_sect = MD_RESERVED_SECT;
433 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
434 bdev->md.al_offset = MD_AL_OFFSET;
435 bdev->md.bm_offset = MD_BM_OFFSET;
436 break;
437 case DRBD_MD_INDEX_FLEX_EXT:
438 /* just occupy the full device; unit: sectors */
439 bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
440 bdev->md.md_offset = 0;
441 bdev->md.al_offset = MD_AL_OFFSET;
442 bdev->md.bm_offset = MD_BM_OFFSET;
443 break;
444 case DRBD_MD_INDEX_INTERNAL:
445 case DRBD_MD_INDEX_FLEX_INT:
446 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
447 /* al size is still fixed */
448 bdev->md.al_offset = -MD_AL_MAX_SIZE;
449 /* we need (slightly less than) ~ this much bitmap sectors: */
450 md_size_sect = drbd_get_capacity(bdev->backing_bdev);
451 md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
452 md_size_sect = BM_SECT_TO_EXT(md_size_sect);
453 md_size_sect = ALIGN(md_size_sect, 8);
454
455 /* plus the "drbd meta data super block",
456 * and the activity log; */
457 md_size_sect += MD_BM_OFFSET;
458
459 bdev->md.md_size_sect = md_size_sect;
460 /* bitmap offset is adjusted by 'super' block size */
461 bdev->md.bm_offset = -md_size_sect + MD_AL_OFFSET;
462 break;
463 }
464}
465
466char *ppsize(char *buf, unsigned long long size)
467{
468 /* Needs 9 bytes at max. */
469 static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
470 int base = 0;
471 while (size >= 10000) {
472 /* shift + round */
473 size = (size >> 10) + !!(size & (1<<9));
474 base++;
475 }
476 sprintf(buf, "%lu %cB", (long)size, units[base]);
477
478 return buf;
479}
480
481/* there is still a theoretical deadlock when called from receiver
482 * on an D_INCONSISTENT R_PRIMARY:
483 * remote READ does inc_ap_bio, receiver would need to receive answer
484 * packet from remote to dec_ap_bio again.
485 * receiver receive_sizes(), comes here,
486 * waits for ap_bio_cnt == 0. -> deadlock.
487 * but this cannot happen, actually, because:
488 * R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
489 * (not connected, or bad/no disk on peer):
490 * see drbd_fail_request_early, ap_bio_cnt is zero.
491 * R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
492 * peer may not initiate a resize.
493 */
494void drbd_suspend_io(struct drbd_conf *mdev)
495{
496 set_bit(SUSPEND_IO, &mdev->flags);
497 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
498}
499
500void drbd_resume_io(struct drbd_conf *mdev)
501{
502 clear_bit(SUSPEND_IO, &mdev->flags);
503 wake_up(&mdev->misc_wait);
504}
505
506/**
507 * drbd_determine_dev_size() - Sets the right device size obeying all constraints
508 * @mdev: DRBD device.
509 *
510 * Returns 0 on success, negative return values indicate errors.
511 * You should call drbd_md_sync() after calling this function.
512 */
a393db6f 513enum determine_dev_size drbd_determin_dev_size(struct drbd_conf *mdev, int force) __must_hold(local)
b411b363
PR
514{
515 sector_t prev_first_sect, prev_size; /* previous meta location */
516 sector_t la_size;
517 sector_t size;
518 char ppb[10];
519
520 int md_moved, la_size_changed;
521 enum determine_dev_size rv = unchanged;
522
523 /* race:
524 * application request passes inc_ap_bio,
525 * but then cannot get an AL-reference.
526 * this function later may wait on ap_bio_cnt == 0. -> deadlock.
527 *
528 * to avoid that:
529 * Suspend IO right here.
530 * still lock the act_log to not trigger ASSERTs there.
531 */
532 drbd_suspend_io(mdev);
533
534 /* no wait necessary anymore, actually we could assert that */
535 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
536
537 prev_first_sect = drbd_md_first_sector(mdev->ldev);
538 prev_size = mdev->ldev->md.md_size_sect;
539 la_size = mdev->ldev->md.la_size_sect;
540
541 /* TODO: should only be some assert here, not (re)init... */
542 drbd_md_set_sector_offsets(mdev, mdev->ldev);
543
a393db6f 544 size = drbd_new_dev_size(mdev, mdev->ldev, force);
b411b363
PR
545
546 if (drbd_get_capacity(mdev->this_bdev) != size ||
547 drbd_bm_capacity(mdev) != size) {
548 int err;
549 err = drbd_bm_resize(mdev, size);
550 if (unlikely(err)) {
551 /* currently there is only one error: ENOMEM! */
552 size = drbd_bm_capacity(mdev)>>1;
553 if (size == 0) {
554 dev_err(DEV, "OUT OF MEMORY! "
555 "Could not allocate bitmap!\n");
556 } else {
557 dev_err(DEV, "BM resizing failed. "
558 "Leaving size unchanged at size = %lu KB\n",
559 (unsigned long)size);
560 }
561 rv = dev_size_error;
562 }
563 /* racy, see comments above. */
564 drbd_set_my_capacity(mdev, size);
565 mdev->ldev->md.la_size_sect = size;
566 dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
567 (unsigned long long)size>>1);
568 }
569 if (rv == dev_size_error)
570 goto out;
571
572 la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
573
574 md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
575 || prev_size != mdev->ldev->md.md_size_sect;
576
577 if (la_size_changed || md_moved) {
578 drbd_al_shrink(mdev); /* All extents inactive. */
579 dev_info(DEV, "Writing the whole bitmap, %s\n",
580 la_size_changed && md_moved ? "size changed and md moved" :
581 la_size_changed ? "size changed" : "md moved");
582 rv = drbd_bitmap_io(mdev, &drbd_bm_write, "size changed"); /* does drbd_resume_io() ! */
583 drbd_md_mark_dirty(mdev);
584 }
585
586 if (size > la_size)
587 rv = grew;
588 if (size < la_size)
589 rv = shrunk;
590out:
591 lc_unlock(mdev->act_log);
592 wake_up(&mdev->al_wait);
593 drbd_resume_io(mdev);
594
595 return rv;
596}
597
598sector_t
a393db6f 599drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev, int assume_peer_has_space)
b411b363
PR
600{
601 sector_t p_size = mdev->p_size; /* partner's disk size. */
602 sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
603 sector_t m_size; /* my size */
604 sector_t u_size = bdev->dc.disk_size; /* size requested by user. */
605 sector_t size = 0;
606
607 m_size = drbd_get_max_capacity(bdev);
608
a393db6f
PR
609 if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
610 dev_warn(DEV, "Resize while not connected was forced by the user!\n");
611 p_size = m_size;
612 }
613
b411b363
PR
614 if (p_size && m_size) {
615 size = min_t(sector_t, p_size, m_size);
616 } else {
617 if (la_size) {
618 size = la_size;
619 if (m_size && m_size < size)
620 size = m_size;
621 if (p_size && p_size < size)
622 size = p_size;
623 } else {
624 if (m_size)
625 size = m_size;
626 if (p_size)
627 size = p_size;
628 }
629 }
630
631 if (size == 0)
632 dev_err(DEV, "Both nodes diskless!\n");
633
634 if (u_size) {
635 if (u_size > size)
636 dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
637 (unsigned long)u_size>>1, (unsigned long)size>>1);
638 else
639 size = u_size;
640 }
641
642 return size;
643}
644
645/**
646 * drbd_check_al_size() - Ensures that the AL is of the right size
647 * @mdev: DRBD device.
648 *
649 * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
650 * failed, and 0 on success. You should call drbd_md_sync() after you called
651 * this function.
652 */
653static int drbd_check_al_size(struct drbd_conf *mdev)
654{
655 struct lru_cache *n, *t;
656 struct lc_element *e;
657 unsigned int in_use;
658 int i;
659
660 ERR_IF(mdev->sync_conf.al_extents < 7)
661 mdev->sync_conf.al_extents = 127;
662
663 if (mdev->act_log &&
664 mdev->act_log->nr_elements == mdev->sync_conf.al_extents)
665 return 0;
666
667 in_use = 0;
668 t = mdev->act_log;
669 n = lc_create("act_log", drbd_al_ext_cache,
670 mdev->sync_conf.al_extents, sizeof(struct lc_element), 0);
671
672 if (n == NULL) {
673 dev_err(DEV, "Cannot allocate act_log lru!\n");
674 return -ENOMEM;
675 }
676 spin_lock_irq(&mdev->al_lock);
677 if (t) {
678 for (i = 0; i < t->nr_elements; i++) {
679 e = lc_element_by_index(t, i);
680 if (e->refcnt)
681 dev_err(DEV, "refcnt(%d)==%d\n",
682 e->lc_number, e->refcnt);
683 in_use += e->refcnt;
684 }
685 }
686 if (!in_use)
687 mdev->act_log = n;
688 spin_unlock_irq(&mdev->al_lock);
689 if (in_use) {
690 dev_err(DEV, "Activity log still in use!\n");
691 lc_destroy(n);
692 return -EBUSY;
693 } else {
694 if (t)
695 lc_destroy(t);
696 }
697 drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
698 return 0;
699}
700
701void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_seg_s) __must_hold(local)
702{
703 struct request_queue * const q = mdev->rq_queue;
704 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
705 int max_segments = mdev->ldev->dc.max_bio_bvecs;
706
707 if (b->merge_bvec_fn && !mdev->ldev->dc.use_bmbv)
708 max_seg_s = PAGE_SIZE;
709
710 max_seg_s = min(queue_max_sectors(b) * queue_logical_block_size(b), max_seg_s);
711
086fa5ff 712 blk_queue_max_hw_sectors(q, max_seg_s >> 9);
8a78362c 713 blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
b411b363
PR
714 blk_queue_max_segment_size(q, max_seg_s);
715 blk_queue_logical_block_size(q, 512);
716 blk_queue_segment_boundary(q, PAGE_SIZE-1);
717 blk_stack_limits(&q->limits, &b->limits, 0);
718
719 if (b->merge_bvec_fn)
720 dev_warn(DEV, "Backing device's merge_bvec_fn() = %p\n",
721 b->merge_bvec_fn);
722 dev_info(DEV, "max_segment_size ( = BIO size ) = %u\n", queue_max_segment_size(q));
723
724 if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
725 dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
726 q->backing_dev_info.ra_pages,
727 b->backing_dev_info.ra_pages);
728 q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
729 }
730}
731
732/* serialize deconfig (worker exiting, doing cleanup)
733 * and reconfig (drbdsetup disk, drbdsetup net)
734 *
735 * wait for a potentially exiting worker, then restart it,
736 * or start a new one.
