Linux Audio

Check our new training course

Loading...
v3.1
 
   1/*
   2   drbd_receiver.c
   3
   4   This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
   5
   6   Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
   7   Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
   8   Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
   9
  10   drbd is free software; you can redistribute it and/or modify
  11   it under the terms of the GNU General Public License as published by
  12   the Free Software Foundation; either version 2, or (at your option)
  13   any later version.
  14
  15   drbd is distributed in the hope that it will be useful,
  16   but WITHOUT ANY WARRANTY; without even the implied warranty of
  17   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  18   GNU General Public License for more details.
  19
  20   You should have received a copy of the GNU General Public License
  21   along with drbd; see the file COPYING.  If not, write to
  22   the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
  23 */
  24
  25
  26#include <linux/module.h>
  27
  28#include <asm/uaccess.h>
  29#include <net/sock.h>
  30
  31#include <linux/drbd.h>
  32#include <linux/fs.h>
  33#include <linux/file.h>
  34#include <linux/in.h>
  35#include <linux/mm.h>
  36#include <linux/memcontrol.h>
  37#include <linux/mm_inline.h>
  38#include <linux/slab.h>
 
 
  39#include <linux/pkt_sched.h>
  40#define __KERNEL_SYSCALLS__
  41#include <linux/unistd.h>
  42#include <linux/vmalloc.h>
  43#include <linux/random.h>
  44#include <linux/string.h>
  45#include <linux/scatterlist.h>
 
  46#include "drbd_int.h"
 
  47#include "drbd_req.h"
  48
  49#include "drbd_vli.h"
  50
 
 
 
 
 
 
 
 
 
  51enum finish_epoch {
  52	FE_STILL_LIVE,
  53	FE_DESTROYED,
  54	FE_RECYCLED,
  55};
  56
  57static int drbd_do_handshake(struct drbd_conf *mdev);
  58static int drbd_do_auth(struct drbd_conf *mdev);
  59
  60static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *, struct drbd_epoch *, enum epoch_event);
  61static int e_end_block(struct drbd_conf *, struct drbd_work *, int);
 
  62
  63
  64#define GFP_TRY	(__GFP_HIGHMEM | __GFP_NOWARN)
  65
  66/*
  67 * some helper functions to deal with single linked page lists,
  68 * page->private being our "next" pointer.
  69 */
  70
  71/* If at least n pages are linked at head, get n pages off.
  72 * Otherwise, don't modify head, and return NULL.
  73 * Locking is the responsibility of the caller.
  74 */
  75static struct page *page_chain_del(struct page **head, int n)
  76{
  77	struct page *page;
  78	struct page *tmp;
  79
  80	BUG_ON(!n);
  81	BUG_ON(!head);
  82
  83	page = *head;
  84
  85	if (!page)
  86		return NULL;
  87
  88	while (page) {
  89		tmp = page_chain_next(page);
  90		if (--n == 0)
  91			break; /* found sufficient pages */
  92		if (tmp == NULL)
  93			/* insufficient pages, don't use any of them. */
  94			return NULL;
  95		page = tmp;
  96	}
  97
  98	/* add end of list marker for the returned list */
  99	set_page_private(page, 0);
 100	/* actual return value, and adjustment of head */
 101	page = *head;
 102	*head = tmp;
 103	return page;
 104}
 105
 106/* may be used outside of locks to find the tail of a (usually short)
 107 * "private" page chain, before adding it back to a global chain head
 108 * with page_chain_add() under a spinlock. */
 109static struct page *page_chain_tail(struct page *page, int *len)
 110{
 111	struct page *tmp;
 112	int i = 1;
 113	while ((tmp = page_chain_next(page)))
 114		++i, page = tmp;
 
 
 115	if (len)
 116		*len = i;
 117	return page;
 118}
 119
 120static int page_chain_free(struct page *page)
 121{
 122	struct page *tmp;
 123	int i = 0;
 124	page_chain_for_each_safe(page, tmp) {
 125		put_page(page);
 126		++i;
 127	}
 128	return i;
 129}
 130
 131static void page_chain_add(struct page **head,
 132		struct page *chain_first, struct page *chain_last)
 133{
 134#if 1
 135	struct page *tmp;
 136	tmp = page_chain_tail(chain_first, NULL);
 137	BUG_ON(tmp != chain_last);
 138#endif
 139
 140	/* add chain to head */
 141	set_page_private(chain_last, (unsigned long)*head);
 142	*head = chain_first;
 143}
 144
 145static struct page *drbd_pp_first_pages_or_try_alloc(struct drbd_conf *mdev, int number)
 
 146{
 147	struct page *page = NULL;
 148	struct page *tmp = NULL;
 149	int i = 0;
 150
 151	/* Yes, testing drbd_pp_vacant outside the lock is racy.
 152	 * So what. It saves a spin_lock. */
 153	if (drbd_pp_vacant >= number) {
 154		spin_lock(&drbd_pp_lock);
 155		page = page_chain_del(&drbd_pp_pool, number);
 156		if (page)
 157			drbd_pp_vacant -= number;
 158		spin_unlock(&drbd_pp_lock);
 159		if (page)
 160			return page;
 161	}
 162
 163	/* GFP_TRY, because we must not cause arbitrary write-out: in a DRBD
 164	 * "criss-cross" setup, that might cause write-out on some other DRBD,
 165	 * which in turn might block on the other node at this very place.  */
 166	for (i = 0; i < number; i++) {
 167		tmp = alloc_page(GFP_TRY);
 168		if (!tmp)
 169			break;
 170		set_page_private(tmp, (unsigned long)page);
 171		page = tmp;
 172	}
 173
 174	if (i == number)
 175		return page;
 176
 177	/* Not enough pages immediately available this time.
 178	 * No need to jump around here, drbd_pp_alloc will retry this
 179	 * function "soon". */
 180	if (page) {
 181		tmp = page_chain_tail(page, NULL);
 182		spin_lock(&drbd_pp_lock);
 183		page_chain_add(&drbd_pp_pool, page, tmp);
 184		drbd_pp_vacant += i;
 185		spin_unlock(&drbd_pp_lock);
 186	}
 187	return NULL;
 188}
 189
 190static void reclaim_net_ee(struct drbd_conf *mdev, struct list_head *to_be_freed)
 
 191{
 192	struct drbd_epoch_entry *e;
 193	struct list_head *le, *tle;
 194
 195	/* The EEs are always appended to the end of the list. Since
 196	   they are sent in order over the wire, they have to finish
 197	   in order. As soon as we see the first not finished we can
 198	   stop to examine the list... */
 199
 200	list_for_each_safe(le, tle, &mdev->net_ee) {
 201		e = list_entry(le, struct drbd_epoch_entry, w.list);
 202		if (drbd_ee_has_active_page(e))
 203			break;
 204		list_move(le, to_be_freed);
 205	}
 206}
 207
 208static void drbd_kick_lo_and_reclaim_net(struct drbd_conf *mdev)
 209{
 210	LIST_HEAD(reclaimed);
 211	struct drbd_epoch_entry *e, *t;
 
 
 
 
 
 
 
 
 
 
 
 
 212
 213	spin_lock_irq(&mdev->req_lock);
 214	reclaim_net_ee(mdev, &reclaimed);
 215	spin_unlock_irq(&mdev->req_lock);
 
 
 216
 217	list_for_each_entry_safe(e, t, &reclaimed, w.list)
 218		drbd_free_net_ee(mdev, e);
 
 
 
 
 
 219}
 220
 221/**
 222 * drbd_pp_alloc() - Returns @number pages, retries forever (or until signalled)
 223 * @mdev:	DRBD device.
 224 * @number:	number of pages requested
 225 * @retry:	whether to retry, if not enough pages are available right now
 226 *
 227 * Tries to allocate number pages, first from our own page pool, then from
 228 * the kernel, unless this allocation would exceed the max_buffers setting.
 229 * Possibly retry until DRBD frees sufficient pages somewhere else.
 230 *
 
 
 
 
 
 
 
 
 231 * Returns a page chain linked via page->private.
 232 */
 233static struct page *drbd_pp_alloc(struct drbd_conf *mdev, unsigned number, bool retry)
 
 234{
 
 235	struct page *page = NULL;
 
 236	DEFINE_WAIT(wait);
 
 237
 238	/* Yes, we may run up to @number over max_buffers. If we
 239	 * follow it strictly, the admin will get it wrong anyways. */
 240	if (atomic_read(&mdev->pp_in_use) < mdev->net_conf->max_buffers)
 241		page = drbd_pp_first_pages_or_try_alloc(mdev, number);
 
 
 
 
 
 
 
 
 242
 243	while (page == NULL) {
 244		prepare_to_wait(&drbd_pp_wait, &wait, TASK_INTERRUPTIBLE);
 245
 246		drbd_kick_lo_and_reclaim_net(mdev);
 247
 248		if (atomic_read(&mdev->pp_in_use) < mdev->net_conf->max_buffers) {
 249			page = drbd_pp_first_pages_or_try_alloc(mdev, number);
 250			if (page)
 251				break;
 252		}
 253
 254		if (!retry)
 255			break;
 256
 257		if (signal_pending(current)) {
 258			dev_warn(DEV, "drbd_pp_alloc interrupted!\n");
 259			break;
 260		}
 261
 262		schedule();
 
 263	}
 264	finish_wait(&drbd_pp_wait, &wait);
 265
 266	if (page)
 267		atomic_add(number, &mdev->pp_in_use);
 268	return page;
 269}
 270
 271/* Must not be used from irq, as that may deadlock: see drbd_pp_alloc.
 272 * Is also used from inside an other spin_lock_irq(&mdev->req_lock);
 273 * Either links the page chain back to the global pool,
 274 * or returns all pages to the system. */
 275static void drbd_pp_free(struct drbd_conf *mdev, struct page *page, int is_net)
 276{
 277	atomic_t *a = is_net ? &mdev->pp_in_use_by_net : &mdev->pp_in_use;
 278	int i;
 279
 280	if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE)*minor_count)
 
 
 
 281		i = page_chain_free(page);
 282	else {
 283		struct page *tmp;
 284		tmp = page_chain_tail(page, &i);
 285		spin_lock(&drbd_pp_lock);
 286		page_chain_add(&drbd_pp_pool, page, tmp);
 287		drbd_pp_vacant += i;
 288		spin_unlock(&drbd_pp_lock);
 289	}
 290	i = atomic_sub_return(i, a);
 291	if (i < 0)
 292		dev_warn(DEV, "ASSERTION FAILED: %s: %d < 0\n",
 293			is_net ? "pp_in_use_by_net" : "pp_in_use", i);
 294	wake_up(&drbd_pp_wait);
 295}
 296
 297/*
 298You need to hold the req_lock:
 299 _drbd_wait_ee_list_empty()
 300
 301You must not have the req_lock:
 302 drbd_free_ee()
 303 drbd_alloc_ee()
 304 drbd_init_ee()
 305 drbd_release_ee()
 306 drbd_ee_fix_bhs()
 307 drbd_process_done_ee()
 308 drbd_clear_done_ee()
 309 drbd_wait_ee_list_empty()
 310*/
 311
 312struct drbd_epoch_entry *drbd_alloc_ee(struct drbd_conf *mdev,
 313				     u64 id,
 314				     sector_t sector,
 315				     unsigned int data_size,
 316				     gfp_t gfp_mask) __must_hold(local)
 
 317{
 318	struct drbd_epoch_entry *e;
 319	struct page *page;
 320	unsigned nr_pages = (data_size + PAGE_SIZE -1) >> PAGE_SHIFT;
 
 321
 322	if (drbd_insert_fault(mdev, DRBD_FAULT_AL_EE))
 323		return NULL;
 324
 325	e = mempool_alloc(drbd_ee_mempool, gfp_mask & ~__GFP_HIGHMEM);
 326	if (!e) {
 327		if (!(gfp_mask & __GFP_NOWARN))
 328			dev_err(DEV, "alloc_ee: Allocation of an EE failed\n");
 329		return NULL;
 330	}
 331
 332	page = drbd_pp_alloc(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
 333	if (!page)
 334		goto fail;
 335
 336	INIT_HLIST_NODE(&e->collision);
 337	e->epoch = NULL;
 338	e->mdev = mdev;
 339	e->pages = page;
 340	atomic_set(&e->pending_bios, 0);
 341	e->size = data_size;
 342	e->flags = 0;
 343	e->sector = sector;
 344	e->block_id = id;
 
 
 
 
 
 
 
 345
 346	return e;
 347
 348 fail:
 349	mempool_free(e, drbd_ee_mempool);
 350	return NULL;
 351}
 352
 353void drbd_free_some_ee(struct drbd_conf *mdev, struct drbd_epoch_entry *e, int is_net)
 
 354{
 355	if (e->flags & EE_HAS_DIGEST)
 356		kfree(e->digest);
 357	drbd_pp_free(mdev, e->pages, is_net);
 358	D_ASSERT(atomic_read(&e->pending_bios) == 0);
 359	D_ASSERT(hlist_unhashed(&e->collision));
 360	mempool_free(e, drbd_ee_mempool);
 
 
 
 
 
 361}
 362
 363int drbd_release_ee(struct drbd_conf *mdev, struct list_head *list)
 364{
 365	LIST_HEAD(work_list);
 366	struct drbd_epoch_entry *e, *t;
 367	int count = 0;
 368	int is_net = list == &mdev->net_ee;
 369
 370	spin_lock_irq(&mdev->req_lock);
 371	list_splice_init(list, &work_list);
 372	spin_unlock_irq(&mdev->req_lock);
 373
 374	list_for_each_entry_safe(e, t, &work_list, w.list) {
 375		drbd_free_some_ee(mdev, e, is_net);
 376		count++;
 377	}
 378	return count;
 379}
 380
 381
 382/*
 383 * This function is called from _asender only_
 384 * but see also comments in _req_mod(,barrier_acked)
 385 * and receive_Barrier.
 386 *
 387 * Move entries from net_ee to done_ee, if ready.
 388 * Grab done_ee, call all callbacks, free the entries.
 389 * The callbacks typically send out ACKs.
 390 */
 391static int drbd_process_done_ee(struct drbd_conf *mdev)
 392{
 393	LIST_HEAD(work_list);
 394	LIST_HEAD(reclaimed);
 395	struct drbd_epoch_entry *e, *t;
 396	int ok = (mdev->state.conn >= C_WF_REPORT_PARAMS);
 397
 398	spin_lock_irq(&mdev->req_lock);
 399	reclaim_net_ee(mdev, &reclaimed);
 400	list_splice_init(&mdev->done_ee, &work_list);
 401	spin_unlock_irq(&mdev->req_lock);
 402
 403	list_for_each_entry_safe(e, t, &reclaimed, w.list)
 404		drbd_free_net_ee(mdev, e);
 405
 406	/* possible callbacks here:
 407	 * e_end_block, and e_end_resync_block, e_send_discard_ack.
 408	 * all ignore the last argument.
 409	 */
 410	list_for_each_entry_safe(e, t, &work_list, w.list) {
 
 
 411		/* list_del not necessary, next/prev members not touched */
 412		ok = e->w.cb(mdev, &e->w, !ok) && ok;
 413		drbd_free_ee(mdev, e);
 
 
 414	}
 415	wake_up(&mdev->ee_wait);
 416
 417	return ok;
 418}
 419
 420void _drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
 
 421{
 422	DEFINE_WAIT(wait);
 423
 424	/* avoids spin_lock/unlock
 425	 * and calling prepare_to_wait in the fast path */
 426	while (!list_empty(head)) {
 427		prepare_to_wait(&mdev->ee_wait, &wait, TASK_UNINTERRUPTIBLE);
 428		spin_unlock_irq(&mdev->req_lock);
 429		io_schedule();
 430		finish_wait(&mdev->ee_wait, &wait);
 431		spin_lock_irq(&mdev->req_lock);
 432	}
 433}
 434
 435void drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
 
 436{
 437	spin_lock_irq(&mdev->req_lock);
 438	_drbd_wait_ee_list_empty(mdev, head);
 439	spin_unlock_irq(&mdev->req_lock);
 440}
 441
 442/* see also kernel_accept; which is only present since 2.6.18.
 443 * also we want to log which part of it failed, exactly */
 444static int drbd_accept(struct drbd_conf *mdev, const char **what,
 445		struct socket *sock, struct socket **newsock)
 446{
 447	struct sock *sk = sock->sk;
 448	int err = 0;
 449
 450	*what = "listen";
 451	err = sock->ops->listen(sock, 5);
 452	if (err < 0)
 453		goto out;
 454
 455	*what = "sock_create_lite";
 456	err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
 457			       newsock);
 458	if (err < 0)
 459		goto out;
 460
 461	*what = "accept";
 462	err = sock->ops->accept(sock, *newsock, 0);
 463	if (err < 0) {
 464		sock_release(*newsock);
 465		*newsock = NULL;
 466		goto out;
 467	}
 468	(*newsock)->ops  = sock->ops;
 469
 470out:
 471	return err;
 472}
 473
 474static int drbd_recv_short(struct drbd_conf *mdev, struct socket *sock,
 475		    void *buf, size_t size, int flags)
 476{
 477	mm_segment_t oldfs;
 478	struct kvec iov = {
 479		.iov_base = buf,
 480		.iov_len = size,
 481	};
 482	struct msghdr msg = {
 483		.msg_iovlen = 1,
 484		.msg_iov = (struct iovec *)&iov,
 485		.msg_flags = (flags ? flags : MSG_WAITALL | MSG_NOSIGNAL)
 486	};
 487	int rv;
 488
 489	oldfs = get_fs();
 490	set_fs(KERNEL_DS);
 491	rv = sock_recvmsg(sock, &msg, size, msg.msg_flags);
 492	set_fs(oldfs);
 493
 494	return rv;
 495}
 496
 497static int drbd_recv(struct drbd_conf *mdev, void *buf, size_t size)
 498{
 499	mm_segment_t oldfs;
 500	struct kvec iov = {
 501		.iov_base = buf,
 502		.iov_len = size,
 503	};
 504	struct msghdr msg = {
 505		.msg_iovlen = 1,
 506		.msg_iov = (struct iovec *)&iov,
 507		.msg_flags = MSG_WAITALL | MSG_NOSIGNAL
 508	};
 509	int rv;
 510
 511	oldfs = get_fs();
 512	set_fs(KERNEL_DS);
 513
 514	for (;;) {
 515		rv = sock_recvmsg(mdev->data.socket, &msg, size, msg.msg_flags);
 516		if (rv == size)
 517			break;
 
 
 
 
 
 
 
 518
 519		/* Note:
 520		 * ECONNRESET	other side closed the connection
 521		 * ERESTARTSYS	(on  sock) we got a signal
 522		 */
 523
 524		if (rv < 0) {
 525			if (rv == -ECONNRESET)
 526				dev_info(DEV, "sock was reset by peer\n");
 527			else if (rv != -ERESTARTSYS)
 528				dev_err(DEV, "sock_recvmsg returned %d\n", rv);
 529			break;
 530		} else if (rv == 0) {
 531			dev_info(DEV, "sock was shut down by peer\n");
 532			break;
 533		} else	{
 534			/* signal came in, or peer/link went down,
 535			 * after we read a partial message
 536			 */
 537			/* D_ASSERT(signal_pending(current)); */
 538			break;
 539		}
 540	};
 541
 542	set_fs(oldfs);
 543
 544	if (rv != size)
 545		drbd_force_state(mdev, NS(conn, C_BROKEN_PIPE));
 546
 
 547	return rv;
 548}
 549
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 550/* quoting tcp(7):
 551 *   On individual connections, the socket buffer size must be set prior to the
 552 *   listen(2) or connect(2) calls in order to have it take effect.
 553 * This is our wrapper to do so.
 554 */
 555static void drbd_setbufsize(struct socket *sock, unsigned int snd,
 556		unsigned int rcv)
 557{
 558	/* open coded SO_SNDBUF, SO_RCVBUF */
 559	if (snd) {
 560		sock->sk->sk_sndbuf = snd;
 561		sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
 562	}
 563	if (rcv) {
 564		sock->sk->sk_rcvbuf = rcv;
 565		sock->sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
 566	}
 567}
 568
 569static struct socket *drbd_try_connect(struct drbd_conf *mdev)
 570{
 571	const char *what;
 572	struct socket *sock;
 573	struct sockaddr_in6 src_in6;
 574	int err;
 
 
 
 575	int disconnect_on_error = 1;
 576
 577	if (!get_net_conf(mdev))
 
 
 
 578		return NULL;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 579
 580	what = "sock_create_kern";
 581	err = sock_create_kern(((struct sockaddr *)mdev->net_conf->my_addr)->sa_family,
 582		SOCK_STREAM, IPPROTO_TCP, &sock);
 583	if (err < 0) {
 584		sock = NULL;
 585		goto out;
 586	}
 587
 588	sock->sk->sk_rcvtimeo =
 589	sock->sk->sk_sndtimeo =  mdev->net_conf->try_connect_int*HZ;
 590	drbd_setbufsize(sock, mdev->net_conf->sndbuf_size,
 591			mdev->net_conf->rcvbuf_size);
 592
 593       /* explicitly bind to the configured IP as source IP
 594	*  for the outgoing connections.
 595	*  This is needed for multihomed hosts and to be
 596	*  able to use lo: interfaces for drbd.
 597	* Make sure to use 0 as port number, so linux selects
 598	*  a free one dynamically.
 599	*/
 600	memcpy(&src_in6, mdev->net_conf->my_addr,
 601	       min_t(int, mdev->net_conf->my_addr_len, sizeof(src_in6)));
 602	if (((struct sockaddr *)mdev->net_conf->my_addr)->sa_family == AF_INET6)
 603		src_in6.sin6_port = 0;
 604	else
 605		((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
 606
 607	what = "bind before connect";
 608	err = sock->ops->bind(sock,
 609			      (struct sockaddr *) &src_in6,
 610			      mdev->net_conf->my_addr_len);
 611	if (err < 0)
 612		goto out;
 613
 614	/* connect may fail, peer not yet available.
 615	 * stay C_WF_CONNECTION, don't go Disconnecting! */
 616	disconnect_on_error = 0;
 617	what = "connect";
 618	err = sock->ops->connect(sock,
 619				 (struct sockaddr *)mdev->net_conf->peer_addr,
 620				 mdev->net_conf->peer_addr_len, 0);
 621
 622out:
 623	if (err < 0) {
 624		if (sock) {
 625			sock_release(sock);
 626			sock = NULL;
 627		}
 628		switch (-err) {
 629			/* timeout, busy, signal pending */
 630		case ETIMEDOUT: case EAGAIN: case EINPROGRESS:
 631		case EINTR: case ERESTARTSYS:
 632			/* peer not (yet) available, network problem */
 633		case ECONNREFUSED: case ENETUNREACH:
 634		case EHOSTDOWN:    case EHOSTUNREACH:
 635			disconnect_on_error = 0;
 636			break;
 637		default:
 638			dev_err(DEV, "%s failed, err = %d\n", what, err);
 639		}
 640		if (disconnect_on_error)
 641			drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
 642	}
 643	put_net_conf(mdev);
 644	return sock;
 645}
 646
 647static struct socket *drbd_wait_for_connect(struct drbd_conf *mdev)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 648{
 649	int timeo, err;
 650	struct socket *s_estab = NULL, *s_listen;
 
 
 651	const char *what;
 652
 653	if (!get_net_conf(mdev))
 654		return NULL;
 
 
 
 
 
 
 
 
 
 
 655
 656	what = "sock_create_kern";
 657	err = sock_create_kern(((struct sockaddr *)mdev->net_conf->my_addr)->sa_family,
 658		SOCK_STREAM, IPPROTO_TCP, &s_listen);
 659	if (err) {
 660		s_listen = NULL;
 661		goto out;
 662	}
 663
 664	timeo = mdev->net_conf->try_connect_int * HZ;
 665	timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
 666
 667	s_listen->sk->sk_reuse    = 1; /* SO_REUSEADDR */
 668	s_listen->sk->sk_rcvtimeo = timeo;
 669	s_listen->sk->sk_sndtimeo = timeo;
 670	drbd_setbufsize(s_listen, mdev->net_conf->sndbuf_size,
 671			mdev->net_conf->rcvbuf_size);
 672
 673	what = "bind before listen";
 674	err = s_listen->ops->bind(s_listen,
 675			      (struct sockaddr *) mdev->net_conf->my_addr,
 676			      mdev->net_conf->my_addr_len);
 677	if (err < 0)
 678		goto out;
 679
 680	err = drbd_accept(mdev, &what, s_listen, &s_estab);
 
 
 
 
 
 
 
 
 
 
 681
 
 682out:
 683	if (s_listen)
 684		sock_release(s_listen);
 685	if (err < 0) {
 686		if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
 687			dev_err(DEV, "%s failed, err = %d\n", what, err);
 688			drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
 689		}
 690	}
 691	put_net_conf(mdev);
 692
 693	return s_estab;
 
 
 
 
 
 
 
 
 694}
 695
 696static int drbd_send_fp(struct drbd_conf *mdev,
 697	struct socket *sock, enum drbd_packets cmd)
 698{
 699	struct p_header80 *h = &mdev->data.sbuf.header.h80;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 700
 701	return _drbd_send_cmd(mdev, sock, cmd, h, sizeof(*h), 0);
 
 
 
 
 
 
 
 
 
 
 
 702}
 703
 704static enum drbd_packets drbd_recv_fp(struct drbd_conf *mdev, struct socket *sock)
 
 
 
 705{
 706	struct p_header80 *h = &mdev->data.rbuf.header.h80;
 707	int rr;
 
 
 708
 709	rr = drbd_recv_short(mdev, sock, h, sizeof(*h), 0);
 
 
 
 
 
 710
 711	if (rr == sizeof(*h) && h->magic == BE_DRBD_MAGIC)
 712		return be16_to_cpu(h->command);
 
 
 
 
 
 
 713
 714	return 0xffff;
 
 
 
 
 
 
 
 
 
 715}
 716
 717/**
 718 * drbd_socket_okay() - Free the socket if its connection is not okay
 719 * @mdev:	DRBD device.
 720 * @sock:	pointer to the pointer to the socket.
 721 */
 722static int drbd_socket_okay(struct drbd_conf *mdev, struct socket **sock)
 723{
 724	int rr;
 725	char tb[4];
 726
 727	if (!*sock)
 728		return false;
 729
 730	rr = drbd_recv_short(mdev, *sock, tb, 4, MSG_DONTWAIT | MSG_PEEK);
 731
 732	if (rr > 0 || rr == -EAGAIN) {
 733		return true;
 734	} else {
 735		sock_release(*sock);
 736		*sock = NULL;
 737		return false;
 738	}
 739}
 740
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 741/*
 742 * return values:
 743 *   1 yes, we have a valid connection
 744 *   0 oops, did not work out, please try again
 745 *  -1 peer talks different language,
 746 *     no point in trying again, please go standalone.
 747 *  -2 We do not have a network config...
 748 */
 749static int drbd_connect(struct drbd_conf *mdev)
 750{
 751	struct socket *s, *sock, *msock;
 752	int try, h, ok;
 753
 754	D_ASSERT(!mdev->data.socket);
 
 
 
 
 
 
 755
 756	if (drbd_request_state(mdev, NS(conn, C_WF_CONNECTION)) < SS_SUCCESS)
 
 757		return -2;
 758
 759	clear_bit(DISCARD_CONCURRENT, &mdev->flags);
 
 
 
 
 
 
 
 760
 761	sock  = NULL;
 762	msock = NULL;
 
 
 
 763
 764	do {
 765		for (try = 0;;) {
 766			/* 3 tries, this should take less than a second! */
 767			s = drbd_try_connect(mdev);
 768			if (s || ++try >= 3)
 769				break;
 770			/* give the other side time to call bind() & listen() */
 771			schedule_timeout_interruptible(HZ / 10);
 772		}
 773
 
 774		if (s) {
 775			if (!sock) {
 776				drbd_send_fp(mdev, s, P_HAND_SHAKE_S);
 777				sock = s;
 778				s = NULL;
 779			} else if (!msock) {
 780				drbd_send_fp(mdev, s, P_HAND_SHAKE_M);
 781				msock = s;
 782				s = NULL;
 783			} else {
 784				dev_err(DEV, "Logic error in drbd_connect()\n");
 785				goto out_release_sockets;
 786			}
 787		}
 788
 789		if (sock && msock) {
 790			schedule_timeout_interruptible(mdev->net_conf->ping_timeo*HZ/10);
 791			ok = drbd_socket_okay(mdev, &sock);
 792			ok = drbd_socket_okay(mdev, &msock) && ok;
 793			if (ok)
 794				break;
 795		}
 796
 797retry:
 798		s = drbd_wait_for_connect(mdev);
 799		if (s) {
 800			try = drbd_recv_fp(mdev, s);
 801			drbd_socket_okay(mdev, &sock);
 802			drbd_socket_okay(mdev, &msock);
 803			switch (try) {
 804			case P_HAND_SHAKE_S:
 805				if (sock) {
 806					dev_warn(DEV, "initial packet S crossed\n");
 807					sock_release(sock);
 
 
 808				}
 809				sock = s;
 810				break;
 811			case P_HAND_SHAKE_M:
 812				if (msock) {
 813					dev_warn(DEV, "initial packet M crossed\n");
 814					sock_release(msock);
 
 
 