737 */
738static void drbd_reconfig_start(struct drbd_conf *mdev)
739{
6c6c7951 740 wait_event(mdev->state_wait, !test_and_set_bit(CONFIG_PENDING, &mdev->flags));
b411b363
PR
741 wait_event(mdev->state_wait, !test_bit(DEVICE_DYING, &mdev->flags));
742 drbd_thread_start(&mdev->worker);
743}
744
745/* if still unconfigured, stops worker again.
746 * if configured now, clears CONFIG_PENDING.
747 * wakes potential waiters */
748static void drbd_reconfig_done(struct drbd_conf *mdev)
749{
750 spin_lock_irq(&mdev->req_lock);
751 if (mdev->state.disk == D_DISKLESS &&
752 mdev->state.conn == C_STANDALONE &&
753 mdev->state.role == R_SECONDARY) {
754 set_bit(DEVICE_DYING, &mdev->flags);
755 drbd_thread_stop_nowait(&mdev->worker);
756 } else
757 clear_bit(CONFIG_PENDING, &mdev->flags);
758 spin_unlock_irq(&mdev->req_lock);
759 wake_up(&mdev->state_wait);
760}
761
762/* does always return 0;
763 * interesting return code is in reply->ret_code */
764static int drbd_nl_disk_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
765 struct drbd_nl_cfg_reply *reply)
766{
767 enum drbd_ret_codes retcode;
768 enum determine_dev_size dd;
769 sector_t max_possible_sectors;
770 sector_t min_md_device_sectors;
771 struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
772 struct inode *inode, *inode2;
773 struct lru_cache *resync_lru = NULL;
774 union drbd_state ns, os;
775 int rv;
776 int cp_discovered = 0;
777 int logical_block_size;
778
779 drbd_reconfig_start(mdev);
780
781 /* if you want to reconfigure, please tear down first */
782 if (mdev->state.disk > D_DISKLESS) {
783 retcode = ERR_DISK_CONFIGURED;
784 goto fail;
785 }
786
787 /* allocation not in the IO path, cqueue thread context */
788 nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
789 if (!nbc) {
790 retcode = ERR_NOMEM;
791 goto fail;
792 }
793
794 nbc->dc.disk_size = DRBD_DISK_SIZE_SECT_DEF;
795 nbc->dc.on_io_error = DRBD_ON_IO_ERROR_DEF;
796 nbc->dc.fencing = DRBD_FENCING_DEF;
797 nbc->dc.max_bio_bvecs = DRBD_MAX_BIO_BVECS_DEF;
798
799 if (!disk_conf_from_tags(mdev, nlp->tag_list, &nbc->dc)) {
800 retcode = ERR_MANDATORY_TAG;
801 goto fail;
802 }
803
804 if (nbc->dc.meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
805 retcode = ERR_MD_IDX_INVALID;
806 goto fail;
807 }
808
809 nbc->lo_file = filp_open(nbc->dc.backing_dev, O_RDWR, 0);
810 if (IS_ERR(nbc->lo_file)) {
811 dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.backing_dev,
812 PTR_ERR(nbc->lo_file));
813 nbc->lo_file = NULL;
814 retcode = ERR_OPEN_DISK;
815 goto fail;
816 }
817
818 inode = nbc->lo_file->f_dentry->d_inode;
819
820 if (!S_ISBLK(inode->i_mode)) {
821 retcode = ERR_DISK_NOT_BDEV;
822 goto fail;
823 }
824
825 nbc->md_file = filp_open(nbc->dc.meta_dev, O_RDWR, 0);
826 if (IS_ERR(nbc->md_file)) {
827 dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.meta_dev,
828 PTR_ERR(nbc->md_file));
829 nbc->md_file = NULL;
830 retcode = ERR_OPEN_MD_DISK;
831 goto fail;
832 }
833
834 inode2 = nbc->md_file->f_dentry->d_inode;
835
836 if (!S_ISBLK(inode2->i_mode)) {
837 retcode = ERR_MD_NOT_BDEV;
838 goto fail;
839 }
840
841 nbc->backing_bdev = inode->i_bdev;
842 if (bd_claim(nbc->backing_bdev, mdev)) {
843 printk(KERN_ERR "drbd: bd_claim(%p,%p); failed [%p;%p;%u]\n",
844 nbc->backing_bdev, mdev,
845 nbc->backing_bdev->bd_holder,
846 nbc->backing_bdev->bd_contains->bd_holder,
847 nbc->backing_bdev->bd_holders);
848 retcode = ERR_BDCLAIM_DISK;
849 goto fail;
850 }
851
852 resync_lru = lc_create("resync", drbd_bm_ext_cache,
853 61, sizeof(struct bm_extent),
854 offsetof(struct bm_extent, lce));
855 if (!resync_lru) {
856 retcode = ERR_NOMEM;
857 goto release_bdev_fail;
858 }
859
860 /* meta_dev_idx >= 0: external fixed size,
861 * possibly multiple drbd sharing one meta device.
862 * TODO in that case, paranoia check that [md_bdev, meta_dev_idx] is
863 * not yet used by some other drbd minor!