 815				}
 816				msock = s;
 817				set_bit(DISCARD_CONCURRENT, &mdev->flags);
 818				break;
 819			default:
 820				dev_warn(DEV, "Error receiving initial packet\n");
 821				sock_release(s);
 822				if (random32() & 1)
 
 823					goto retry;
 824			}
 825		}
 826
 827		if (mdev->state.conn <= C_DISCONNECTING)
 828			goto out_release_sockets;
 829		if (signal_pending(current)) {
 830			flush_signals(current);
 831			smp_rmb();
 832			if (get_t_state(&mdev->receiver) == Exiting)
 833				goto out_release_sockets;
 834		}
 835
 836		if (sock && msock) {
 837			ok = drbd_socket_okay(mdev, &sock);
 838			ok = drbd_socket_okay(mdev, &msock) && ok;
 839			if (ok)
 840				break;
 841		}
 842	} while (1);
 843
 844	msock->sk->sk_reuse = 1; /* SO_REUSEADDR */
 845	sock->sk->sk_reuse = 1; /* SO_REUSEADDR */
 846
 847	sock->sk->sk_allocation = GFP_NOIO;
 848	msock->sk->sk_allocation = GFP_NOIO;
 849
 850	sock->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
 851	msock->sk->sk_priority = TC_PRIO_INTERACTIVE;
 
 
 
 
 
 
 852
 853	/* NOT YET ...
 854	 * sock->sk->sk_sndtimeo = mdev->net_conf->timeout*HZ/10;
 855	 * sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
 856	 * first set it to the P_HAND_SHAKE timeout,
 857	 * which we set to 4x the configured ping_timeout. */
 858	sock->sk->sk_sndtimeo =
 859	sock->sk->sk_rcvtimeo = mdev->net_conf->ping_timeo*4*HZ/10;
 
 
 
 
 
 
 
 
 860
 861	msock->sk->sk_sndtimeo = mdev->net_conf->timeout*HZ/10;
 862	msock->sk->sk_rcvtimeo = mdev->net_conf->ping_int*HZ;
 863
 864	/* we don't want delays.
 865	 * we use TCP_CORK where appropriate, though */
 866	drbd_tcp_nodelay(sock);
 867	drbd_tcp_nodelay(msock);
 868
 869	mdev->data.socket = sock;
 870	mdev->meta.socket = msock;
 871	mdev->last_received = jiffies;
 872
 873	D_ASSERT(mdev->asender.task == NULL);
 874
 875	h = drbd_do_handshake(mdev);
 876	if (h <= 0)
 877		return h;
 878
 879	if (mdev->cram_hmac_tfm) {
 880		/* drbd_request_state(mdev, NS(conn, WFAuth)); */
 881		switch (drbd_do_auth(mdev)) {
 882		case -1:
 883			dev_err(DEV, "Authentication of peer failed\n");
 884			return -1;
 885		case 0:
 886			dev_err(DEV, "Authentication of peer failed, trying again.\n");
 887			return 0;
 888		}
 889	}
 890
 891	if (drbd_request_state(mdev, NS(conn, C_WF_REPORT_PARAMS)) < SS_SUCCESS)
 892		return 0;
 
 
 
 893
 894	sock->sk->sk_sndtimeo = mdev->net_conf->timeout*HZ/10;
 895	sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
 
 
 
 
 
 
 
 896
 897	atomic_set(&mdev->packet_seq, 0);
 898	mdev->peer_seq = 0;
 
 
 
 
 
 
 
 
 
 
 
 899
 900	drbd_thread_start(&mdev->asender);
 
 
 
 901
 902	if (drbd_send_protocol(mdev) == -1)
 903		return -1;
 904	drbd_send_sync_param(mdev, &mdev->sync_conf);
 905	drbd_send_sizes(mdev, 0, 0);
 906	drbd_send_uuids(mdev);
 907	drbd_send_state(mdev);
 908	clear_bit(USE_DEGR_WFC_T, &mdev->flags);
 909	clear_bit(RESIZE_PENDING, &mdev->flags);
 910	mod_timer(&mdev->request_timer, jiffies + HZ); /* just start it here. */
 911
 912	return 1;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 913
 914out_release_sockets:
 915	if (sock)
 916		sock_release(sock);
 917	if (msock)
 918		sock_release(msock);
 
 
 919	return -1;
 920}
 921
 922static int drbd_recv_header(struct drbd_conf *mdev, enum drbd_packets *cmd, unsigned int *packet_size)
 923{
 924	union p_header *h = &mdev->data.rbuf.header;
 925	int r;
 926
 927	r = drbd_recv(mdev, h, sizeof(*h));
 928	if (unlikely(r != sizeof(*h))) {
 929		if (!signal_pending(current))
 930			dev_warn(DEV, "short read expecting header on sock: r=%d\n", r);
 931		return false;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 932	}
 
 
 
 933
 934	if (likely(h->h80.magic == BE_DRBD_MAGIC)) {
 935		*cmd = be16_to_cpu(h->h80.command);
 936		*packet_size = be16_to_cpu(h->h80.length);
 937	} else if (h->h95.magic == BE_DRBD_MAGIC_BIG) {
 938		*cmd = be16_to_cpu(h->h95.command);
 939		*packet_size = be32_to_cpu(h->h95.length);
 940	} else {
 941		dev_err(DEV, "magic?? on data m: 0x%08x c: %d l: %d\n",
 942		    be32_to_cpu(h->h80.magic),
 943		    be16_to_cpu(h->h80.command),
 944		    be16_to_cpu(h->h80.length));
 945		return false;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 946	}
 947	mdev->last_received = jiffies;
 948
 949	return true;
 
 
 
 950}
 
 
 
 
 
 
 
 
 
 
 
 
 
 951
 952static void drbd_flush(struct drbd_conf *mdev)
 953{
 954	int rv;
 
 
 955
 956	if (mdev->write_ordering >= WO_bdev_flush && get_ldev(mdev)) {
 957		rv = blkdev_issue_flush(mdev->ldev->backing_bdev, GFP_KERNEL,
 958					NULL);
 959		if (rv) {
 960			dev_err(DEV, "local disk flush failed with status %d\n", rv);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 961			/* would rather check on EOPNOTSUPP, but that is not reliable.
 962			 * don't try again for ANY return value != 0
 963			 * if (rv == -EOPNOTSUPP) */
 964			drbd_bump_write_ordering(mdev, WO_drain_io);
 
 965		}
 966		put_ldev(mdev);
 967	}
 968}
 969
 970/**
 971 * drbd_may_finish_epoch() - Applies an epoch_event to the epoch's state, eventually finishes it.
 972 * @mdev:	DRBD device.
 973 * @epoch:	Epoch object.
 974 * @ev:		Epoch event.
 975 */
 976static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
 977					       struct drbd_epoch *epoch,
 978					       enum epoch_event ev)
 979{
 980	int epoch_size;
 981	struct drbd_epoch *next_epoch;
 982	enum finish_epoch rv = FE_STILL_LIVE;
 983
 984	spin_lock(&mdev->epoch_lock);
 985	do {
 986		next_epoch = NULL;
 987
 988		epoch_size = atomic_read(&epoch->epoch_size);
 989
 990		switch (ev & ~EV_CLEANUP) {
 991		case EV_PUT:
 992			atomic_dec(&epoch->active);
 993			break;
 994		case EV_GOT_BARRIER_NR:
 995			set_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags);
 996			break;
 997		case EV_BECAME_LAST:
 998			/* nothing to do*/
 999			break;
1000		}
1001
1002		if (epoch_size != 0 &&
1003		    atomic_read(&epoch->active) == 0 &&
1004		    test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags)) {
1005			if (!(ev & EV_CLEANUP)) {
1006				spin_unlock(&mdev->epoch_lock);
1007				drbd_send_b_ack(mdev, epoch->barrier_nr, epoch_size);
1008				spin_lock(&mdev->epoch_lock);
1009			}
1010			dec_unacked(mdev);
 
 
 
 
 
1011
1012			if (mdev->current_epoch != epoch) {
1013				next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
1014				list_del(&epoch->list);
1015				ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
1016				mdev->epochs--;
1017				kfree(epoch);
1018
1019				if (rv == FE_STILL_LIVE)
1020					rv = FE_DESTROYED;
1021			} else {
1022				epoch->flags = 0;
1023				atomic_set(&epoch->epoch_size, 0);
1024				/* atomic_set(&epoch->active, 0); is already zero */
1025				if (rv == FE_STILL_LIVE)
1026					rv = FE_RECYCLED;
1027				wake_up(&mdev->ee_wait);
1028			}
1029		}
1030
1031		if (!next_epoch)
1032			break;
1033
1034		epoch = next_epoch;
1035	} while (1);
1036
1037	spin_unlock(&mdev->epoch_lock);
1038
1039	return rv;
1040}
1041
1042/**
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1043 * drbd_bump_write_ordering() - Fall back to an other write ordering method
1044 * @mdev:	DRBD device.
1045 * @wo:		Write ordering method to try.
1046 */
1047void drbd_bump_write_ordering(struct drbd_conf *mdev, enum write_ordering_e wo) __must_hold(local)
 
1048{
 
1049	enum write_ordering_e pwo;
 
1050	static char *write_ordering_str[] = {
1051		[WO_none] = "none",
1052		[WO_drain_io] = "drain",
1053		[WO_bdev_flush] = "flush",
1054	};
1055
1056	pwo = mdev->write_ordering;
1057	wo = min(pwo, wo);
1058	if (wo == WO_bdev_flush && mdev->ldev->dc.no_disk_flush)
1059		wo = WO_drain_io;
1060	if (wo == WO_drain_io && mdev->ldev->dc.no_disk_drain)
1061		wo = WO_none;
1062	mdev->write_ordering = wo;
1063	if (pwo != mdev->write_ordering || wo == WO_bdev_flush)
1064		dev_info(DEV, "Method to ensure write ordering: %s\n", write_ordering_str[mdev->write_ordering]);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1065}
1066
1067/**
1068 * drbd_submit_ee()
1069 * @mdev:	DRBD device.
1070 * @e:		epoch entry
1071 * @rw:		flag field, see bio->bi_rw
1072 *
1073 * May spread the pages to multiple bios,
1074 * depending on bio_add_page restrictions.
1075 *
1076 * Returns 0 if all bios have been submitted,
1077 * -ENOMEM if we could not allocate enough bios,
1078 * -ENOSPC (any better suggestion?) if we have not been able to bio_add_page a
1079 *  single page to an empty bio (which should never happen and likely indicates
1080 *  that the lower level IO stack is in some way broken). This has been observed
1081 *  on certain Xen deployments.
1082 */
1083/* TODO allocate from our own bio_set. */
1084int drbd_submit_ee(struct drbd_conf *mdev, struct drbd_epoch_entry *e,
1085		const unsigned rw, const int fault_type)
1086{
 
1087	struct bio *bios = NULL;
1088	struct bio *bio;
1089	struct page *page = e->pages;
1090	sector_t sector = e->sector;
1091	unsigned ds = e->size;
1092	unsigned n_bios = 0;
1093	unsigned nr_pages = (ds + PAGE_SIZE -1) >> PAGE_SHIFT;
1094	int err = -ENOMEM;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1095
1096	/* In most cases, we will only need one bio.  But in case the lower
1097	 * level restrictions happen to be different at this offset on this
1098	 * side than those of the sending peer, we may need to submit the
1099	 * request in more than one bio. */
 
 
 
 
1100next_bio:
1101	bio = bio_alloc(GFP_NOIO, nr_pages);
1102	if (!bio) {
1103		dev_err(DEV, "submit_ee: Allocation of a bio failed\n");
1104		goto fail;
 
 
 
 
 
1105	}
1106	/* > e->sector, unless this is the first bio */
1107	bio->bi_sector = sector;
1108	bio->bi_bdev = mdev->ldev->backing_bdev;
1109	bio->bi_rw = rw;
1110	bio->bi_private = e;
1111	bio->bi_end_io = drbd_endio_sec;
1112
1113	bio->bi_next = bios;
1114	bios = bio;
1115	++n_bios;
1116
1117	page_chain_for_each(page) {
1118		unsigned len = min_t(unsigned, ds, PAGE_SIZE);
1119		if (!bio_add_page(bio, page, len, 0)) {
1120			/* A single page must always be possible!
1121			 * But in case it fails anyways,
1122			 * we deal with it, and complain (below). */
1123			if (bio->bi_vcnt == 0) {
1124				dev_err(DEV,
1125					"bio_add_page failed for len=%u, "
1126					"bi_vcnt=0 (bi_sector=%llu)\n",
1127					len, (unsigned long long)bio->bi_sector);
1128				err = -ENOSPC;
1129				goto fail;
1130			}
1131			goto next_bio;
1132		}
1133		ds -= len;
1134		sector += len >> 9;
1135		--nr_pages;
1136	}
1137	D_ASSERT(page == NULL);
1138	D_ASSERT(ds == 0);
1139
1140	atomic_set(&e->pending_bios, n_bios);
 
 
 
1141	do {
1142		bio = bios;
1143		bios = bios->bi_next;
1144		bio->bi_next = NULL;
1145
1146		drbd_generic_make_request(mdev, fault_type, bio);
1147	} while (bios);
1148	return 0;
 
1149
1150fail:
1151	while (bios) {
1152		bio = bios;
1153		bios = bios->bi_next;
1154		bio_put(bio);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1155	}
1156	return err;
1157}
1158
1159static int receive_Barrier(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
1160{
1161	int rv;
1162	struct p_barrier *p = &mdev->data.rbuf.barrier;
1163	struct drbd_epoch *epoch;
1164
1165	inc_unacked(mdev);
1166
1167	mdev->current_epoch->barrier_nr = p->barrier;
1168	rv = drbd_may_finish_epoch(mdev, mdev->current_epoch, EV_GOT_BARRIER_NR);
 
 
1169
1170	/* P_BARRIER_ACK may imply that the corresponding extent is dropped from
1171	 * the activity log, which means it would not be resynced in case the
1172	 * R_PRIMARY crashes now.
1173	 * Therefore we must send the barrier_ack after the barrier request was
1174	 * completed. */
1175	switch (mdev->write_ordering) {
1176	case WO_none:
1177		if (rv == FE_RECYCLED)
1178			return true;
1179
1180		/* receiver context, in the writeout path of the other node.
1181		 * avoid potential distributed deadlock */
1182		epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1183		if (epoch)
1184			break;
1185		else
1186			dev_warn(DEV, "Allocation of an epoch failed, slowing down\n");
1187			/* Fall through */
1188
1189	case WO_bdev_flush:
1190	case WO_drain_io:
1191		drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
1192		drbd_flush(mdev);
1193
1194		if (atomic_read(&mdev->current_epoch->epoch_size)) {
1195			epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1196			if (epoch)
1197				break;
1198		}
1199
1200		epoch = mdev->current_epoch;
1201		wait_event(mdev->ee_wait, atomic_read(&epoch->epoch_size) == 0);
1202
1203		D_ASSERT(atomic_read(&epoch->active) == 0);
1204		D_ASSERT(epoch->flags == 0);
1205
1206		return true;
1207	default:
1208		dev_err(DEV, "Strangeness in mdev->write_ordering %d\n", mdev->write_ordering);
1209		return false;
 