864 * (if you use drbd.conf + drbdadm,
865 * that should check it for you already; but if you don't, or someone
866 * fooled it, we need to double check here) */
867 nbc->md_bdev = inode2->i_bdev;
868 if (bd_claim(nbc->md_bdev, (nbc->dc.meta_dev_idx < 0) ? (void *)mdev
869 : (void *) drbd_m_holder)) {
870 retcode = ERR_BDCLAIM_MD_DISK;
871 goto release_bdev_fail;
872 }
873
874 if ((nbc->backing_bdev == nbc->md_bdev) !=
875 (nbc->dc.meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
876 nbc->dc.meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
877 retcode = ERR_MD_IDX_INVALID;
878 goto release_bdev2_fail;
879 }
880
881 /* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
882 drbd_md_set_sector_offsets(mdev, nbc);
883
884 if (drbd_get_max_capacity(nbc) < nbc->dc.disk_size) {
885 dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
886 (unsigned long long) drbd_get_max_capacity(nbc),
887 (unsigned long long) nbc->dc.disk_size);
888 retcode = ERR_DISK_TO_SMALL;
889 goto release_bdev2_fail;
890 }
891
892 if (nbc->dc.meta_dev_idx < 0) {
893 max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
894 /* at least one MB, otherwise it does not make sense */
895 min_md_device_sectors = (2<<10);
896 } else {
897 max_possible_sectors = DRBD_MAX_SECTORS;
898 min_md_device_sectors = MD_RESERVED_SECT * (nbc->dc.meta_dev_idx + 1);
899 }
900
b411b363
PR
901 if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
902 retcode = ERR_MD_DISK_TO_SMALL;
903 dev_warn(DEV, "refusing attach: md-device too small, "
904 "at least %llu sectors needed for this meta-disk type\n",
905 (unsigned long long) min_md_device_sectors);
906 goto release_bdev2_fail;
907 }
908
909 /* Make sure the new disk is big enough
910 * (we may currently be R_PRIMARY with no local disk...) */
911 if (drbd_get_max_capacity(nbc) <
912 drbd_get_capacity(mdev->this_bdev)) {
913 retcode = ERR_DISK_TO_SMALL;
914 goto release_bdev2_fail;
915 }
916
917 nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
918
1352994b
LE
919 if (nbc->known_size > max_possible_sectors) {
920 dev_warn(DEV, "==> truncating very big lower level device "
921 "to currently maximum possible %llu sectors <==\n",
922 (unsigned long long) max_possible_sectors);
923 if (nbc->dc.meta_dev_idx >= 0)
924 dev_warn(DEV, "==>> using internal or flexible "
925 "meta data may help <<==\n");
926 }
927
b411b363
PR
928 drbd_suspend_io(mdev);
929 /* also wait for the last barrier ack. */
930 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt));
931 /* and for any other previously queued work */
932 drbd_flush_workqueue(mdev);
933
934 retcode = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
935 drbd_resume_io(mdev);
936 if (retcode < SS_SUCCESS)
937 goto release_bdev2_fail;
938
939 if (!get_ldev_if_state(mdev, D_ATTACHING))
940 goto force_diskless;
941
942 drbd_md_set_sector_offsets(mdev, nbc);
943
944 if (!mdev->bitmap) {
945 if (drbd_bm_init(mdev)) {
946 retcode = ERR_NOMEM;
947 goto force_diskless_dec;
948 }
949 }
950
951 retcode = drbd_md_read(mdev, nbc);
952 if (retcode != NO_ERROR)
953 goto force_diskless_dec;
954
955 if (mdev->state.conn < C_CONNECTED &&
956 mdev->state.role == R_PRIMARY &&
957 (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
958 dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
959 (unsigned long long)mdev->ed_uuid);
960 retcode = ERR_DATA_NOT_CURRENT;
961 goto force_diskless_dec;
962 }
963
964 /* Since we are diskless, fix the activity log first... */
965 if (drbd_check_al_size(mdev)) {
966 retcode = ERR_NOMEM;
967 goto force_diskless_dec;
968 }
969
970 /* Prevent shrinking of consistent devices ! */
971 if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
a393db6f 972 drbd_new_dev_size(mdev, nbc, 0) < nbc->md.la_size_sect) {
b411b363
PR
973 dev_warn(DEV, "refusing to truncate a consistent device\n");
974 retcode = ERR_DISK_TO_SMALL;
975 goto force_diskless_dec;
976 }
977
978 if (!drbd_al_read_log(mdev, nbc)) {
979 retcode = ERR_IO_MD_DISK;
980 goto force_diskless_dec;
981 }
982
983 /* allocate a second IO page if logical_block_size != 512 */
984 logical_block_size = bdev_logical_block_size(nbc->md_bdev);
985 if (logical_block_size == 0)
986 logical_block_size = MD_SECTOR_SIZE;
987
988 if (logical_block_size != MD_SECTOR_SIZE) {
989 if (!mdev->md_io_tmpp) {
990 struct page *page = alloc_page(GFP_NOIO);
991 if (!page)
992 goto force_diskless_dec;
993
994 dev_warn(DEV, "Meta data's bdev logical_block_size = %d != %d\n",
995 logical_block_size, MD_SECTOR_SIZE);
996 dev_warn(DEV, "Workaround engaged (has performance impact).\n");
997
998 mdev->md_io_tmpp = page;
999 }
1000 }
1001
1002 /* Reset the "barriers don't work" bits here, then force meta data to
1003 * be written, to ensure we determine if barriers are supported. */
1004 if (nbc->dc.no_md_flush)
1005 set_bit(MD_NO_BARRIER, &mdev->flags);
1006 else
1007 clear_bit(MD_NO_BARRIER, &mdev->flags);
1008
1009 /* Point of no return reached.
1010 * Devices and memory are no longer released by error cleanup below.
1011 * now mdev takes over responsibility, and the state engine should
1012 * clean it up somewhere. */
1013 D_ASSERT(mdev->ldev == NULL);
1014 mdev->ldev = nbc;
1015 mdev->resync = resync_lru;
1016 nbc = NULL;
1017 resync_lru = NULL;
1018
1019 mdev->write_ordering = WO_bio_barrier;
1020 drbd_bump_write_ordering(mdev, WO_bio_barrier);
1021
1022 if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
1023 set_bit(CRASHED_PRIMARY, &mdev->flags);
1024 else
1025 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1026
1027 if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND)) {
1028 set_bit(CRASHED_PRIMARY, &mdev->flags);
1029 cp_discovered = 1;
1030 }
1031
1032 mdev->send_cnt = 0;
1033 mdev->recv_cnt = 0;
1034 mdev->read_cnt = 0;
1035 mdev->writ_cnt = 0;
1036
1037 drbd_setup_queue_param(mdev, DRBD_MAX_SEGMENT_SIZE);
1038
1039 /* If I am currently not R_PRIMARY,
1040 * but meta data primary indicator is set,
1041 * I just now recover from a hard crash,
1042 * and have been R_PRIMARY before that crash.
1043 *
1044 * Now, if I had no connection before that crash
1045 * (have been degraded R_PRIMARY), chances are that
1046 * I won't find my peer now either.
1047 *
1048 * In that case, and _only_ in that case,
1049 * we use the degr-wfc-timeout instead of the default,
1050 * so we can automatically recover from a crash of a
1051 * degraded but active "cluster" after a certain timeout.
1052 */
1053 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
1054 if (mdev->state.role != R_PRIMARY &&
1055 drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1056 !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
1057 set_bit(USE_DEGR_WFC_T, &mdev->flags);
1058
a393db6f 1059 dd = drbd_determin_dev_size(mdev, 0);
b411b363
PR
1060 if (dd == dev_size_error) {
1061 retcode = ERR_NOMEM_BITMAP;
1062 goto force_diskless_dec;
1063 } else if (dd == grew)
1064 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
1065
1066 if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) {
1067 dev_info(DEV, "Assuming that all blocks are out of sync "
1068 "(aka FullSync)\n");
1069 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from attaching")) {
1070 retcode = ERR_IO_MD_DISK;
1071 goto force_diskless_dec;
1072 }
1073 } else {
1074 if (drbd_bitmap_io(mdev, &drbd_bm_read, "read from attaching") < 0) {
1075 retcode = ERR_IO_MD_DISK;
1076 goto force_diskless_dec;
1077 }
1078 }
1079
1080 if (cp_discovered) {
1081 drbd_al_apply_to_bm(mdev);
1082 drbd_al_to_on_disk_bm(mdev);
1083 }
1084
1085 spin_lock_irq(&mdev->req_lock);
1086 os = mdev->state;
1087 ns.i = os.i;
1088 /* If MDF_CONSISTENT is not set go into inconsistent state,
1089 otherwise investigate MDF_WasUpToDate...
1090 If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
1091 otherwise into D_CONSISTENT state.
1092 */
1093 if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