1210	}
1211
1212	epoch->flags = 0;
1213	atomic_set(&epoch->epoch_size, 0);
1214	atomic_set(&epoch->active, 0);
1215
1216	spin_lock(&mdev->epoch_lock);
1217	if (atomic_read(&mdev->current_epoch->epoch_size)) {
1218		list_add(&epoch->list, &mdev->current_epoch->list);
1219		mdev->current_epoch = epoch;
1220		mdev->epochs++;
1221	} else {
1222		/* The current_epoch got recycled while we allocated this one... */
1223		kfree(epoch);
1224	}
1225	spin_unlock(&mdev->epoch_lock);
 
 
 
1226
1227	return true;
 
 
 
 
 
 
 
 
1228}
1229
1230/* used from receive_RSDataReply (recv_resync_read)
1231 * and from receive_Data */
1232static struct drbd_epoch_entry *
1233read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector, int data_size) __must_hold(local)
1234{
1235	const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
1236	struct drbd_epoch_entry *e;
 
 
 
 
 
 
 
 
 
1237	struct page *page;
1238	int dgs, ds, rr;
1239	void *dig_in = mdev->int_dig_in;
1240	void *dig_vv = mdev->int_dig_vv;
 
1241	unsigned long *data;
 
 
1242
1243	dgs = (mdev->agreed_pro_version >= 87 && mdev->integrity_r_tfm) ?
1244		crypto_hash_digestsize(mdev->integrity_r_tfm) : 0;
1245
1246	if (dgs) {
1247		rr = drbd_recv(mdev, dig_in, dgs);
1248		if (rr != dgs) {
1249			if (!signal_pending(current))
1250				dev_warn(DEV,
1251					"short read receiving data digest: read %d expected %d\n",
1252					rr, dgs);
1253			return NULL;
1254		}
1255	}
1256
1257	data_size -= dgs;
 
 
 
 
 
 
 
 
 
 
1258
1259	ERR_IF(data_size == 0) return NULL;
1260	ERR_IF(data_size &  0x1ff) return NULL;
1261	ERR_IF(data_size >  DRBD_MAX_BIO_SIZE) return NULL;
 
 
 
 
1262
1263	/* even though we trust out peer,
1264	 * we sometimes have to double check. */
1265	if (sector + (data_size>>9) > capacity) {
1266		dev_err(DEV, "request from peer beyond end of local disk: "
1267			"capacity: %llus < sector: %llus + size: %u\n",
1268			(unsigned long long)capacity,
1269			(unsigned long long)sector, data_size);
1270		return NULL;
1271	}
1272
1273	/* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1274	 * "criss-cross" setup, that might cause write-out on some other DRBD,
1275	 * which in turn might block on the other node at this very place.  */
1276	e = drbd_alloc_ee(mdev, id, sector, data_size, GFP_NOIO);
1277	if (!e)
1278		return NULL;
1279
 
 
 
 
 
 
 
 
 
 
 
1280	ds = data_size;
1281	page = e->pages;
1282	page_chain_for_each(page) {
1283		unsigned len = min_t(int, ds, PAGE_SIZE);
1284		data = kmap(page);
1285		rr = drbd_recv(mdev, data, len);
1286		if (drbd_insert_fault(mdev, DRBD_FAULT_RECEIVE)) {
1287			dev_err(DEV, "Fault injection: Corrupting data on receive\n");
1288			data[0] = data[0] ^ (unsigned long)-1;
1289		}
1290		kunmap(page);
1291		if (rr != len) {
1292			drbd_free_ee(mdev, e);
1293			if (!signal_pending(current))
1294				dev_warn(DEV, "short read receiving data: read %d expected %d\n",
1295				rr, len);
1296			return NULL;
1297		}
1298		ds -= rr;
1299	}
1300
1301	if (dgs) {
1302		drbd_csum_ee(mdev, mdev->integrity_r_tfm, e, dig_vv);
1303		if (memcmp(dig_in, dig_vv, dgs)) {
1304			dev_err(DEV, "Digest integrity check FAILED: %llus +%u\n",
1305				(unsigned long long)sector, data_size);
1306			drbd_bcast_ee(mdev, "digest failed",
1307					dgs, dig_in, dig_vv, e);
1308			drbd_free_ee(mdev, e);
1309			return NULL;
1310		}
1311	}
1312	mdev->recv_cnt += data_size>>9;
1313	return e;
1314}
1315
1316/* drbd_drain_block() just takes a data block
1317 * out of the socket input buffer, and discards it.
1318 */
1319static int drbd_drain_block(struct drbd_conf *mdev, int data_size)
1320{
1321	struct page *page;
1322	int rr, rv = 1;
1323	void *data;
1324
1325	if (!data_size)
1326		return true;
1327
1328	page = drbd_pp_alloc(mdev, 1, 1);
1329
1330	data = kmap(page);
1331	while (data_size) {
1332		rr = drbd_recv(mdev, data, min_t(int, data_size, PAGE_SIZE));
1333		if (rr != min_t(int, data_size, PAGE_SIZE)) {
1334			rv = 0;
1335			if (!signal_pending(current))
1336				dev_warn(DEV,
1337					"short read receiving data: read %d expected %d\n",
1338					rr, min_t(int, data_size, PAGE_SIZE));
1339			break;
1340		}
1341		data_size -= rr;
1342	}
1343	kunmap(page);
1344	drbd_pp_free(mdev, page, 0);
1345	return rv;
1346}
1347
1348static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
1349			   sector_t sector, int data_size)
1350{
1351	struct bio_vec *bvec;
 
1352	struct bio *bio;
1353	int dgs, rr, i, expect;
1354	void *dig_in = mdev->int_dig_in;
1355	void *dig_vv = mdev->int_dig_vv;
1356
1357	dgs = (mdev->agreed_pro_version >= 87 && mdev->integrity_r_tfm) ?
1358		crypto_hash_digestsize(mdev->integrity_r_tfm) : 0;
1359
1360	if (dgs) {
1361		rr = drbd_recv(mdev, dig_in, dgs);
1362		if (rr != dgs) {
1363			if (!signal_pending(current))
1364				dev_warn(DEV,
1365					"short read receiving data reply digest: read %d expected %d\n",
1366					rr, dgs);
1367			return 0;
1368		}
1369	}
1370
1371	data_size -= dgs;
1372
1373	/* optimistically update recv_cnt.  if receiving fails below,
1374	 * we disconnect anyways, and counters will be reset. */
1375	mdev->recv_cnt += data_size>>9;
1376
1377	bio = req->master_bio;
1378	D_ASSERT(sector == bio->bi_sector);
1379
1380	bio_for_each_segment(bvec, bio, i) {
1381		expect = min_t(int, data_size, bvec->bv_len);
1382		rr = drbd_recv(mdev,
1383			     kmap(bvec->bv_page)+bvec->bv_offset,
1384			     expect);
1385		kunmap(bvec->bv_page);
1386		if (rr != expect) {
1387			if (!signal_pending(current))
1388				dev_warn(DEV, "short read receiving data reply: "
1389					"read %d expected %d\n",
1390					rr, expect);
1391			return 0;
1392		}
1393		data_size -= rr;
1394	}
1395
1396	if (dgs) {
1397		drbd_csum_bio(mdev, mdev->integrity_r_tfm, bio, dig_vv);
1398		if (memcmp(dig_in, dig_vv, dgs)) {
1399			dev_err(DEV, "Digest integrity check FAILED. Broken NICs?\n");
1400			return 0;
1401		}
1402	}
1403
1404	D_ASSERT(data_size == 0);
1405	return 1;
1406}
1407
1408/* e_end_resync_block() is called via
1409 * drbd_process_done_ee() by asender only */
1410static int e_end_resync_block(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1411{
1412	struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1413	sector_t sector = e->sector;
1414	int ok;
1415
1416	D_ASSERT(hlist_unhashed(&e->collision));
1417
1418	if (likely((e->flags & EE_WAS_ERROR) == 0)) {
1419		drbd_set_in_sync(mdev, sector, e->size);
1420		ok = drbd_send_ack(mdev, P_RS_WRITE_ACK, e);
 
 
 
 
 
1421	} else {
1422		/* Record failure to sync */
1423		drbd_rs_failed_io(mdev, sector, e->size);
1424
1425		ok  = drbd_send_ack(mdev, P_NEG_ACK, e);
1426	}
1427	dec_unacked(mdev);
1428
1429	return ok;
1430}
1431
1432static int recv_resync_read(struct drbd_conf *mdev, sector_t sector, int data_size) __releases(local)
 
1433{
1434	struct drbd_epoch_entry *e;
 
1435
1436	e = read_in_block(mdev, ID_SYNCER, sector, data_size);
1437	if (!e)
1438		goto fail;
1439
1440	dec_rs_pending(mdev);
1441
1442	inc_unacked(mdev);
1443	/* corresponding dec_unacked() in e_end_resync_block()
1444	 * respective _drbd_clear_done_ee */
1445
1446	e->w.cb = e_end_resync_block;
1447
1448	spin_lock_irq(&mdev->req_lock);
1449	list_add(&e->w.list, &mdev->sync_ee);
1450	spin_unlock_irq(&mdev->req_lock);
 
 
1451
1452	atomic_add(data_size >> 9, &mdev->rs_sect_ev);
1453	if (drbd_submit_ee(mdev, e, WRITE, DRBD_FAULT_RS_WR) == 0)
1454		return true;
1455
1456	/* don't care for the reason here */
1457	dev_err(DEV, "submit failed, triggering re-connect\n");
1458	spin_lock_irq(&mdev->req_lock);
1459	list_del(&e->w.list);
1460	spin_unlock_irq(&mdev->req_lock);
1461
1462	drbd_free_ee(mdev, e);
1463fail:
1464	put_ldev(mdev);
1465	return false;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1466}
1467
1468static int receive_DataReply(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
1469{
 
 
1470	struct drbd_request *req;
1471	sector_t sector;
1472	int ok;
1473	struct p_data *p = &mdev->data.rbuf.data;
1474
1475	sector = be64_to_cpu(p->sector);
 
 
 
1476
1477	spin_lock_irq(&mdev->req_lock);
1478	req = _ar_id_to_req(mdev, p->block_id, sector);
1479	spin_unlock_irq(&mdev->req_lock);
1480	if (unlikely(!req)) {
1481		dev_err(DEV, "Got a corrupt block_id/sector pair(1).\n");
1482		return false;
1483	}
1484
1485	/* hlist_del(&req->collision) is done in _req_may_be_done, to avoid
1486	 * special casing it there for the various failure cases.
1487	 * still no race with drbd_fail_pending_reads */
1488	ok = recv_dless_read(mdev, req, sector, data_size);
 
1489
1490	if (ok)
1491		req_mod(req, data_received);
 
1492	/* else: nothing. handled from drbd_disconnect...
1493	 * I don't think we may complete this just yet
1494	 * in case we are "on-disconnect: freeze" */
1495
1496	return ok;
1497}
1498
1499static int receive_RSDataReply(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
1500{
 
 
1501	sector_t sector;
1502	int ok;
1503	struct p_data *p = &mdev->data.rbuf.data;
 
 
 
 
 
1504
1505	sector = be64_to_cpu(p->sector);
1506	D_ASSERT(p->block_id == ID_SYNCER);
1507
1508	if (get_ldev(mdev)) {
1509		/* data is submitted to disk within recv_resync_read.
1510		 * corresponding put_ldev done below on error,
1511		 * or in drbd_endio_write_sec. */
1512		ok = recv_resync_read(mdev, sector, data_size);
1513	} else {
1514		if (__ratelimit(&drbd_ratelimit_state))
1515			dev_err(DEV, "Can not write resync data to local disk.\n");
1516
1517		ok = drbd_drain_block(mdev, data_size);
1518
1519		drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
1520	}
1521
1522	atomic_add(data_size >> 9, &mdev->rs_sect_in);
1523
1524	return ok;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1525}
1526
1527/* e_end_block() is called via drbd_process_done_ee().
1528 * this means this function only runs in the asender thread
1529 */
1530static int e_end_block(struct drbd_conf *mdev, struct drbd_work *w, int cancel)
1531{
1532	struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1533	sector_t sector = e->sector;
1534	int ok = 1, pcmd;
1535
1536	if (mdev->net_conf->wire_protocol == DRBD_PROT_C) {
1537		if (likely((e->flags & EE_WAS_ERROR) == 0)) {
1538			pcmd = (mdev->state.conn >= C_SYNC_SOURCE &&
1539				mdev->state.conn <= C_PAUSED_SYNC_T &&
1540				e->flags & EE_MAY_SET_IN_SYNC) ?
 
 
 
1541				P_RS_WRITE_ACK : P_WRITE_ACK;
1542			ok &= drbd_send_ack(mdev, pcmd, e);
1543			if (pcmd == P_RS_WRITE_ACK)
1544				drbd_set_in_sync(mdev, sector, e->size);
1545		} else {
1546			ok  = drbd_send_ack(mdev, P_NEG_ACK, e);
1547			/* we expect it to be marked out of sync anyways...
1548			 * maybe assert this?  */
1549		}
1550		dec_unacked(mdev);
1551	}
 
1552	/* we delete from the conflict detection hash _after_ we sent out the
1553	 * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right.  */
1554	if (mdev->net_conf->two_primaries) {
1555		spin_lock_irq(&mdev->req_lock);
1556		D_ASSERT(!hlist_unhashed(&e->collision));
1557		hlist_del_init(&e->collision);
1558		spin_unlock_irq(&mdev->req_lock);
1559	} else {
1560		D_ASSERT(hlist_unhashed(&e->collision));
1561	}
 
1562
1563	drbd_may_finish_epoch(mdev, e->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
1564
1565	return ok;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1566}
1567
1568static int e_send_discard_ack(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1569{
1570	struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1571	int ok = 1;
 
 
 
 
 
1572
1573	D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
1574	ok = drbd_send_ack(mdev, P_DISCARD_ACK, e);
 
 
 
 
 
 
 
1575
1576	spin_lock_irq(&mdev->req_lock);
1577	D_ASSERT(!hlist_unhashed(&e->collision));
1578	hlist_del_init(&e->collision);
1579	spin_unlock_irq(&mdev->req_lock);
1580
1581	dec_unacked(mdev);
 
 
 
1582
1583	return ok;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1584}
1585
1586/* Called from receive_Data.
1587 * Synchronize packets on sock with packets on msock.
1588 *
1589 * This is here so even when a P_DATA packet traveling via sock overtook an Ack
1590 * packet traveling on msock, they are still processed in the order they have
1591 * been sent.
1592 *
1593 * Note: we don't care for Ack packets overtaking P_DATA packets.
1594 *
1595 * In case packet_seq is larger than mdev->peer_seq number, there are
1596 * outstanding packets on the msock. We wait for them to arrive.
1597 * In case we are the logically next packet, we update mdev->peer_seq
1598 * ourselves. Correctly handles 32bit wrap around.
1599 *
1600 * Assume we have a 10 GBit connection, that is about 1<<30 byte per second,
1601 * about 1<<21 sectors per second. So "worst" case, we have 1<<3 == 8 seconds
1602 * for the 24bit wrap (historical atomic_t guarantee on some archs), and we have
1603 * 1<<9 == 512 seconds aka ages for the 32bit wrap around...
1604 *
1605 * returns 0 if we may process the packet,
1606 * -ERESTARTSYS if we were interrupted (by disconnect signal). */
1607static int drbd_wait_peer_seq(struct drbd_conf *mdev, const u32 packet_seq)
1608{
 
1609	DEFINE_WAIT(wait);
1610	unsigned int p_seq;
1611	long timeout;
1612	int ret = 0;
1613	spin_lock(&mdev->peer_seq_lock);
 
 
 
 
1614	for (;;) {
1615		prepare_to_wait(&mdev->seq_wait, &wait, TASK_INTERRUPTIBLE);
1616		if (seq_le(packet_seq, mdev->peer_seq+1))
1617			break;
 
 
1618		if (signal_pending(current)) {
1619			ret = -ERESTARTSYS;
1620			break;
1621		}
1622		p_seq = mdev->peer_seq;
1623		spin_unlock(&mdev->peer_seq_lock);
1624		timeout = schedule_timeout(30*HZ);
1625		spin_lock(&mdev->peer_seq_lock);
1626		if (timeout == 0 && p_seq == mdev->peer_seq) {
 
 
 
 
 
 
 
 
 
 
 
 
1627			ret = -ETIMEDOUT;
1628			dev_err(DEV, "ASSERT FAILED waited 30 seconds for sequence update, forcing reconnect\n");
1629			break;
1630		}
1631	}
1632	finish_wait(&mdev->seq_wait, &wait);
1633	if (mdev->peer_seq+1 == packet_seq)
1634		mdev->peer_seq++;
1635	spin_unlock(&mdev->peer_seq_lock);
1636	return ret;
1637}
1638
1639/* see also bio_flags_to_wire()
1640 * DRBD_REQ_*, because we need to semantically map the flags to data packet
1641 * flags and back. We may replicate to other kernel versions. */
1642static unsigned long wire_flags_to_bio(struct drbd_conf *mdev, u32 dpf)
1643{
1644	return  (dpf & DP_RW_SYNC ? REQ_SYNC : 0) |
1645		(dpf & DP_FUA ? REQ_FUA : 0) |
1646		(dpf & DP_FLUSH ? REQ_FLUSH : 0) |
1647		(dpf & DP_DISCARD ? REQ_DISCARD : 0);
 
 
1648}
1649
1650/* mirrored write */
1651static int receive_Data(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
1652{
1653	sector_t sector;
1654	struct drbd_epoch_entry *e;
1655	struct p_data *p = &mdev->data.rbuf.data;
1656	int rw = WRITE;
1657	u32 dp_flags;
1658
1659	if (!get_ldev(mdev)) {
1660		spin_lock(&mdev->peer_seq_lock);
1661		if (mdev->peer_seq+1 == be32_to_cpu(p->seq_num))
1662			mdev->peer_seq++;
1663		spin_unlock(&mdev->peer_seq_lock);
1664
1665		drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
1666		atomic_inc(&mdev->current_epoch->epoch_size);
1667		return drbd_drain_block(mdev, data_size);
1668	}
1669
1670	/* get_ldev(mdev) successful.
1671	 * Corresponding put_ldev done either below (on various errors),
1672	 * or in drbd_endio_write_sec, if we successfully submit the data at
1673	 * the end of this function. */
1674
1675	sector = be64_to_cpu(p->sector);
1676	e = read_in_block(mdev, p->block_id, sector, data_size);
1677	if (!e) {
1678		put_ldev(mdev);
1679		return false;
 
 
 
 
 
 
 
1680	}
 
1681
1682	e->w.cb = e_end_block;
 
 
 
 
 
 
 
 
 
1683
1684	dp_flags = be32_to_cpu(p->dp_flags);
1685	rw |= wire_flags_to_bio(mdev, dp_flags);
 
 
 
1686
1687	if (dp_flags & DP_MAY_SET_IN_SYNC)
1688		e->flags |= EE_MAY_SET_IN_SYNC;
 
 
 
 
1689
1690	spin_lock(&mdev->epoch_lock);
1691	e->epoch = mdev->current_epoch;
1692	atomic_inc(&e->epoch->epoch_size);
1693	atomic_inc(&e->epoch->active);
1694	spin_unlock(&mdev->epoch_lock);
1695
1696	/* I'm the receiver, I do hold a net_cnt reference. */
1697	if (!mdev->net_conf->two_primaries) {
1698		spin_lock_irq(&mdev->req_lock);
1699	} else {
1700		/* don't get the req_lock yet,
1701		 * we may sleep in drbd_wait_peer_seq */
1702		const int size = e->size;
1703		const int discard = test_bit(DISCARD_CONCURRENT, &mdev->flags);
1704		DEFINE_WAIT(wait);
1705		struct drbd_request *i;
1706		struct hlist_node *n;
1707		struct hlist_head *slot;
1708		int first;
1709
1710		D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
1711		BUG_ON(mdev->ee_hash == NULL);
1712		BUG_ON(mdev->tl_hash == NULL);
1713
1714		/* conflict detection and handling:
1715		 * 1. wait on the sequence number,
1716		 *    in case this data packet overtook ACK packets.
1717		 * 2. check our hash tables for conflicting requests.
1718		 *    we only need to walk the tl_hash, since an ee can not
1719		 *    have a conflict with an other ee: on the submitting
1720		 *    node, the corresponding req had already been conflicting,
1721		 *    and a conflicting req is never sent.
1722		 *
1723		 * Note: for two_primaries, we are protocol C,
1724		 * so there cannot be any request that is DONE
1725		 * but still on the transfer log.
1726		 *
1727		 * unconditionally add to the ee_hash.
1728		 *
1729		 * if no conflicting request is found:
1730		 *    submit.
1731		 *
1732		 * if any conflicting request is found
1733		 * that has not yet been acked,
1734		 * AND I have the "discard concurrent writes" flag:
1735		 *	 queue (via done_ee) the P_DISCARD_ACK; OUT.
1736		 *
1737		 * if any conflicting request is found:
1738		 *	 block the receiver, waiting on misc_wait
1739		 *	 until no more conflicting requests are there,
1740		 *	 or we get interrupted (disconnect).
1741		 *
1742		 *	 we do not just write after local io completion of those
1743		 *	 requests, but only after req is done completely, i.e.
1744		 *	 we wait for the P_DISCARD_ACK to arrive!
1745		 *
1746		 *	 then proceed normally, i.e. submit.
1747		 */
1748		if (drbd_wait_peer_seq(mdev, be32_to_cpu(p->seq_num)))
1749			goto out_interrupted;
1750
1751		spin_lock_irq(&mdev->req_lock);
 
 
 
 
 
 
 
 
 
 
 
1752
1753		hlist_add_head(&e->collision, ee_hash_slot(mdev, sector));
 
 
 
 
1754
1755#define OVERLAPS overlaps(i->sector, i->size, sector, size)
1756		slot = tl_hash_slot(mdev, sector);
1757		first = 1;
1758		for (;;) {
1759			int have_unacked = 0;
1760			int have_conflict = 0;
1761			prepare_to_wait(&mdev->misc_wait, &wait,
1762				TASK_INTERRUPTIBLE);
1763			hlist_for_each_entry(i, n, slot, collision) {
1764				if (OVERLAPS) {
1765					/* only ALERT on first iteration,
1766					 * we may be woken up early... */
1767					if (first)
1768						dev_alert(DEV, "%s[%u] Concurrent local write detected!"
1769						      "	new: %llus +%u; pending: %llus +%u\n",
1770						      current->comm, current->pid,
1771						      (unsigned long long)sector, size,
1772						      (unsigned long long)i->sector, i->size);
1773					if (i->rq_state & RQ_NET_PENDING)
1774						++have_unacked;
1775					++have_conflict;
 
 
 
1776				}
 
1777			}
1778#undef OVERLAPS
1779			if (!have_conflict)
1780				break;
 
 
 
 
 
1781
1782			/* Discard Ack only for the _first_ iteration */
1783			if (first && discard && have_unacked) {
1784				dev_alert(DEV, "Concurrent write! [DISCARD BY FLAG] sec=%llus\n",
1785				     (unsigned long long)sector);
1786				inc_unacked(mdev);
1787				e->w.cb = e_send_discard_ack;
1788				list_add_tail(&e->w.list, &mdev->done_ee);
1789
1790				spin_unlock_irq(&mdev->req_lock);
1791
1792				/* we could probably send that P_DISCARD_ACK ourselves,
1793				 * but I don't like the receiver using the msock */
1794
1795				put_ldev(mdev);
1796				wake_asender(mdev);
1797				finish_wait(&mdev->misc_wait, &wait);
1798				return true;
1799			}
1800
1801			if (signal_pending(current)) {
1802				hlist_del_init(&e->collision);
 
 
 
 
 
 
 
 
 
 
1803
1804				spin_unlock_irq(&mdev->req_lock);
 
 
 
1805
1806				finish_wait(&mdev->misc_wait, &wait);
1807				goto out_interrupted;
1808			}
1809
1810			spin_unlock_irq(&mdev->req_lock);
1811			if (first) {
1812				first = 0;
1813				dev_alert(DEV, "Concurrent write! [W AFTERWARDS] "
1814				     "sec=%llus\n", (unsigned long long)sector);
1815			} else if (discard) {
1816				/* we had none on the first iteration.
1817				 * there must be none now. */
1818				D_ASSERT(have_unacked == 0);
1819			}
1820			schedule();
1821			spin_lock_irq(&mdev->req_lock);
1822		}
1823		finish_wait(&mdev->misc_wait, &wait);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1824	}
1825
1826	list_add(&e->w.list, &mdev->active_ee);
1827	spin_unlock_irq(&mdev->req_lock);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1828
1829	switch (mdev->net_conf->wire_protocol) {
1830	case DRBD_PROT_C:
1831		inc_unacked(mdev);
1832		/* corresponding dec_unacked() in e_end_block()
1833		 * respective _drbd_clear_done_ee */
1834		break;
1835	case DRBD_PROT_B:
 
1836		/* I really don't like it that the receiver thread
1837		 * sends on the msock, but anyways */
1838		drbd_send_ack(mdev, P_RECV_ACK, e);
1839		break;
1840	case DRBD_PROT_A:
1841		/* nothing to do */
1842		break;
1843	}
1844
1845	if (mdev->state.pdsk < D_INCONSISTENT) {
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1846		/* In case we have the only disk of the cluster, */
1847		drbd_set_out_of_sync(mdev, e->sector, e->size);
1848		e->flags |= EE_CALL_AL_COMPLETE_IO;
1849		e->flags &= ~EE_MAY_SET_IN_SYNC;
1850		drbd_al_begin_io(mdev, e->sector);
1851	}
1852
1853	if (drbd_submit_ee(mdev, e, rw, DRBD_FAULT_DT_WR) == 0)
1854		return true;
 
1855
1856	/* don't care for the reason here */
1857	dev_err(DEV, "submit failed, triggering re-connect\n");
1858	spin_lock_irq(&mdev->req_lock);
1859	list_del(&e->w.list);
1860	hlist_del_init(&e->collision);
1861	spin_unlock_irq(&mdev->req_lock);
1862	if (e->flags & EE_CALL_AL_COMPLETE_IO)
1863		drbd_al_complete_io(mdev, e->sector);
 
 
1864
1865out_interrupted:
1866	drbd_may_finish_epoch(mdev, e->epoch, EV_PUT + EV_CLEANUP);
1867	put_ldev(mdev);
1868	drbd_free_ee(mdev, e);
1869	return false;
1870}
1871
1872/* We may throttle resync, if the lower device seems to be busy,
1873 * and current sync rate is above c_min_rate.
1874 *
1875 * To decide whether or not the lower device is busy, we use a scheme similar
1876 * to MD RAID is_mddev_idle(): if the partition stats reveal "significant"
1877 * (more than 64 sectors) of activity we cannot account for with our own resync
1878 * activity, it obviously is "busy".
1879 *
1880 * The current sync rate used here uses only the most recent two step marks,
1881 * to have a short time average so we can react faster.
1882 */
1883int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
 
1884{
1885	struct gendisk *disk = mdev->ldev->backing_bdev->bd_contains->bd_disk;
1886	unsigned long db, dt, dbdt;
1887	struct lc_element *tmp;
1888	int curr_events;
1889	int throttle = 0;
1890
1891	/* feature disabled? */
1892	if (mdev->sync_conf.c_min_rate == 0)
1893		return 0;
1894
1895	spin_lock_irq(&mdev->al_lock);
1896	tmp = lc_find(mdev->resync, BM_SECT_TO_EXT(sector));
1897	if (tmp) {
1898		struct bm_extent *bm_ext = lc_entry(tmp, struct bm_extent, lce);
1899		if (test_bit(BME_PRIORITY, &bm_ext->flags)) {
1900			spin_unlock_irq(&mdev->al_lock);
1901			return 0;
1902		}
1903		/* Do not slow down if app IO is already waiting for this extent */
1904	}
1905	spin_unlock_irq(&mdev->al_lock);
1906
1907	curr_events = (int)part_stat_read(&disk->part0, sectors[0]) +
1908		      (int)part_stat_read(&disk->part0, sectors[1]) -
1909			atomic_read(&mdev->rs_sect_ev);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1910
1911	if (!mdev->rs_last_events || curr_events - mdev->rs_last_events > 64) {
 
 
 
 
1912		unsigned long rs_left;
1913		int i;
1914
1915		mdev->rs_last_events = curr_events;
1916
1917		/* sync speed average over the last 2*DRBD_SYNC_MARK_STEP,
1918		 * approx. */
1919		i = (mdev->rs_last_mark + DRBD_SYNC_MARKS-1) % DRBD_SYNC_MARKS;
1920
1921		if (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T)
1922			rs_left = mdev->ov_left;
1923		else
1924			rs_left = drbd_bm_total_weight(mdev) - mdev->rs_failed;
1925
1926		dt = ((long)jiffies - (long)mdev->rs_mark_time[i]) / HZ;
1927		if (!dt)
1928			dt++;
1929		db = mdev->rs_mark_left[i] - rs_left;
1930		dbdt = Bit2KB(db/dt);
1931
1932		if (dbdt > mdev->sync_conf.c_min_rate)
1933			throttle = 1;
1934	}
1935	return throttle;
1936}
1937
1938
1939static int receive_DataRequest(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int digest_size)
1940{
 