1094 if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
1095 ns.disk = D_CONSISTENT;
1096 else
1097 ns.disk = D_OUTDATED;
1098 } else {
1099 ns.disk = D_INCONSISTENT;
1100 }
1101
1102 if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
1103 ns.pdsk = D_OUTDATED;
1104
1105 if ( ns.disk == D_CONSISTENT &&
1106 (ns.pdsk == D_OUTDATED || mdev->ldev->dc.fencing == FP_DONT_CARE))
1107 ns.disk = D_UP_TO_DATE;
1108
1109 /* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
1110 MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
1111 this point, because drbd_request_state() modifies these
1112 flags. */
1113
1114 /* In case we are C_CONNECTED postpone any decision on the new disk
1115 state after the negotiation phase. */
1116 if (mdev->state.conn == C_CONNECTED) {
1117 mdev->new_state_tmp.i = ns.i;
1118 ns.i = os.i;
1119 ns.disk = D_NEGOTIATING;
1120 }
1121
1122 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
1123 ns = mdev->state;
1124 spin_unlock_irq(&mdev->req_lock);
1125
1126 if (rv < SS_SUCCESS)
1127 goto force_diskless_dec;
1128
1129 if (mdev->state.role == R_PRIMARY)
1130 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
1131 else
1132 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
1133
1134 drbd_md_mark_dirty(mdev);
1135 drbd_md_sync(mdev);
1136
1137 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1138 put_ldev(mdev);
1139 reply->ret_code = retcode;
1140 drbd_reconfig_done(mdev);
1141 return 0;
1142
1143 force_diskless_dec:
1144 put_ldev(mdev);
1145 force_diskless:
1146 drbd_force_state(mdev, NS(disk, D_DISKLESS));
1147 drbd_md_sync(mdev);
1148 release_bdev2_fail:
1149 if (nbc)
1150 bd_release(nbc->md_bdev);
1151 release_bdev_fail:
1152 if (nbc)
1153 bd_release(nbc->backing_bdev);
1154 fail:
1155 if (nbc) {
1156 if (nbc->lo_file)
1157 fput(nbc->lo_file);
1158 if (nbc->md_file)
1159 fput(nbc->md_file);
1160 kfree(nbc);
1161 }
1162 lc_destroy(resync_lru);
1163
1164 reply->ret_code = retcode;
1165 drbd_reconfig_done(mdev);
1166 return 0;
1167}
1168
1169static int drbd_nl_detach(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1170 struct drbd_nl_cfg_reply *reply)
1171{
1172 reply->ret_code = drbd_request_state(mdev, NS(disk, D_DISKLESS));
1173 return 0;
1174}
1175
1176static int drbd_nl_net_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1177 struct drbd_nl_cfg_reply *reply)
1178{
1179 int i, ns;
1180 enum drbd_ret_codes retcode;
1181 struct net_conf *new_conf = NULL;
1182 struct crypto_hash *tfm = NULL;
1183 struct crypto_hash *integrity_w_tfm = NULL;
1184 struct crypto_hash *integrity_r_tfm = NULL;
1185 struct hlist_head *new_tl_hash = NULL;
1186 struct hlist_head *new_ee_hash = NULL;
1187 struct drbd_conf *odev;
1188 char hmac_name[CRYPTO_MAX_ALG_NAME];
1189 void *int_dig_out = NULL;
1190 void *int_dig_in = NULL;
1191 void *int_dig_vv = NULL;
1192 struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr;
1193
1194 drbd_reconfig_start(mdev);
1195
1196 if (mdev->state.conn > C_STANDALONE) {
1197 retcode = ERR_NET_CONFIGURED;
1198 goto fail;
1199 }
1200
1201 /* allocation not in the IO path, cqueue thread context */
1202 new_conf = kmalloc(sizeof(struct net_conf), GFP_KERNEL);
1203 if (!new_conf) {
1204 retcode = ERR_NOMEM;
1205 goto fail;
1206 }
1207
1208 memset(new_conf, 0, sizeof(struct net_conf));
1209 new_conf->timeout = DRBD_TIMEOUT_DEF;
1210 new_conf->try_connect_int = DRBD_CONNECT_INT_DEF;
1211 new_conf->ping_int = DRBD_PING_INT_DEF;
1212 new_conf->max_epoch_size = DRBD_MAX_EPOCH_SIZE_DEF;
1213 new_conf->max_buffers = DRBD_MAX_BUFFERS_DEF;
1214 new_conf->unplug_watermark = DRBD_UNPLUG_WATERMARK_DEF;
1215 new_conf->sndbuf_size = DRBD_SNDBUF_SIZE_DEF;
1216 new_conf->rcvbuf_size = DRBD_RCVBUF_SIZE_DEF;
1217 new_conf->ko_count = DRBD_KO_COUNT_DEF;
1218 new_conf->after_sb_0p = DRBD_AFTER_SB_0P_DEF;
1219 new_conf->after_sb_1p = DRBD_AFTER_SB_1P_DEF;
1220 new_conf->after_sb_2p = DRBD_AFTER_SB_2P_DEF;
1221 new_conf->want_lose = 0;
1222 new_conf->two_primaries = 0;
1223 new_conf->wire_protocol = DRBD_PROT_C;
1224 new_conf->ping_timeo = DRBD_PING_TIMEO_DEF;
1225 new_conf->rr_conflict = DRBD_RR_CONFLICT_DEF;
1226
1227 if (!net_conf_from_tags(mdev, nlp->tag_list, new_conf)) {
1228 retcode = ERR_MANDATORY_TAG;
1229 goto fail;
1230 }
1231
1232 if (new_conf->two_primaries
1233 && (new_conf->wire_protocol != DRBD_PROT_C)) {
1234 retcode = ERR_NOT_PROTO_C;
1235 goto fail;
1236 };
1237
1238 if (mdev->state.role == R_PRIMARY && new_conf->want_lose) {
1239 retcode = ERR_DISCARD;
1240 goto fail;
1241 }
1242
1243 retcode = NO_ERROR;
1244
1245 new_my_addr = (struct sockaddr *)&new_conf->my_addr;
1246 new_peer_addr = (struct sockaddr *)&new_conf->peer_addr;
1247 for (i = 0; i < minor_count; i++) {
1248 odev = minor_to_mdev(i);
1249 if (!odev || odev == mdev)
1250 continue;
1251 if (get_net_conf(odev)) {
1252 taken_addr = (struct sockaddr *)&odev->net_conf->my_addr;
1253 if (new_conf->my_addr_len == odev->net_conf->my_addr_len &&
1254 !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len))
1255 retcode = ERR_LOCAL_ADDR;
1256
1257 taken_addr = (struct sockaddr *)&odev->net_conf->peer_addr;
1258 if (new_conf->peer_addr_len == odev->net_conf->peer_addr_len &&
1259 !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len))
1260 retcode = ERR_PEER_ADDR;
1261
1262 put_net_conf(odev);
1263 if (retcode != NO_ERROR)
1264 goto fail;
1265 }
1266 }
1267
1268 if (new_conf->cram_hmac_alg[0] != 0) {
1269 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
1270 new_conf->cram_hmac_alg);
1271 tfm = crypto_alloc_hash(hmac_name, 0, CRYPTO_ALG_ASYNC);
1272 if (IS_ERR(tfm)) {
1273 tfm = NULL;
1274 retcode = ERR_AUTH_ALG;
1275 goto fail;
1276 }
1277
0798219f 1278 if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
b411b363
PR
1279 retcode = ERR_AUTH_ALG_ND;
1280 goto fail;
1281 }
1282 }
1283
1284 if (new_conf->integrity_alg[0]) {
1285 integrity_w_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
1286 if (IS_ERR(integrity_w_tfm)) {
1287 integrity_w_tfm = NULL;
1288 retcode=ERR_INTEGRITY_ALG;
1289 goto fail;
1290 }
1291
1292 if (!drbd_crypto_is_hash(crypto_hash_tfm(integrity_w_tfm))) {
1293 retcode=ERR_INTEGRITY_ALG_ND;
1294 goto fail;
1295 }
1296
1297 integrity_r_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
1298 if (IS_ERR(integrity_r_tfm)) {
1299 integrity_r_tfm = NULL;
1300 retcode=ERR_INTEGRITY_ALG;
1301 goto fail;
1302 }
1303 }
1304
1305 ns = new_conf->max_epoch_size/8;
1306 if (mdev->tl_hash_s != ns) {
1307 new_tl_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
1308 if (!new_tl_hash) {
1309 retcode = ERR_NOMEM;
1310 goto fail;
1311 }
1312 }
1313
1314 ns = new_conf->max_buffers/8;
1315 if (new_conf->two_primaries && (mdev->ee_hash_s != ns)) {
1316 new_ee_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
1317 if (!new_ee_hash) {
1318 retcode = ERR_NOMEM;
1319 goto fail;
1320 }
1321 }
1322
1323 ((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
1324
1325 if (integrity_w_tfm) {
1326 i = crypto_hash_digestsize(integrity_w_tfm);
1327 int_dig_out = kmalloc(i, GFP_KERNEL);
1328 if (!int_dig_out) {
1329 retcode = ERR_NOMEM;
1330 goto fail;
1331 }
1332 int_dig_in = kmalloc(i, GFP_KERNEL);
1333 if (!int_dig_in) {
1334 retcode = ERR_NOMEM;
1335 goto fail;
1336 }
1337 int_dig_vv = kmalloc(i, GFP_KERNEL);
1338 if (!int_dig_vv) {
1339 retcode = ERR_NOMEM;
1340 goto fail;
1341 }
1342 }
1343
1344 if (!mdev->bitmap) {
1345 if(drbd_bm_init(mdev)) {
1346 retcode = ERR_NOMEM;
1347 goto fail;
1348 }
1349 }
1350
1351 spin_lock_irq(&mdev->req_lock);
1352 if (mdev->net_conf != NULL) {
1353 retcode = ERR_NET_CONFIGURED;
1354 spin_unlock_irq(&mdev->req_lock);
1355 goto fail;
1356 }
1357 mdev->net_conf = new_conf;
1358
1359 mdev->send_cnt = 0;
1360 mdev->recv_cnt = 0;
1361
1362 if (new_tl_hash) {
1363 kfree(mdev->tl_hash);
1364 mdev->tl_hash_s = mdev->net_conf->max_epoch_size/8;