 
1941	sector_t sector;
1942	const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
1943	struct drbd_epoch_entry *e;
1944	struct digest_info *di = NULL;
1945	int size, verb;
1946	unsigned int fault_type;
1947	struct p_block_req *p =	&mdev->data.rbuf.block_req;
 
 
 
 
 
1948
1949	sector = be64_to_cpu(p->sector);
1950	size   = be32_to_cpu(p->blksize);
1951
1952	if (size <= 0 || (size & 0x1ff) != 0 || size > DRBD_MAX_BIO_SIZE) {
1953		dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
1954				(unsigned long long)sector, size);
1955		return false;
1956	}
1957	if (sector + (size>>9) > capacity) {
1958		dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
1959				(unsigned long long)sector, size);
1960		return false;
1961	}
1962
1963	if (!get_ldev_if_state(mdev, D_UP_TO_DATE)) {
1964		verb = 1;
1965		switch (cmd) {
1966		case P_DATA_REQUEST:
1967			drbd_send_ack_rp(mdev, P_NEG_DREPLY, p);
1968			break;
 
1969		case P_RS_DATA_REQUEST:
1970		case P_CSUM_RS_REQUEST:
1971		case P_OV_REQUEST:
1972			drbd_send_ack_rp(mdev, P_NEG_RS_DREPLY , p);
1973			break;
1974		case P_OV_REPLY:
1975			verb = 0;
1976			dec_rs_pending(mdev);
1977			drbd_send_ack_ex(mdev, P_OV_RESULT, sector, size, ID_IN_SYNC);
1978			break;
1979		default:
1980			dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
1981				cmdname(cmd));
1982		}
1983		if (verb && __ratelimit(&drbd_ratelimit_state))
1984			dev_err(DEV, "Can not satisfy peer's read request, "
1985			    "no local data.\n");
1986
1987		/* drain possibly payload */
1988		return drbd_drain_block(mdev, digest_size);
1989	}
1990
1991	/* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1992	 * "criss-cross" setup, that might cause write-out on some other DRBD,
1993	 * which in turn might block on the other node at this very place.  */
1994	e = drbd_alloc_ee(mdev, p->block_id, sector, size, GFP_NOIO);
1995	if (!e) {
1996		put_ldev(mdev);
1997		return false;
 
1998	}
 
1999
2000	switch (cmd) {
2001	case P_DATA_REQUEST:
2002		e->w.cb = w_e_end_data_req;
2003		fault_type = DRBD_FAULT_DT_RD;
2004		/* application IO, don't drbd_rs_begin_io */
 
2005		goto submit;
2006
 
 
 
 
 
 
 
2007	case P_RS_DATA_REQUEST:
2008		e->w.cb = w_e_end_rsdata_req;
2009		fault_type = DRBD_FAULT_RS_RD;
2010		/* used in the sector offset progress display */
2011		mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
2012		break;
2013
2014	case P_OV_REPLY:
2015	case P_CSUM_RS_REQUEST:
2016		fault_type = DRBD_FAULT_RS_RD;
2017		di = kmalloc(sizeof(*di) + digest_size, GFP_NOIO);
2018		if (!di)
2019			goto out_free_e;
2020
2021		di->digest_size = digest_size;
2022		di->digest = (((char *)di)+sizeof(struct digest_info));
2023
2024		e->digest = di;
2025		e->flags |= EE_HAS_DIGEST;
2026
2027		if (drbd_recv(mdev, di->digest, digest_size) != digest_size)
2028			goto out_free_e;
2029
2030		if (cmd == P_CSUM_RS_REQUEST) {
2031			D_ASSERT(mdev->agreed_pro_version >= 89);
2032			e->w.cb = w_e_end_csum_rs_req;
2033			/* used in the sector offset progress display */
2034			mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
2035		} else if (cmd == P_OV_REPLY) {
 
 
2036			/* track progress, we may need to throttle */
2037			atomic_add(size >> 9, &mdev->rs_sect_in);
2038			e->w.cb = w_e_end_ov_reply;
2039			dec_rs_pending(mdev);
2040			/* drbd_rs_begin_io done when we sent this request,
2041			 * but accounting still needs to be done. */
2042			goto submit_for_resync;
2043		}
2044		break;
2045
2046	case P_OV_REQUEST:
2047		if (mdev->ov_start_sector == ~(sector_t)0 &&
2048		    mdev->agreed_pro_version >= 90) {
2049			unsigned long now = jiffies;
2050			int i;
2051			mdev->ov_start_sector = sector;
2052			mdev->ov_position = sector;
2053			mdev->ov_left = drbd_bm_bits(mdev) - BM_SECT_TO_BIT(sector);
2054			mdev->rs_total = mdev->ov_left;
2055			for (i = 0; i < DRBD_SYNC_MARKS; i++) {
2056				mdev->rs_mark_left[i] = mdev->ov_left;
2057				mdev->rs_mark_time[i] = now;
2058			}
2059			dev_info(DEV, "Online Verify start sector: %llu\n",
2060					(unsigned long long)sector);
2061		}
2062		e->w.cb = w_e_end_ov_req;
2063		fault_type = DRBD_FAULT_RS_RD;
2064		break;
2065
2066	default:
2067		dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
2068		    cmdname(cmd));
2069		fault_type = DRBD_FAULT_MAX;
2070		goto out_free_e;
2071	}
2072
2073	/* Throttle, drbd_rs_begin_io and submit should become asynchronous
2074	 * wrt the receiver, but it is not as straightforward as it may seem.
2075	 * Various places in the resync start and stop logic assume resync
2076	 * requests are processed in order, requeuing this on the worker thread
2077	 * introduces a bunch of new code for synchronization between threads.
2078	 *
2079	 * Unlimited throttling before drbd_rs_begin_io may stall the resync
2080	 * "forever", throttling after drbd_rs_begin_io will lock that extent
2081	 * for application writes for the same time.  For now, just throttle
2082	 * here, where the rest of the code expects the receiver to sleep for
2083	 * a while, anyways.
2084	 */
2085
2086	/* Throttle before drbd_rs_begin_io, as that locks out application IO;
2087	 * this defers syncer requests for some time, before letting at least
2088	 * on request through.  The resync controller on the receiving side
2089	 * will adapt to the incoming rate accordingly.
2090	 *
2091	 * We cannot throttle here if remote is Primary/SyncTarget:
2092	 * we would also throttle its application reads.
2093	 * In that case, throttling is done on the SyncTarget only.
2094	 */
2095	if (mdev->state.peer != R_PRIMARY && drbd_rs_should_slow_down(mdev, sector))
 
 
 
 
 
 
 
 
 
 
 
2096		schedule_timeout_uninterruptible(HZ/10);
2097	if (drbd_rs_begin_io(mdev, sector))
 
2098		goto out_free_e;
2099
2100submit_for_resync:
2101	atomic_add(size >> 9, &mdev->rs_sect_ev);
2102
2103submit:
2104	inc_unacked(mdev);
2105	spin_lock_irq(&mdev->req_lock);
2106	list_add_tail(&e->w.list, &mdev->read_ee);
2107	spin_unlock_irq(&mdev->req_lock);
2108
2109	if (drbd_submit_ee(mdev, e, READ, fault_type) == 0)
2110		return true;
2111
2112	/* don't care for the reason here */
2113	dev_err(DEV, "submit failed, triggering re-connect\n");
2114	spin_lock_irq(&mdev->req_lock);
2115	list_del(&e->w.list);
2116	spin_unlock_irq(&mdev->req_lock);
2117	/* no drbd_rs_complete_io(), we are dropping the connection anyways */
2118
2119out_free_e:
2120	put_ldev(mdev);
2121	drbd_free_ee(mdev, e);
2122	return false;
 
 
 
 
 
2123}
2124
2125static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
 
 
 
2126{
 
2127	int self, peer, rv = -100;
2128	unsigned long ch_self, ch_peer;
 
2129
2130	self = mdev->ldev->md.uuid[UI_BITMAP] & 1;
2131	peer = mdev->p_uuid[UI_BITMAP] & 1;
2132
2133	ch_peer = mdev->p_uuid[UI_SIZE];
2134	ch_self = mdev->comm_bm_set;
2135
2136	switch (mdev->net_conf->after_sb_0p) {
 
 
 
2137	case ASB_CONSENSUS:
2138	case ASB_DISCARD_SECONDARY:
2139	case ASB_CALL_HELPER:
2140		dev_err(DEV, "Configuration error.\n");
 
2141		break;
2142	case ASB_DISCONNECT:
2143		break;
2144	case ASB_DISCARD_YOUNGER_PRI:
2145		if (self == 0 && peer == 1) {
2146			rv = -1;
2147			break;
2148		}
2149		if (self == 1 && peer == 0) {
2150			rv =  1;
2151			break;
2152		}
2153		/* Else fall through to one of the other strategies... */
2154	case ASB_DISCARD_OLDER_PRI:
2155		if (self == 0 && peer == 1) {
2156			rv = 1;
2157			break;
2158		}
2159		if (self == 1 && peer == 0) {
2160			rv = -1;
2161			break;
2162		}
2163		/* Else fall through to one of the other strategies... */
2164		dev_warn(DEV, "Discard younger/older primary did not find a decision\n"
2165		     "Using discard-least-changes instead\n");
 
2166	case ASB_DISCARD_ZERO_CHG:
2167		if (ch_peer == 0 && ch_self == 0) {
2168			rv = test_bit(DISCARD_CONCURRENT, &mdev->flags)
2169				? -1 : 1;
2170			break;
2171		} else {
2172			if (ch_peer == 0) { rv =  1; break; }
2173			if (ch_self == 0) { rv = -1; break; }
2174		}
2175		if (mdev->net_conf->after_sb_0p == ASB_DISCARD_ZERO_CHG)
2176			break;
 
2177	case ASB_DISCARD_LEAST_CHG:
2178		if	(ch_self < ch_peer)
2179			rv = -1;
2180		else if (ch_self > ch_peer)
2181			rv =  1;
2182		else /* ( ch_self == ch_peer ) */
2183		     /* Well, then use something else. */
2184			rv = test_bit(DISCARD_CONCURRENT, &mdev->flags)
2185				? -1 : 1;
2186		break;
2187	case ASB_DISCARD_LOCAL:
2188		rv = -1;
2189		break;
2190	case ASB_DISCARD_REMOTE:
2191		rv =  1;
2192	}
2193
2194	return rv;
2195}
2196
2197static int drbd_asb_recover_1p(struct drbd_conf *mdev) __must_hold(local)
 
 
 
2198{
 
2199	int hg, rv = -100;
 
2200
2201	switch (mdev->net_conf->after_sb_1p) {
 
 
 
2202	case ASB_DISCARD_YOUNGER_PRI:
2203	case ASB_DISCARD_OLDER_PRI:
2204	case ASB_DISCARD_LEAST_CHG:
2205	case ASB_DISCARD_LOCAL:
2206	case ASB_DISCARD_REMOTE:
2207		dev_err(DEV, "Configuration error.\n");
 
2208		break;
2209	case ASB_DISCONNECT:
2210		break;
2211	case ASB_CONSENSUS:
2212		hg = drbd_asb_recover_0p(mdev);
2213		if (hg == -1 && mdev->state.role == R_SECONDARY)
2214			rv = hg;
2215		if (hg == 1  && mdev->state.role == R_PRIMARY)
2216			rv = hg;
2217		break;
2218	case ASB_VIOLENTLY:
2219		rv = drbd_asb_recover_0p(mdev);
2220		break;
2221	case ASB_DISCARD_SECONDARY:
2222		return mdev->state.role == R_PRIMARY ? 1 : -1;
2223	case ASB_CALL_HELPER:
2224		hg = drbd_asb_recover_0p(mdev);
2225		if (hg == -1 && mdev->state.role == R_PRIMARY) {
2226			enum drbd_state_rv rv2;
2227
2228			drbd_set_role(mdev, R_SECONDARY, 0);
2229			 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2230			  * we might be here in C_WF_REPORT_PARAMS which is transient.
2231			  * we do not need to wait for the after state change work either. */
2232			rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2233			if (rv2 != SS_SUCCESS) {
2234				drbd_khelper(mdev, "pri-lost-after-sb");
2235			} else {
2236				dev_warn(DEV, "Successfully gave up primary role.\n");
2237				rv = hg;
2238			}
2239		} else
2240			rv = hg;
2241	}
2242
2243	return rv;
2244}
2245
2246static int drbd_asb_recover_2p(struct drbd_conf *mdev) __must_hold(local)
 
 
 
2247{
 
2248	int hg, rv = -100;
 
2249
2250	switch (mdev->net_conf->after_sb_2p) {
 
 
 
2251	case ASB_DISCARD_YOUNGER_PRI:
2252	case ASB_DISCARD_OLDER_PRI:
2253	case ASB_DISCARD_LEAST_CHG:
2254	case ASB_DISCARD_LOCAL:
2255	case ASB_DISCARD_REMOTE:
2256	case ASB_CONSENSUS:
2257	case ASB_DISCARD_SECONDARY:
2258		dev_err(DEV, "Configuration error.\n");
 
2259		break;
2260	case ASB_VIOLENTLY:
2261		rv = drbd_asb_recover_0p(mdev);
2262		break;
2263	case ASB_DISCONNECT:
2264		break;
2265	case ASB_CALL_HELPER:
2266		hg = drbd_asb_recover_0p(mdev);
2267		if (hg == -1) {
2268			enum drbd_state_rv rv2;
2269
2270			 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2271			  * we might be here in C_WF_REPORT_PARAMS which is transient.
2272			  * we do not need to wait for the after state change work either. */
2273			rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2274			if (rv2 != SS_SUCCESS) {
2275				drbd_khelper(mdev, "pri-lost-after-sb");
2276			} else {
2277				dev_warn(DEV, "Successfully gave up primary role.\n");
2278				rv = hg;
2279			}
2280		} else
2281			rv = hg;
2282	}
2283
2284	return rv;
2285}
2286
2287static void drbd_uuid_dump(struct drbd_conf *mdev, char *text, u64 *uuid,
2288			   u64 bits, u64 flags)
2289{
2290	if (!uuid) {
2291		dev_info(DEV, "%s uuid info vanished while I was looking!\n", text);
2292		return;
2293	}
2294	dev_info(DEV, "%s %016llX:%016llX:%016llX:%016llX bits:%llu flags:%llX\n",
2295	     text,
2296	     (unsigned long long)uuid[UI_CURRENT],
2297	     (unsigned long long)uuid[UI_BITMAP],
2298	     (unsigned long long)uuid[UI_HISTORY_START],
2299	     (unsigned long long)uuid[UI_HISTORY_END],
2300	     (unsigned long long)bits,
2301	     (unsigned long long)flags);
2302}
2303
2304/*
2305  100	after split brain try auto recover
2306    2	C_SYNC_SOURCE set BitMap
2307    1	C_SYNC_SOURCE use BitMap
2308    0	no Sync
2309   -1	C_SYNC_TARGET use BitMap
2310   -2	C_SYNC_TARGET set BitMap
2311 -100	after split brain, disconnect
2312-1000	unrelated data
2313-1091   requires proto 91
2314-1096   requires proto 96
2315 */
2316static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(local)
 
 
2317{
 
 
2318	u64 self, peer;
2319	int i, j;
2320
2321	self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2322	peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2323
2324	*rule_nr = 10;
2325	if (self == UUID_JUST_CREATED && peer == UUID_JUST_CREATED)
2326		return 0;
2327
2328	*rule_nr = 20;
2329	if ((self == UUID_JUST_CREATED || self == (u64)0) &&
2330	     peer != UUID_JUST_CREATED)
2331		return -2;
2332
2333	*rule_nr = 30;
2334	if (self != UUID_JUST_CREATED &&
2335	    (peer == UUID_JUST_CREATED || peer == (u64)0))
2336		return 2;
2337
2338	if (self == peer) {
2339		int rct, dc; /* roles at crash time */
2340
2341		if (mdev->p_uuid[UI_BITMAP] == (u64)0 && mdev->ldev->md.uuid[UI_BITMAP] != (u64)0) {
2342
2343			if (mdev->agreed_pro_version < 91)
2344				return -1091;
2345
2346			if ((mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
2347			    (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
2348				dev_info(DEV, "was SyncSource, missed the resync finished event, corrected myself:\n");
2349				drbd_uuid_set_bm(mdev, 0UL);
 
 
2350
2351				drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2352					       mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2353				*rule_nr = 34;
2354			} else {
2355				dev_info(DEV, "was SyncSource (peer failed to write sync_uuid)\n");
2356				*rule_nr = 36;
2357			}
2358
2359			return 1;
2360		}
2361
2362		if (mdev->ldev->md.uuid[UI_BITMAP] == (u64)0 && mdev->p_uuid[UI_BITMAP] != (u64)0) {
2363
2364			if (mdev->agreed_pro_version < 91)
2365				return -1091;
2366
2367			if ((mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_BITMAP] & ~((u64)1)) &&
2368			    (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1))) {
2369				dev_info(DEV, "was SyncTarget, peer missed the resync finished event, corrected peer:\n");
2370
2371				mdev->p_uuid[UI_HISTORY_START + 1] = mdev->p_uuid[UI_HISTORY_START];
2372				mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_BITMAP];
2373				mdev->p_uuid[UI_BITMAP] = 0UL;
2374
2375				drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2376				*rule_nr = 35;
2377			} else {
2378				dev_info(DEV, "was SyncTarget (failed to write sync_uuid)\n");
2379				*rule_nr = 37;
2380			}
2381
2382			return -1;
2383		}
2384
2385		/* Common power [off|failure] */
2386		rct = (test_bit(CRASHED_PRIMARY, &mdev->flags) ? 1 : 0) +
2387			(mdev->p_uuid[UI_FLAGS] & 2);
2388		/* lowest bit is set when we were primary,
2389		 * next bit (weight 2) is set when peer was primary */
2390		*rule_nr = 40;
2391
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2392		switch (rct) {
2393		case 0: /* !self_pri && !peer_pri */ return 0;
2394		case 1: /*  self_pri && !peer_pri */ return 1;
2395		case 2: /* !self_pri &&  peer_pri */ return -1;
2396		case 3: /*  self_pri &&  peer_pri */
2397			dc = test_bit(DISCARD_CONCURRENT, &mdev->flags);
2398			return dc ? -1 : 1;
2399		}
2400	}
2401
2402	*rule_nr = 50;
2403	peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2404	if (self == peer)
2405		return -1;
2406
2407	*rule_nr = 51;
2408	peer = mdev->p_uuid[UI_HISTORY_START] & ~((u64)1);
2409	if (self == peer) {
2410		if (mdev->agreed_pro_version < 96 ?
2411		    (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) ==
2412		    (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1)) :
2413		    peer + UUID_NEW_BM_OFFSET == (mdev->p_uuid[UI_BITMAP] & ~((u64)1))) {
2414			/* The last P_SYNC_UUID did not get though. Undo the last start of
2415			   resync as sync source modifications of the peer's UUIDs. */
2416
2417			if (mdev->agreed_pro_version < 91)
2418				return -1091;
2419
2420			mdev->p_uuid[UI_BITMAP] = mdev->p_uuid[UI_HISTORY_START];
2421			mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_HISTORY_START + 1];
2422
2423			dev_info(DEV, "Did not got last syncUUID packet, corrected:\n");
2424			drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2425
2426			return -1;
2427		}
2428	}
2429
2430	*rule_nr = 60;
2431	self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2432	for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2433		peer = mdev->p_uuid[i] & ~((u64)1);
2434		if (self == peer)
2435			return -2;
2436	}
2437
2438	*rule_nr = 70;
2439	self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2440	peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2441	if (self == peer)
2442		return 1;
2443
2444	*rule_nr = 71;
2445	self = mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1);
2446	if (self == peer) {
2447		if (mdev->agreed_pro_version < 96 ?
2448		    (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) ==
2449		    (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) :
2450		    self + UUID_NEW_BM_OFFSET == (mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1))) {
2451			/* The last P_SYNC_UUID did not get though. Undo the last start of
2452			   resync as sync source modifications of our UUIDs. */
2453
2454			if (mdev->agreed_pro_version < 91)
2455				return -1091;
2456
2457			_drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
2458			_drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
2459
2460			dev_info(DEV, "Last syncUUID did not get through, corrected:\n");
2461			drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2462				       mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2463
2464			return 1;
2465		}
2466	}
2467
2468
2469	*rule_nr = 80;
2470	peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2471	for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2472		self = mdev->ldev->md.uuid[i] & ~((u64)1);
2473		if (self == peer)
2474			return 2;
2475	}
2476
2477	*rule_nr = 90;
2478	self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2479	peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2480	if (self == peer && self != ((u64)0))
2481		return 100;
2482
2483	*rule_nr = 100;
2484	for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2485		self = mdev->ldev->md.uuid[i] & ~((u64)1);
2486		for (j = UI_HISTORY_START; j <= UI_HISTORY_END; j++) {
2487			peer = mdev->p_uuid[j] & ~((u64)1);
2488			if (self == peer)
2489				return -100;
2490		}
2491	}
2492
2493	return -1000;
2494}
2495
2496/* drbd_sync_handshake() returns the new conn state on success, or
2497   CONN_MASK (-1) on failure.
2498 */
2499static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_role peer_role,
 
2500					   enum drbd_disk_state peer_disk) __must_hold(local)
2501{
2502	int hg, rule_nr;
2503	enum drbd_conns rv = C_MASK;
2504	enum drbd_disk_state mydisk;
 
 
2505
2506	mydisk = mdev->state.disk;
2507	if (mydisk == D_NEGOTIATING)
2508		mydisk = mdev->new_state_tmp.disk;
 
 
2509
2510	dev_info(DEV, "drbd_sync_handshake:\n");
2511	drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid, mdev->comm_bm_set, 0);
2512	drbd_uuid_dump(mdev, "peer", mdev->p_uuid,
2513		       mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2514
2515	hg = drbd_uuid_compare(mdev, &rule_nr);
 
2516
2517	dev_info(DEV, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
2518
2519	if (hg == -1000) {
2520		dev_alert(DEV, "Unrelated data, aborting!\n");
 
 
 
 
 
 
 
 
 
2521		return C_MASK;
2522	}
2523	if (hg < -1000) {
2524		dev_alert(DEV, "To resolve this both sides have to support at least protocol %d\n", -hg - 1000);
2525		return C_MASK;
2526	}
2527
2528	if    ((mydisk == D_INCONSISTENT && peer_disk > D_INCONSISTENT) ||
2529	    (peer_disk == D_INCONSISTENT && mydisk    > D_INCONSISTENT)) {
2530		int f = (hg == -100) || abs(hg) == 2;
2531		hg = mydisk > D_INCONSISTENT ? 1 : -1;
2532		if (f)
2533			hg = hg*2;
2534		dev_info(DEV, "Becoming sync %s due to disk states.\n",
2535		     hg > 0 ? "source" : "target");
2536	}
2537
2538	if (abs(hg) == 100)
2539		drbd_khelper(mdev, "initial-split-brain");
2540
2541	if (hg == 100 || (hg == -100 && mdev->net_conf->always_asbp)) {
2542		int pcount = (mdev->state.role == R_PRIMARY)
 
 
 
 
 
 
 
2543			   + (peer_role == R_PRIMARY);
2544		int forced = (hg == -100);
2545
2546		switch (pcount) {
2547		case 0:
2548			hg = drbd_asb_recover_0p(mdev);
2549			break;
2550		case 1:
2551			hg = drbd_asb_recover_1p(mdev);
2552			break;
2553		case 2:
2554			hg = drbd_asb_recover_2p(mdev);
2555			break;
2556		}
2557		if (abs(hg) < 100) {
2558			dev_warn(DEV, "Split-Brain detected, %d primaries, "
2559			     "automatically solved. Sync from %s node\n",
2560			     pcount, (hg < 0) ? "peer" : "this");
2561			if (forced) {
2562				dev_warn(DEV, "Doing a full sync, since"
2563				     " UUIDs where ambiguous.\n");
2564				hg = hg*2;
2565			}
2566		}
2567	}
2568
2569	if (hg == -100) {
2570		if (mdev->net_conf->want_lose && !(mdev->p_uuid[UI_FLAGS]&1))
2571			hg = -1;
2572		if (!mdev->net_conf->want_lose && (mdev->p_uuid[UI_FLAGS]&1))
2573			hg = 1;
2574
2575		if (abs(hg) < 100)
2576			dev_warn(DEV, "Split-Brain detected, manually solved. "
2577			     "Sync from %s node\n",
2578			     (hg < 0) ? "peer" : "this");
2579	}
2580
2581	if (hg == -100) {
2582		/* FIXME this log message is not correct if we end up here
2583		 * after an attempted attach on a diskless node.
2584		 * We just refuse to attach -- well, we drop the "connection"
2585		 * to that disk, in a way... */
2586		dev_alert(DEV, "Split-Brain detected but unresolved, dropping connection!\n");
2587		drbd_khelper(mdev, "split-brain");
2588		return C_MASK;
2589	}
2590
2591	if (hg > 0 && mydisk <= D_INCONSISTENT) {
2592		dev_err(DEV, "I shall become SyncSource, but I am inconsistent!\n");
2593		return C_MASK;
2594	}
2595
2596	if (hg < 0 && /* by intention we do not use mydisk here. */
2597	    mdev->state.role == R_PRIMARY && mdev->state.disk >= D_CONSISTENT) {
2598		switch (mdev->net_conf->rr_conflict) {
2599		case ASB_CALL_HELPER:
2600			drbd_khelper(mdev, "pri-lost");
2601			/* fall through */
2602		case ASB_DISCONNECT:
2603			dev_err(DEV, "I shall become SyncTarget, but I am primary!\n");
2604			return C_MASK;
2605		case ASB_VIOLENTLY:
2606			dev_warn(DEV, "Becoming SyncTarget, violating the stable-data"
2607			     "assumption\n");
2608		}
2609	}
2610
2611	if (mdev->net_conf->dry_run || test_bit(CONN_DRY_RUN, &mdev->flags)) {
2612		if (hg == 0)
2613			dev_info(DEV, "dry-run connect: No resync, would become Connected immediately.\n");
2614		else
2615			dev_info(DEV, "dry-run connect: Would become %s, doing a %s resync.",
2616				 drbd_conn_str(hg > 0 ? C_SYNC_SOURCE : C_SYNC_TARGET),
2617				 abs(hg) >= 2 ? "full" : "bit-map based");
2618		return C_MASK;
2619	}
2620
2621	if (abs(hg) >= 2) {
2622		dev_info(DEV, "Writing the whole bitmap, full sync required after drbd_sync_handshake.\n");
2623		if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from sync_handshake",
2624					BM_LOCKED_SET_ALLOWED))
2625			return C_MASK;
2626	}
2627
2628	if (hg > 0) { /* become sync source. */
2629		rv = C_WF_BITMAP_S;
2630	} else if (hg < 0) { /* become sync target */
2631		rv = C_WF_BITMAP_T;
2632	} else {
2633		rv = C_CONNECTED;
2634		if (drbd_bm_total_weight(mdev)) {
2635			dev_info(DEV, "No resync, but %lu bits in bitmap!\n",
2636			     drbd_bm_total_weight(mdev));
2637		}
2638	}
2639
2640	return rv;
2641}
2642
2643/* returns 1 if invalid */
2644static int cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self)
2645{
2646	/* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
2647	if ((peer == ASB_DISCARD_REMOTE && self == ASB_DISCARD_LOCAL) ||
2648	    (self == ASB_DISCARD_REMOTE && peer == ASB_DISCARD_LOCAL))
2649		return 0;
2650
2651	/* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
2652	if (peer == ASB_DISCARD_REMOTE || peer == ASB_DISCARD_LOCAL ||
2653	    self == ASB_DISCARD_REMOTE || self == ASB_DISCARD_LOCAL)
2654		return 1;
2655
2656	/* everything else is valid if they are equal on both sides. */
2657	if (peer == self)
2658		return 0;
2659
2660	/* everything es is invalid. */
2661	return 1;
2662}
2663
2664static int receive_protocol(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
2665{
2666	struct p_protocol *p = &mdev->data.rbuf.protocol;
2667	int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
2668	int p_want_lose, p_two_primaries, cf;
2669	char p_integrity_alg[SHARED_SECRET_MAX] = "";
 
 
 
2670
2671	p_proto		= be32_to_cpu(p->protocol);
2672	p_after_sb_0p	= be32_to_cpu(p->after_sb_0p);
2673	p_after_sb_1p	= be32_to_cpu(p->after_sb_1p);
2674	p_after_sb_2p	= be32_to_cpu(p->after_sb_2p);
2675	p_two_primaries = be32_to_cpu(p->two_primaries);
2676	cf		= be32_to_cpu(p->conn_flags);
2677	p_want_lose = cf & CF_WANT_LOSE;
2678
2679	clear_bit(CONN_DRY_RUN, &mdev->flags);
 