1365 mdev->tl_hash = new_tl_hash;
1366 }
1367
1368 if (new_ee_hash) {
1369 kfree(mdev->ee_hash);
1370 mdev->ee_hash_s = mdev->net_conf->max_buffers/8;
1371 mdev->ee_hash = new_ee_hash;
1372 }
1373
1374 crypto_free_hash(mdev->cram_hmac_tfm);
1375 mdev->cram_hmac_tfm = tfm;
1376
1377 crypto_free_hash(mdev->integrity_w_tfm);
1378 mdev->integrity_w_tfm = integrity_w_tfm;
1379
1380 crypto_free_hash(mdev->integrity_r_tfm);
1381 mdev->integrity_r_tfm = integrity_r_tfm;
1382
1383 kfree(mdev->int_dig_out);
1384 kfree(mdev->int_dig_in);
1385 kfree(mdev->int_dig_vv);
1386 mdev->int_dig_out=int_dig_out;
1387 mdev->int_dig_in=int_dig_in;
1388 mdev->int_dig_vv=int_dig_vv;
1389 spin_unlock_irq(&mdev->req_lock);
1390
1391 retcode = _drbd_request_state(mdev, NS(conn, C_UNCONNECTED), CS_VERBOSE);
1392
1393 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1394 reply->ret_code = retcode;
1395 drbd_reconfig_done(mdev);
1396 return 0;
1397
1398fail:
1399 kfree(int_dig_out);
1400 kfree(int_dig_in);
1401 kfree(int_dig_vv);
1402 crypto_free_hash(tfm);
1403 crypto_free_hash(integrity_w_tfm);
1404 crypto_free_hash(integrity_r_tfm);
1405 kfree(new_tl_hash);
1406 kfree(new_ee_hash);
1407 kfree(new_conf);
1408
1409 reply->ret_code = retcode;
1410 drbd_reconfig_done(mdev);
1411 return 0;
1412}
1413
1414static int drbd_nl_disconnect(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1415 struct drbd_nl_cfg_reply *reply)
1416{
1417 int retcode;
1418
1419 retcode = _drbd_request_state(mdev, NS(conn, C_DISCONNECTING), CS_ORDERED);
1420
1421 if (retcode == SS_NOTHING_TO_DO)
1422 goto done;
1423 else if (retcode == SS_ALREADY_STANDALONE)
1424 goto done;
1425 else if (retcode == SS_PRIMARY_NOP) {
1426 /* Our statche checking code wants to see the peer outdated. */
1427 retcode = drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
1428 pdsk, D_OUTDATED));
1429 } else if (retcode == SS_CW_FAILED_BY_PEER) {
1430 /* The peer probably wants to see us outdated. */
1431 retcode = _drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
1432 disk, D_OUTDATED),
1433 CS_ORDERED);
1434 if (retcode == SS_IS_DISKLESS || retcode == SS_LOWER_THAN_OUTDATED) {
1435 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
1436 retcode = SS_SUCCESS;
1437 }
1438 }
1439
1440 if (retcode < SS_SUCCESS)
1441 goto fail;
1442
1443 if (wait_event_interruptible(mdev->state_wait,
1444 mdev->state.conn != C_DISCONNECTING)) {
1445 /* Do not test for mdev->state.conn == C_STANDALONE, since
1446 someone else might connect us in the mean time! */
1447 retcode = ERR_INTR;
1448 goto fail;
1449 }
1450
1451 done:
1452 retcode = NO_ERROR;
1453 fail:
1454 drbd_md_sync(mdev);
1455 reply->ret_code = retcode;
1456 return 0;
1457}
1458
1459void resync_after_online_grow(struct drbd_conf *mdev)
1460{
1461 int iass; /* I am sync source */
1462
1463 dev_info(DEV, "Resync of new storage after online grow\n");
1464 if (mdev->state.role != mdev->state.peer)
1465 iass = (mdev->state.role == R_PRIMARY);
1466 else
1467 iass = test_bit(DISCARD_CONCURRENT, &mdev->flags);
1468
1469 if (iass)
1470 drbd_start_resync(mdev, C_SYNC_SOURCE);
1471 else
1472 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
1473}
1474
1475static int drbd_nl_resize(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1476 struct drbd_nl_cfg_reply *reply)
1477{
1478 struct resize rs;
1479 int retcode = NO_ERROR;
1480 int ldsc = 0; /* local disk size changed */
1481 enum determine_dev_size dd;
1482
1483 memset(&rs, 0, sizeof(struct resize));
1484 if (!resize_from_tags(mdev, nlp->tag_list, &rs)) {
1485 retcode = ERR_MANDATORY_TAG;
1486 goto fail;
1487 }
1488
1489 if (mdev->state.conn > C_CONNECTED) {
1490 retcode = ERR_RESIZE_RESYNC;
1491 goto fail;
1492 }
1493
1494 if (mdev->state.role == R_SECONDARY &&
1495 mdev->state.peer == R_SECONDARY) {
1496 retcode = ERR_NO_PRIMARY;
1497 goto fail;
1498 }
1499
1500 if (!get_ldev(mdev)) {
1501 retcode = ERR_NO_DISK;
1502 goto fail;
1503 }
1504
1505 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) {
1506 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
1507 ldsc = 1;
1508 }
1509
1510 mdev->ldev->dc.disk_size = (sector_t)rs.resize_size;
a393db6f 1511 dd = drbd_determin_dev_size(mdev, rs.resize_force);
b411b363
PR
1512 drbd_md_sync(mdev);
1513 put_ldev(mdev);
1514 if (dd == dev_size_error) {
1515 retcode = ERR_NOMEM_BITMAP;
1516 goto fail;
1517 }
1518
1519 if (mdev->state.conn == C_CONNECTED && (dd != unchanged || ldsc)) {
1520 if (dd == grew)
1521 set_bit(RESIZE_PENDING, &mdev->flags);
1522
1523 drbd_send_uuids(mdev);
1524 drbd_send_sizes(mdev, 1);
1525 }
1526
1527 fail:
1528 reply->ret_code = retcode;
1529 return 0;
1530}
1531
1532static int drbd_nl_syncer_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1533 struct drbd_nl_cfg_reply *reply)
1534{
1535 int retcode = NO_ERROR;
1536 int err;
1537 int ovr; /* online verify running */
1538 int rsr; /* re-sync running */
1539 struct crypto_hash *verify_tfm = NULL;
1540 struct crypto_hash *csums_tfm = NULL;
1541 struct syncer_conf sc;
1542 cpumask_var_t new_cpu_mask;
1543
1544 if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) {
1545 retcode = ERR_NOMEM;
1546 goto fail;
1547 }
1548
1549 if (nlp->flags & DRBD_NL_SET_DEFAULTS) {
1550 memset(&sc, 0, sizeof(struct syncer_conf));
1551 sc.rate = DRBD_RATE_DEF;
1552 sc.after = DRBD_AFTER_DEF;
1553 sc.al_extents = DRBD_AL_EXTENTS_DEF;
1554 } else
1555 memcpy(&sc, &mdev->sync_conf, sizeof(struct syncer_conf));
1556
1557 if (!syncer_conf_from_tags(mdev, nlp->tag_list, &sc)) {
1558 retcode = ERR_MANDATORY_TAG;
1559 goto fail;
1560 }
1561
1562 /* re-sync running */
1563 rsr = ( mdev->state.conn == C_SYNC_SOURCE ||
1564 mdev->state.conn == C_SYNC_TARGET ||
1565 mdev->state.conn == C_PAUSED_SYNC_S ||
1566 mdev->state.conn == C_PAUSED_SYNC_T );
1567
1568 if (rsr && strcmp(sc.csums_alg, mdev->sync_conf.csums_alg)) {
1569 retcode = ERR_CSUMS_RESYNC_RUNNING;
1570 goto fail;
1571 }
1572
1573 if (!rsr && sc.csums_alg[0]) {
1574 csums_tfm = crypto_alloc_hash(sc.csums_alg, 0, CRYPTO_ALG_ASYNC);
1575 if (IS_ERR(csums_tfm)) {
1576 csums_tfm = NULL;
1577 retcode = ERR_CSUMS_ALG;
1578 goto fail;
1579 }
1580
1581 if (!drbd_crypto_is_hash(crypto_hash_tfm(csums_tfm))) {
1582 retcode = ERR_CSUMS_ALG_ND;
1583 goto fail;
1584 }
1585 }
1586
1587 /* online verify running */
1588 ovr = (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T);
1589
1590 if (ovr) {
1591 if (strcmp(sc.verify_alg, mdev->sync_conf.verify_alg)) {
1592 retcode = ERR_VERIFY_RUNNING;
1593 goto fail;
1594 }
1595 }
1596
1597 if (!ovr && sc.verify_alg[0]) {
1598 verify_tfm = crypto_alloc_hash(sc.verify_alg, 0, CRYPTO_ALG_ASYNC);
1599 if (IS_ERR(verify_tfm)) {
1600 verify_tfm = NULL;
1601 retcode = ERR_VERIFY_ALG;
1602 goto fail;
1603 }
1604
1605 if (!drbd_crypto_is_hash(crypto_hash_tfm(verify_tfm))) {
1606 retcode = ERR_VERIFY_ALG_ND;
1607 goto fail;
1608 }
1609 }
1610
1611 /* silently ignore cpu mask on UP kernel */
1612 if (nr_cpu_ids > 1 && sc.cpu_mask[0] != 0) {
1613 err = __bitmap_parse(sc.cpu_mask, 32, 0,
1614 cpumask_bits(new_cpu_mask), nr_cpu_ids);
1615 if (err) {
1616 dev_warn(DEV, "__bitmap_parse() failed with %d\n", err);
1617 retcode = ERR_CPU_MASK_PARSE;
1618 goto fail;
1619 }
1620 }
1621
1622 ERR_IF (sc.rate < 1) sc.rate = 1;
1623 ERR_IF (sc.al_extents < 7) sc.al_extents = 127; /* arbitrary minimum */
1624#define AL_MAX ((MD_AL_MAX_SIZE-1) * AL_EXTENTS_PT)
1625 if (sc.al_extents > AL_MAX) {
1626 dev_err(DEV, "sc.al_extents > %d\n", AL_MAX);
1627 sc.al_extents = AL_MAX;
1628 }
1629#undef AL_MAX
1630
1631 /* most sanity checks done, try to assign the new sync-after
1632 * dependency. need to hold the global lock in there,
1633 * to avoid a race in the dependency loop check. */
1634 retcode = drbd_alter_sa(mdev, sc.after);
1635 if (retcode != NO_ERROR)
1636 goto fail;
1637
1638 /* ok, assign the rest of it as well.
1639 * lock against receive_SyncParam() */
1640 spin_lock(&mdev->peer_seq_lock);
1641 mdev->sync_conf = sc;
1642
1643 if (!rsr) {
1644 crypto_free_hash(mdev->csums_tfm);
1645 mdev->csums_tfm = csums_tfm;
1646 csums_tfm = NULL;
1647 }
1648
1649 if (!ovr) {
1650 crypto_free_hash(mdev->verify_tfm);
1651 mdev->verify_tfm = verify_tfm;
1652 verify_tfm = NULL;
1653 }
1654 spin_unlock(&mdev->peer_seq_lock);
1655
1656 if (get_ldev(mdev)) {
1657 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
1658 drbd_al_shrink(mdev);
1659 err = drbd_check_al_size(mdev);
1660 lc_unlock(mdev->act_log);
1661 wake_up(&mdev->al_wait);
1662
1663 put_ldev(mdev);
1664 drbd_md_sync(mdev);
1665
1666 if (err) {
1667 retcode = ERR_NOMEM;
1668 goto fail;
1669 }
1670 }
1671
1672 if (mdev->state.conn >= C_CONNECTED)
1673 drbd_send_sync_param(mdev, &sc);
1674
1675 if (!cpumask_equal(mdev->cpu_mask, new_cpu_mask)) {
1676 cpumask_copy(mdev->cpu_mask, new_cpu_mask);
1677 drbd_calc_cpu_mask(mdev);
1678 mdev->receiver.reset_cpu_mask = 1;
1679 mdev->asender.reset_cpu_mask = 1;
1680 mdev->worker.reset_cpu_mask = 1;
1681 }
1682
1683 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1684fail:
1685 free_cpumask_var(new_cpu_mask);
1686 crypto_free_hash(csums_tfm);
1687 crypto_free_hash(verify_tfm);
1688 reply->ret_code = retcode;
1689 return 0;
1690}
1691
1692static int drbd_nl_invalidate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1693 struct drbd_nl_cfg_reply *reply)
1694{
1695 int retcode;
1696
1697 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
1698
1699 if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
1700 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
1701
1702 while (retcode == SS_NEED_CONNECTION) {
1703 spin_lock_irq(&mdev->req_lock);
1704 if (mdev->state.conn < C_CONNECTED)
1705 retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
1706 spin_unlock_irq(&mdev->req_lock);
1707
1708 if (retcode != SS_NEED_CONNECTION)
1709 break;
1710
1711 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
1712 }
1713
1714 reply->ret_code = retcode;
1715 return 0;
1716}
1717
1718static int drbd_nl_invalidate_peer(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1719 struct drbd_nl_cfg_reply *reply)
1720{
1721
1722 reply->ret_code = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S));
1723
1724 return 0;
1725}
1726
1727static int drbd_nl_pause_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1728 struct drbd_nl_cfg_reply *reply)
1729{
1730 int retcode = NO_ERROR;
1731
1732 if (drbd_request_state(mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
1733 retcode = ERR_PAUSE_IS_SET;
1734
1735 reply->ret_code = retcode;
1736 return 0;
1737}
1738
1739static int drbd_nl_resume_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1740 struct drbd_nl_cfg_reply *reply)
1741{
1742 int retcode = NO_ERROR;
1743
1744 if (drbd_request_state(mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO)
1745 retcode = ERR_PAUSE_IS_CLEAR;
1746
1747 reply->ret_code = retcode;
1748 return 0;
1749}
1750
1751static int drbd_nl_suspend_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1752 struct drbd_nl_cfg_reply *reply)
1753{
1754 reply->ret_code = drbd_request_state(mdev, NS(susp, 1));
1755
1756 return 0;
1757}
1758
1759static int drbd_nl_resume_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1760 struct drbd_nl_cfg_reply *reply)
1761{
1762 reply->ret_code = drbd_request_state(mdev, NS(susp, 0));
1763 return 0;
1764}
1765
1766static int drbd_nl_outdate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1767 struct drbd_nl_cfg_reply *reply)
1768{
1769 reply->ret_code = drbd_request_state(mdev, NS(disk, D_OUTDATED));
1770 return 0;
1771}
1772
1773static int drbd_nl_get_config(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1774 struct drbd_nl_cfg_reply *reply)
1775{
1776 unsigned short *tl;
1777
1778 tl = reply->tag_list;
1779
1780 if (get_ldev(mdev)) {
1781 tl = disk_conf_to_tags(mdev, &mdev->ldev->dc, tl);
1782 put_ldev(mdev);
1783 }
1784
1785 if (get_net_conf(mdev)) {
1786 tl = net_conf_to_tags(mdev, mdev->net_conf, tl);
1787 put_net_conf(mdev);
1788 }
1789 tl = syncer_conf_to_tags(mdev, &mdev->sync_conf, tl);
1790
1791 put_unaligned(TT_END, tl++); /* Close the tag list */
1792
1793 return (int)((char *)tl - (char *)reply->tag_list);
1794}
1795
1796static int drbd_nl_get_state(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1797 struct drbd_nl_cfg_reply *reply)
1798{
1799 unsigned short *tl = reply->tag_list;
1800 union drbd_state s = mdev->state;
1801 unsigned long rs_left;
1802 unsigned int res;
1803
1804 tl = get_state_to_tags(mdev, (struct get_state *)&s, tl);
1805
1806 /* no local ref, no bitmap, no syncer progress. */
1807 if (s.conn >= C_SYNC_SOURCE && s.conn <= C_PAUSED_SYNC_T) {
1808 if (get_ldev(mdev)) {
1809 drbd_get_syncer_progress(mdev, &rs_left, &res);
1810 tl = tl_add_int(tl, T_sync_progress, &res);
1811 put_ldev(mdev);
1812 }
1813 }
1814 put_unaligned(TT_END, tl++); /* Close the tag list */
1815
1816 return (int)((char *)tl - (char *)reply->tag_list);
1817}
1818
1819static int drbd_nl_get_uuids(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1820 struct drbd_nl_cfg_reply *reply)
1821{
1822 unsigned short *tl;
1823
1824 tl = reply->tag_list;
1825
1826 if (get_ldev(mdev)) {
1827 tl = tl_add_blob(tl, T_uuids, mdev->ldev->md.uuid, UI_SIZE*sizeof(u64));
1828 tl = tl_add_int(tl, T_uuids_flags, &mdev->ldev->md.flags);
1829 put_ldev(mdev);
1830 }
1831 put_unaligned(TT_END, tl++); /* Close the tag list */
1832
1833 return (int)((char *)tl - (char *)reply->tag_list);
1834}
1835
1836/**
1837 * drbd_nl_get_timeout_flag() - Used by drbdsetup to find out which timeout value to use
1838 * @mdev: DRBD device.
1839 * @nlp: Netlink/connector packet from drbdsetup
1840 * @reply: Reply packet for drbdsetup
1841 */
1842static int drbd_nl_get_timeout_flag(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1843 struct drbd_nl_cfg_reply *reply)
1844{
1845 unsigned short *tl;
1846 char rv;
1847
1848 tl = reply->tag_list;
1849
1850 rv = mdev->state.pdsk == D_OUTDATED ? UT_PEER_OUTDATED :
1851 test_bit(USE_DEGR_WFC_T, &mdev->flags) ? UT_DEGRADED : UT_DEFAULT;
1852
1853 tl = tl_add_blob(tl, T_use_degraded, &rv, sizeof(rv));
1854 put_unaligned(TT_END, tl++); /* Close the tag list */
1855
1856 return (int)((char *)tl - (char *)reply->tag_list);
1857}
1858
1859static int drbd_nl_start_ov(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1860 struct drbd_nl_cfg_reply *reply)
1861{
1862 /* default to resume from last known position, if possible */
1863 struct start_ov args =
1864 { .start_sector = mdev->ov_start_sector };
1865
1866 if (!start_ov_from_tags(mdev, nlp->tag_list, &args)) {
1867 reply->ret_code = ERR_MANDATORY_TAG;
1868 return 0;
1869 }
1870 /* w_make_ov_request expects position to be aligned */
1871 mdev->ov_start_sector = args.start_sector & ~BM_SECT_PER_BIT;
1872 reply->ret_code = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
1873 return 0;
1874}
1875
1876
1877static int drbd_nl_new_c_uuid(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1878 struct drbd_nl_cfg_reply *reply)
1879{
1880 int retcode = NO_ERROR;
1881 int skip_initial_sync = 0;
1882 int err;
1883
1884 struct new_c_uuid args;
1885
1886 memset(&args, 0, sizeof(struct new_c_uuid));
1887 if (!new_c_uuid_from_tags(mdev, nlp->tag_list, &args)) {
1888 reply->ret_code = ERR_MANDATORY_TAG;
1889 return 0;
1890 }
1891
1892 mutex_lock(&mdev->state_mutex); /* Protects us against serialized state changes. */
1893
1894 if (!get_ldev(mdev)) {
1895 retcode = ERR_NO_DISK;
1896 goto out;
1897 }
1898
1899 /* this is "skip initial sync", assume to be clean */
1900 if (mdev->state.conn == C_CONNECTED && mdev->agreed_pro_version >= 90 &&
1901 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
1902 dev_info(DEV, "Preparing to skip initial sync\n");
1903 skip_initial_sync = 1;
1904 } else if (mdev->state.conn != C_STANDALONE) {
1905 retcode = ERR_CONNECTED;
1906 goto out_dec;
1907 }
1908
1909 drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
1910 drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
1911
1912 if (args.clear_bm) {
1913 err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write, "clear_n_write from new_c_uuid");
1914 if (err) {
1915 dev_err(DEV, "Writing bitmap failed with %d\n",err);
1916 retcode = ERR_IO_MD_DISK;
1917 }
1918 if (skip_initial_sync) {
1919 drbd_send_uuids_skip_initial_sync(mdev);
1920 _drbd_uuid_set(mdev, UI_BITMAP, 0);
1921 spin_lock_irq(&mdev->req_lock);
1922 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
1923 CS_VERBOSE, NULL);
1924 spin_unlock_irq(&mdev->req_lock);
1925 }
1926 }
1927
1928 drbd_md_sync(mdev);
1929out_dec:
1930 put_ldev(mdev);
1931out:
1932 mutex_unlock(&mdev->state_mutex);
1933
1934 reply->ret_code = retcode;
1935 return 0;
1936}
1937
1938static struct drbd_conf *ensure_mdev(struct drbd_nl_cfg_req *nlp)
1939{
1940 struct drbd_conf *mdev;
1941
1942 if (nlp->drbd_minor >= minor_count)
1943 return NULL;
1944
1945 mdev = minor_to_mdev(nlp->drbd_minor);
1946
1947 if (!mdev && (nlp->flags & DRBD_NL_CREATE_DEVICE)) {
1948 struct gendisk *disk = NULL;
1949 mdev = drbd_new_device(nlp->drbd_minor);
1950
1951 spin_lock_irq(&drbd_pp_lock);
1952 if (minor_table[nlp->drbd_minor] == NULL) {
1953 minor_table[nlp->drbd_minor] = mdev;
1954 disk = mdev->vdisk;
1955 mdev = NULL;
1956 } /* else: we lost the race */
1957 spin_unlock_irq(&drbd_pp_lock);
1958
1959 if (disk) /* we won the race above */
1960 /* in case we ever add a drbd_delete_device(),
1961 * don't forget the del_gendisk! */
1962 add_disk(disk);
1963 else /* we lost the race above */
1964 drbd_free_mdev(mdev);
1965
1966 mdev = minor_to_mdev(nlp->drbd_minor);
1967 }
1968
1969 return mdev;
1970}
1971
1972struct cn_handler_struct {
1973 int (*function)(struct drbd_conf *,
1974 struct drbd_nl_cfg_req *,
1975 struct drbd_nl_cfg_reply *);
1976 int reply_body_size;
1977};
1978
1979static struct cn_handler_struct cnd_table[] = {
1980 [ P_primary ] = { &drbd_nl_primary, 0 },
1981 [ P_secondary ] = { &drbd_nl_secondary, 0 },
1982 [ P_disk_conf ] = { &drbd_nl_disk_conf, 0 },
1983 [ P_detach ] = { &drbd_nl_detach, 0 },
1984 [ P_net_conf ] = { &drbd_nl_net_conf, 0 },
1985 [ P_disconnect ] = { &drbd_nl_disconnect, 0 },
1986 [ P_resize ] = { &drbd_nl_resize, 0 },
1987 [ P_syncer_conf ] = { &drbd_nl_syncer_conf, 0 },
1988 [ P_invalidate ] = { &drbd_nl_invalidate, 0 },
1989 [ P_invalidate_peer ] = { &drbd_nl_invalidate_peer, 0 },
1990 [ P_pause_sync ] = { &drbd_nl_pause_sync, 0 },
1991 [ P_resume_sync ] = { &drbd_nl_resume_sync, 0 },
1992 [ P_suspend_io ] = { &drbd_nl_suspend_io, 0 },
1993 [ P_resume_io ] = { &drbd_nl_resume_io, 0 },
1994 [ P_outdate ] = { &drbd_nl_outdate, 0 },
1995 [ P_get_config ] = { &drbd_nl_get_config,
1996 sizeof(struct syncer_conf_tag_len_struct) +
1997 sizeof(struct disk_conf_tag_len_struct) +
1998 sizeof(struct net_conf_tag_len_struct) },
1999 [ P_get_state ] = { &drbd_nl_get_state,
2000 sizeof(struct get_state_tag_len_struct) +
2001 sizeof(struct sync_progress_tag_len_struct) },
2002 [ P_get_uuids ] = { &drbd_nl_get_uuids,
2003 sizeof(struct get_uuids_tag_len_struct) },
2004 [ P_get_timeout_flag ] = { &drbd_nl_get_timeout_flag,
2005 sizeof(struct get_timeout_flag_tag_len_struct)},
2006 [ P_start_ov ] = { &drbd_nl_start_ov, 0 },
2007 [ P_new_c_uuid ] = { &drbd_nl_new_c_uuid, 0 },
2008};
2009
9f5180e5 2010static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms *nsp)
b411b363
PR
2011{
2012 struct drbd_nl_cfg_req *nlp = (struct drbd_nl_cfg_req *)req->data;
2013 struct cn_handler_struct *cm;
2014 struct cn_msg *cn_reply;
2015 struct drbd_nl_cfg_reply *reply;
2016 struct drbd_conf *mdev;
2017 int retcode, rr;
2018 int reply_size = sizeof(struct cn_msg)
2019 + sizeof(struct drbd_nl_cfg_reply)
2020 + sizeof(short int);
2021
2022 if (!try_module_get(THIS_MODULE)) {
2023 printk(KERN_ERR "drbd: try_module_get() failed!\n");
2024 return;
2025 }
2026
9f5180e5
PR
2027 if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) {
2028 retcode = ERR_PERM;
2029 goto fail;
2030 }
2031
b411b363
PR
2032 mdev = ensure_mdev(nlp);
2033 if (!mdev) {
2034 retcode = ERR_MINOR_INVALID;
2035 goto fail;
2036 }
2037
b411b363
PR
2038 if (nlp->packet_type >= P_nl_after_last_packet) {
2039 retcode = ERR_PACKET_NR;
2040 goto fail;
2041 }
2042
2043 cm = cnd_table + nlp->packet_type;
2044
2045 /* This may happen if packet number is 0: */
2046 if (cm->function == NULL) {
2047 retcode = ERR_PACKET_NR;
2048 goto fail;
2049 }
2050
2051 reply_size += cm->reply_body_size;
2052
2053 /* allocation not in the IO path, cqueue thread context */
2054 cn_reply = kmalloc(reply_size, GFP_KERNEL);
2055 if (!cn_reply) {
2056 retcode = ERR_NOMEM;
2057 goto fail;
2058 }
2059 reply = (struct drbd_nl_cfg_reply *) cn_reply->data;
2060
2061 reply->packet_type =
2062 cm->reply_body_size ? nlp->packet_type : P_nl_after_last_packet;
2063 reply->minor = nlp->drbd_minor;
2064 reply->ret_code = NO_ERROR; /* Might by modified by cm->function. */
2065 /* reply->tag_list; might be modified by cm->function. */
2066
2067 rr = cm->function(mdev, nlp, reply);
2068
2069 cn_reply->id = req->id;
2070 cn_reply->seq = req->seq;
2071 cn_reply->ack = req->ack + 1;
2072 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + rr;
2073 cn_reply->flags = 0;
2074
b411b363
PR
2075 rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_KERNEL);
2076 if (rr && rr != -ESRCH)
2077 printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
2078
2079 kfree(cn_reply);
2080 module_put(THIS_MODULE);
2081 return;
2082 fail:
2083 drbd_nl_send_reply(req, retcode);
2084 module_put(THIS_MODULE);
2085}
2086
2087static atomic_t drbd_nl_seq = ATOMIC_INIT(2); /* two. */
2088
2089static unsigned short *
2090__tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data,
2091 unsigned short len, int nul_terminated)
2092{
2093 unsigned short l = tag_descriptions[tag_number(tag)].max_len;
2094 len = (len < l) ? len : l;
2095 put_unaligned(tag, tl++);
2096 put_unaligned(len, tl++);
2097 memcpy(tl, data, len);
2098 tl = (unsigned short*)((char*)tl + len);
2099 if (nul_terminated)
2100 *((char*)tl - 1) = 0;
2101 return tl;
2102}
2103
2104static unsigned short *
2105tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data, int len)
2106{
2107 return __tl_add_blob(tl, tag, data, len, 0);
2108}
2109
2110static unsigned short *
2111tl_add_str(unsigned short *tl, enum drbd_tags tag, const char *str)
2112{
2113 return __tl_add_blob(tl, tag, str, strlen(str)+1, 0);
2114}
2115
2116static unsigned short *
2117tl_add_int(unsigned short *tl, enum drbd_tags tag, const void *val)
2118{
2119 put_unaligned(tag, tl++);
2120 switch(tag_type(tag)) {
2121 case TT_INTEGER:
2122 put_unaligned(sizeof(int), tl++);
2123 put_unaligned(*(int *)val, (int *)tl);
2124 tl = (unsigned short*)((char*)tl+sizeof(int));
2125 break;
2126 case TT_INT64:
2127 put_unaligned(sizeof(u64), tl++);
2128 put_unaligned(*(u64 *)val, (u64 *)tl);
2129 tl = (unsigned short*)((char*)tl+sizeof(u64));
2130 break;
2131 default:
2132 /* someone did something stupid. */
2133 ;
2134 }
2135 return tl;
2136}
2137
2138void drbd_bcast_state(struct drbd_conf *mdev, union drbd_state state)
2139{
2140 char buffer[sizeof(struct cn_msg)+
2141 sizeof(struct drbd_nl_cfg_reply)+
2142 sizeof(struct get_state_tag_len_struct)+
2143 sizeof(short int)];
2144 struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2145 struct drbd_nl_cfg_reply *reply =
2146 (struct drbd_nl_cfg_reply *)cn_reply->data;
2147 unsigned short *tl = reply->tag_list;
2148
2149 /* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
2150
2151 tl = get_state_to_tags(mdev, (struct get_state *)&state, tl);
2152
2153 put_unaligned(TT_END, tl++); /* Close the tag list */
2154
2155 cn_reply->id.idx = CN_IDX_DRBD;
2156 cn_reply->id.val = CN_VAL_DRBD;
2157
2158 cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2159 cn_reply->ack = 0; /* not used here. */
2160 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2161 (int)((char *)tl - (char *)reply->tag_list);
2162 cn_reply->flags = 0;
2163
2164 reply->packet_type = P_get_state;
2165 reply->minor = mdev_to_minor(mdev);
2166 reply->ret_code = NO_ERROR;
2167
b411b363
PR
2168 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2169}
2170
2171void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name)
2172{
2173 char buffer[sizeof(struct cn_msg)+
2174 sizeof(struct drbd_nl_cfg_reply)+
2175 sizeof(struct call_helper_tag_len_struct)+
2176 sizeof(short int)];
2177 struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2178 struct drbd_nl_cfg_reply *reply =
2179 (struct drbd_nl_cfg_reply *)cn_reply->data;
2180 unsigned short *tl = reply->tag_list;
2181
2182 /* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
2183
2184 tl = tl_add_str(tl, T_helper, helper_name);
2185 put_unaligned(TT_END, tl++); /* Close the tag list */
2186
2187 cn_reply->id.idx = CN_IDX_DRBD;
2188 cn_reply->id.val = CN_VAL_DRBD;
2189
2190 cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2191 cn_reply->ack = 0; /* not used here. */
2192 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2193 (int)((char *)tl - (char *)reply->tag_list);
2194 cn_reply->flags = 0;
2195
2196 reply->packet_type = P_call_helper;
2197 reply->minor = mdev_to_minor(mdev);
2198 reply->ret_code = NO_ERROR;
2199
b411b363
PR
2200 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2201}
2202
2203void drbd_bcast_ee(struct drbd_conf *mdev,
2204 const char *reason, const int dgs,
2205 const char* seen_hash, const char* calc_hash,
2206 const struct drbd_epoch_entry* e)
2207{
2208 struct cn_msg *cn_reply;
2209 struct drbd_nl_cfg_reply *reply;
2210 struct bio_vec *bvec;
2211 unsigned short *tl;
2212 int i;
2213
2214 if (!e)
2215 return;
2216 if (!reason || !reason[0])
2217 return;
2218
2219 /* apparently we have to memcpy twice, first to prepare the data for the
2220 * struct cn_msg, then within cn_netlink_send from the cn_msg to the
2221 * netlink skb. */
2222 /* receiver thread context, which is not in the writeout path (of this node),
2223 * but may be in the writeout path of the _other_ node.
2224 * GFP_NOIO to avoid potential "distributed deadlock". */
2225 cn_reply = kmalloc(
2226 sizeof(struct cn_msg)+
2227 sizeof(struct drbd_nl_cfg_reply)+
2228 sizeof(struct dump_ee_tag_len_struct)+
2229 sizeof(short int),
2230 GFP_NOIO);
2231
2232 if (!cn_reply) {
2233 dev_err(DEV, "could not kmalloc buffer for drbd_bcast_ee, sector %llu, size %u\n",
2234 (unsigned long long)e->sector, e->size);
2235 return;
2236 }
2237
2238 reply = (struct drbd_nl_cfg_reply*)cn_reply->data;
2239 tl = reply->tag_list;
2240
2241 tl = tl_add_str(tl, T_dump_ee_reason, reason);
2242 tl = tl_add_blob(tl, T_seen_digest, seen_hash, dgs);
2243 tl = tl_add_blob(tl, T_calc_digest, calc_hash, dgs);
2244 tl = tl_add_int(tl, T_ee_sector, &e->sector);
2245 tl = tl_add_int(tl, T_ee_block_id, &e->block_id);
2246
2247 put_unaligned(T_ee_data, tl++);
2248 put_unaligned(e->size, tl++);
2249
2250 __bio_for_each_segment(bvec, e->private_bio, i, 0) {
2251 void *d = kmap(bvec->bv_page);
2252 memcpy(tl, d + bvec->bv_offset, bvec->bv_len);
2253 kunmap(bvec->bv_page);
2254 tl=(unsigned short*)((char*)tl + bvec->bv_len);
2255 }
2256 put_unaligned(TT_END, tl++); /* Close the tag list */
2257
2258 cn_reply->id.idx = CN_IDX_DRBD;
2259 cn_reply->id.val = CN_VAL_DRBD;
2260
2261 cn_reply->seq = atomic_add_return(1,&drbd_nl_seq);
2262 cn_reply->ack = 0; // not used here.
2263 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2264 (int)((char*)tl - (char*)reply->tag_list);
2265 cn_reply->flags = 0;
2266
2267 reply->packet_type = P_dump_ee;
2268 reply->minor = mdev_to_minor(mdev);
2269 reply->ret_code = NO_ERROR;
2270
b411b363
PR
2271 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2272 kfree(cn_reply);
2273}
2274
2275void drbd_bcast_sync_progress(struct drbd_conf *mdev)
2276{
2277 char buffer[sizeof(struct cn_msg)+
2278 sizeof(struct drbd_nl_cfg_reply)+
2279 sizeof(struct sync_progress_tag_len_struct)+
2280 sizeof(short int)];
2281 struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2282 struct drbd_nl_cfg_reply *reply =
2283 (struct drbd_nl_cfg_reply *)cn_reply->data;
2284 unsigned short *tl = reply->tag_list;
2285 unsigned long rs_left;
2286 unsigned int res;
2287
2288 /* no local ref, no bitmap, no syncer progress, no broadcast. */
2289 if (!get_ldev(mdev))
2290 return;
2291 drbd_get_syncer_progress(mdev, &rs_left, &res);
2292 put_ldev(mdev);
2293
2294 tl = tl_add_int(tl, T_sync_progress, &res);
2295 put_unaligned(TT_END, tl++); /* Close the tag list */
2296
2297 cn_reply->id.idx = CN_IDX_DRBD;
2298 cn_reply->id.val = CN_VAL_DRBD;
2299
2300 cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2301 cn_reply->ack = 0; /* not used here. */
2302 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2303 (int)((char *)tl - (char *)reply->tag_list);
2304 cn_reply->flags = 0;
2305
2306 reply->packet_type = P_sync_progress;
2307 reply->minor = mdev_to_minor(mdev);
2308 reply->ret_code = NO_ERROR;
2309
b411b363
PR
2310 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2311}
2312
2313int __init drbd_nl_init(void)
2314{
2315 static struct cb_id cn_id_drbd;
2316 int err, try=10;
2317
2318 cn_id_drbd.val = CN_VAL_DRBD;
2319 do {
2320 cn_id_drbd.idx = cn_idx;
2321 err = cn_add_callback(&cn_id_drbd, "cn_drbd", &drbd_connector_callback);
2322 if (!err)
2323 break;
2324 cn_idx = (cn_idx + CN_IDX_STEP);
2325 } while (try--);
2326
2327 if (err) {
2328 printk(KERN_ERR "drbd: cn_drbd failed to register\n");
2329 return err;
2330 }
2331
2332 return 0;
2333}
2334
2335void drbd_nl_cleanup(void)
2336{
2337 static struct cb_id cn_id_drbd;
2338
2339 cn_id_drbd.idx = cn_idx;
2340 cn_id_drbd.val = CN_VAL_DRBD;
2341
2342 cn_del_callback(&cn_id_drbd);
2343}
2344
2345void drbd_nl_send_reply(struct cn_msg *req, int ret_code)
2346{
2347 char buffer[sizeof(struct cn_msg)+sizeof(struct drbd_nl_cfg_reply)];
2348 struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2349 struct drbd_nl_cfg_reply *reply =
2350 (struct drbd_nl_cfg_reply *)cn_reply->data;
2351 int rr;
2352
2353 cn_reply->id = req->id;
2354
2355 cn_reply->seq = req->seq;
2356 cn_reply->ack = req->ack + 1;
2357 cn_reply->len = sizeof(struct drbd_nl_cfg_reply);
2358 cn_reply->flags = 0;
2359
2360 reply->minor = ((struct drbd_nl_cfg_req *)req->data)->drbd_minor;
2361 reply->ret_code = ret_code;
2362
b411b363
PR
2363 rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2364 if (rr && rr != -ESRCH)
2365 printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
2366}
2367