2680
2681	if (cf & CF_DRY_RUN)
2682		set_bit(CONN_DRY_RUN, &mdev->flags);
2683
2684	if (p_proto != mdev->net_conf->wire_protocol) {
2685		dev_err(DEV, "incompatible communication protocols\n");
2686		goto disconnect;
2687	}
2688
2689	if (cmp_after_sb(p_after_sb_0p, mdev->net_conf->after_sb_0p)) {
2690		dev_err(DEV, "incompatible after-sb-0pri settings\n");
2691		goto disconnect;
2692	}
2693
2694	if (cmp_after_sb(p_after_sb_1p, mdev->net_conf->after_sb_1p)) {
2695		dev_err(DEV, "incompatible after-sb-1pri settings\n");
2696		goto disconnect;
2697	}
2698
2699	if (cmp_after_sb(p_after_sb_2p, mdev->net_conf->after_sb_2p)) {
2700		dev_err(DEV, "incompatible after-sb-2pri settings\n");
2701		goto disconnect;
2702	}
2703
2704	if (p_want_lose && mdev->net_conf->want_lose) {
2705		dev_err(DEV, "both sides have the 'want_lose' flag set\n");
2706		goto disconnect;
2707	}
2708
2709	if (p_two_primaries != mdev->net_conf->two_primaries) {
2710		dev_err(DEV, "incompatible setting of the two-primaries options\n");
2711		goto disconnect;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2712	}
2713
2714	if (mdev->agreed_pro_version >= 87) {
2715		unsigned char *my_alg = mdev->net_conf->integrity_alg;
 
 
 
 
 
 
 
 
 
2716
2717		if (drbd_recv(mdev, p_integrity_alg, data_size) != data_size)
2718			return false;
 
 
 
 
 
2719
2720		p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
2721		if (strcmp(p_integrity_alg, my_alg)) {
2722			dev_err(DEV, "incompatible setting of the data-integrity-alg\n");
 
 
2723			goto disconnect;
2724		}
2725		dev_info(DEV, "data-integrity-alg: %s\n",
2726		     my_alg[0] ? my_alg : (unsigned char *)"<not-used>");
2727	}
2728
2729	return true;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2730
 
 
2731disconnect:
2732	drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
2733	return false;
 
 
 
2734}
2735
2736/* helper function
2737 * input: alg name, feature name
2738 * return: NULL (alg name was "")
2739 *         ERR_PTR(error) if something goes wrong
2740 *         or the crypto hash ptr, if it worked out ok. */
2741struct crypto_hash *drbd_crypto_alloc_digest_safe(const struct drbd_conf *mdev,
 
2742		const char *alg, const char *name)
2743{
2744	struct crypto_hash *tfm;
2745
2746	if (!alg[0])
2747		return NULL;
2748
2749	tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC);
2750	if (IS_ERR(tfm)) {
2751		dev_err(DEV, "Can not allocate \"%s\" as %s (reason: %ld)\n",
2752			alg, name, PTR_ERR(tfm));
2753		return tfm;
2754	}
2755	if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
2756		crypto_free_hash(tfm);
2757		dev_err(DEV, "\"%s\" is not a digest (%s)\n", alg, name);
2758		return ERR_PTR(-EINVAL);
2759	}
2760	return tfm;
2761}
2762
2763static int receive_SyncParam(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int packet_size)
2764{
2765	int ok = true;
2766	struct p_rs_param_95 *p = &mdev->data.rbuf.rs_param_95;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2767	unsigned int header_size, data_size, exp_max_sz;
2768	struct crypto_hash *verify_tfm = NULL;
2769	struct crypto_hash *csums_tfm = NULL;
2770	const int apv = mdev->agreed_pro_version;
2771	int *rs_plan_s = NULL;
2772	int fifo_size = 0;
 
 
 
 
 
 
 
 
2773
2774	exp_max_sz  = apv <= 87 ? sizeof(struct p_rs_param)
2775		    : apv == 88 ? sizeof(struct p_rs_param)
2776					+ SHARED_SECRET_MAX
2777		    : apv <= 94 ? sizeof(struct p_rs_param_89)
2778		    : /* apv >= 95 */ sizeof(struct p_rs_param_95);
2779
2780	if (packet_size > exp_max_sz) {
2781		dev_err(DEV, "SyncParam packet too long: received %u, expected <= %u bytes\n",
2782		    packet_size, exp_max_sz);
2783		return false;
2784	}
2785
2786	if (apv <= 88) {
2787		header_size = sizeof(struct p_rs_param) - sizeof(struct p_header80);
2788		data_size   = packet_size  - header_size;
2789	} else if (apv <= 94) {
2790		header_size = sizeof(struct p_rs_param_89) - sizeof(struct p_header80);
2791		data_size   = packet_size  - header_size;
2792		D_ASSERT(data_size == 0);
2793	} else {
2794		header_size = sizeof(struct p_rs_param_95) - sizeof(struct p_header80);
2795		data_size   = packet_size  - header_size;
2796		D_ASSERT(data_size == 0);
2797	}
2798
2799	/* initialize verify_alg and csums_alg */
2800	memset(p->verify_alg, 0, 2 * SHARED_SECRET_MAX);
 
 
2801
2802	if (drbd_recv(mdev, &p->head.payload, header_size) != header_size)
2803		return false;
 
2804
2805	mdev->sync_conf.rate	  = be32_to_cpu(p->rate);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2806
2807	if (apv >= 88) {
2808		if (apv == 88) {
2809			if (data_size > SHARED_SECRET_MAX) {
2810				dev_err(DEV, "verify-alg too long, "
2811				    "peer wants %u, accepting only %u byte\n",
2812						data_size, SHARED_SECRET_MAX);
2813				return false;
2814			}
2815
2816			if (drbd_recv(mdev, p->verify_alg, data_size) != data_size)
2817				return false;
2818
2819			/* we expect NUL terminated string */
2820			/* but just in case someone tries to be evil */
2821			D_ASSERT(p->verify_alg[data_size-1] == 0);
2822			p->verify_alg[data_size-1] = 0;
2823
2824		} else /* apv >= 89 */ {
2825			/* we still expect NUL terminated strings */
2826			/* but just in case someone tries to be evil */
2827			D_ASSERT(p->verify_alg[SHARED_SECRET_MAX-1] == 0);
2828			D_ASSERT(p->csums_alg[SHARED_SECRET_MAX-1] == 0);
2829			p->verify_alg[SHARED_SECRET_MAX-1] = 0;
2830			p->csums_alg[SHARED_SECRET_MAX-1] = 0;
2831		}
2832
2833		if (strcmp(mdev->sync_conf.verify_alg, p->verify_alg)) {
2834			if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2835				dev_err(DEV, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
2836				    mdev->sync_conf.verify_alg, p->verify_alg);
2837				goto disconnect;
2838			}
2839			verify_tfm = drbd_crypto_alloc_digest_safe(mdev,
2840					p->verify_alg, "verify-alg");
2841			if (IS_ERR(verify_tfm)) {
2842				verify_tfm = NULL;
2843				goto disconnect;
2844			}
2845		}
2846
2847		if (apv >= 89 && strcmp(mdev->sync_conf.csums_alg, p->csums_alg)) {
2848			if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2849				dev_err(DEV, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
2850				    mdev->sync_conf.csums_alg, p->csums_alg);
2851				goto disconnect;
2852			}
2853			csums_tfm = drbd_crypto_alloc_digest_safe(mdev,
2854					p->csums_alg, "csums-alg");
2855			if (IS_ERR(csums_tfm)) {
2856				csums_tfm = NULL;
2857				goto disconnect;
2858			}
2859		}
2860
2861		if (apv > 94) {
2862			mdev->sync_conf.rate	  = be32_to_cpu(p->rate);
2863			mdev->sync_conf.c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
2864			mdev->sync_conf.c_delay_target = be32_to_cpu(p->c_delay_target);
2865			mdev->sync_conf.c_fill_target = be32_to_cpu(p->c_fill_target);
2866			mdev->sync_conf.c_max_rate = be32_to_cpu(p->c_max_rate);
2867
2868			fifo_size = (mdev->sync_conf.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
2869			if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
2870				rs_plan_s   = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
2871				if (!rs_plan_s) {
2872					dev_err(DEV, "kmalloc of fifo_buffer failed");
2873					goto disconnect;
2874				}
2875			}
2876		}
2877
2878		spin_lock(&mdev->peer_seq_lock);
2879		/* lock against drbd_nl_syncer_conf() */
2880		if (verify_tfm) {
2881			strcpy(mdev->sync_conf.verify_alg, p->verify_alg);
2882			mdev->sync_conf.verify_alg_len = strlen(p->verify_alg) + 1;
2883			crypto_free_hash(mdev->verify_tfm);
2884			mdev->verify_tfm = verify_tfm;
2885			dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
2886		}
2887		if (csums_tfm) {
2888			strcpy(mdev->sync_conf.csums_alg, p->csums_alg);
2889			mdev->sync_conf.csums_alg_len = strlen(p->csums_alg) + 1;
2890			crypto_free_hash(mdev->csums_tfm);
2891			mdev->csums_tfm = csums_tfm;
2892			dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
2893		}
2894		if (fifo_size != mdev->rs_plan_s.size) {
2895			kfree(mdev->rs_plan_s.values);
2896			mdev->rs_plan_s.values = rs_plan_s;
2897			mdev->rs_plan_s.size   = fifo_size;
2898			mdev->rs_planed = 0;
 
2899		}
2900		spin_unlock(&mdev->peer_seq_lock);
2901	}
2902
2903	return ok;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2904disconnect:
 
 
 
 
 
 
2905	/* just for completeness: actually not needed,
2906	 * as this is not reached if csums_tfm was ok. */
2907	crypto_free_hash(csums_tfm);
2908	/* but free the verify_tfm again, if csums_tfm did not work out */
2909	crypto_free_hash(verify_tfm);
2910	drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
2911	return false;
2912}
2913
2914/* warn if the arguments differ by more than 12.5% */
2915static void warn_if_differ_considerably(struct drbd_conf *mdev,
2916	const char *s, sector_t a, sector_t b)
2917{
2918	sector_t d;
2919	if (a == 0 || b == 0)
2920		return;
2921	d = (a > b) ? (a - b) : (b - a);
2922	if (d > (a>>3) || d > (b>>3))
2923		dev_warn(DEV, "Considerable difference in %s: %llus vs. %llus\n", s,
2924		     (unsigned long long)a, (unsigned long long)b);
2925}
2926
2927static int receive_sizes(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
2928{
2929	struct p_sizes *p = &mdev->data.rbuf.sizes;
2930	enum determine_dev_size dd = unchanged;
2931	sector_t p_size, p_usize, my_usize;
 
 
 
 
2932	int ldsc = 0; /* local disk size changed */
2933	enum dds_flags ddsf;
2934
 
 
 
 
 
 
2935	p_size = be64_to_cpu(p->d_size);
2936	p_usize = be64_to_cpu(p->u_size);
2937
2938	if (p_size == 0 && mdev->state.disk == D_DISKLESS) {
2939		dev_err(DEV, "some backing storage is needed\n");
2940		drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
2941		return false;
2942	}
2943
2944	/* just store the peer's disk size for now.
2945	 * we still need to figure out whether we accept that. */
2946	mdev->p_size = p_size;
2947
2948	if (get_ldev(mdev)) {
2949		warn_if_differ_considerably(mdev, "lower level device sizes",
2950			   p_size, drbd_get_max_capacity(mdev->ldev));
2951		warn_if_differ_considerably(mdev, "user requested size",
2952					    p_usize, mdev->ldev->dc.disk_size);
 
 
 
 
2953
2954		/* if this is the first connect, or an otherwise expected
2955		 * param exchange, choose the minimum */
2956		if (mdev->state.conn == C_WF_REPORT_PARAMS)
2957			p_usize = min_not_zero((sector_t)mdev->ldev->dc.disk_size,
2958					     p_usize);
2959
2960		my_usize = mdev->ldev->dc.disk_size;
2961
2962		if (mdev->ldev->dc.disk_size != p_usize) {
2963			mdev->ldev->dc.disk_size = p_usize;
2964			dev_info(DEV, "Peer sets u_size to %lu sectors\n",
2965			     (unsigned long)mdev->ldev->dc.disk_size);
2966		}
2967
2968		/* Never shrink a device with usable data during connect.
2969		   But allow online shrinking if we are connected. */
2970		if (drbd_new_dev_size(mdev, mdev->ldev, 0) <
2971		   drbd_get_capacity(mdev->this_bdev) &&
2972		   mdev->state.disk >= D_OUTDATED &&
2973		   mdev->state.conn < C_CONNECTED) {
2974			dev_err(DEV, "The peer's disk size is too small!\n");
2975			drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
2976			mdev->ldev->dc.disk_size = my_usize;
2977			put_ldev(mdev);
2978			return false;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2979		}
2980		put_ldev(mdev);
 
2981	}
2982
 
 
 
 
 
 
2983	ddsf = be16_to_cpu(p->dds_flags);
2984	if (get_ldev(mdev)) {
2985		dd = drbd_determine_dev_size(mdev, ddsf);
2986		put_ldev(mdev);
2987		if (dd == dev_size_error)
2988			return false;
2989		drbd_md_sync(mdev);
 
2990	} else {
2991		/* I am diskless, need to accept the peer's size. */
2992		drbd_set_my_capacity(mdev, p_size);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2993	}
2994
2995	mdev->peer_max_bio_size = be32_to_cpu(p->max_bio_size);
2996	drbd_reconsider_max_bio_size(mdev);
2997
2998	if (get_ldev(mdev)) {
2999		if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) {
3000			mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
3001			ldsc = 1;
3002		}
3003
3004		put_ldev(mdev);
3005	}
3006
3007	if (mdev->state.conn > C_WF_REPORT_PARAMS) {
3008		if (be64_to_cpu(p->c_size) !=
3009		    drbd_get_capacity(mdev->this_bdev) || ldsc) {
3010			/* we have different sizes, probably peer
3011			 * needs to know my new size... */
3012			drbd_send_sizes(mdev, 0, ddsf);
3013		}
3014		if (test_and_clear_bit(RESIZE_PENDING, &mdev->flags) ||
3015		    (dd == grew && mdev->state.conn == C_CONNECTED)) {
3016			if (mdev->state.pdsk >= D_INCONSISTENT &&
3017			    mdev->state.disk >= D_INCONSISTENT) {
3018				if (ddsf & DDSF_NO_RESYNC)
3019					dev_info(DEV, "Resync of new storage suppressed with --assume-clean\n");
3020				else
3021					resync_after_online_grow(mdev);
3022			} else
3023				set_bit(RESYNC_AFTER_NEG, &mdev->flags);
3024		}
3025	}
3026
3027	return true;
3028}
3029
3030static int receive_uuids(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3031{
3032	struct p_uuids *p = &mdev->data.rbuf.uuids;
 
 
3033	u64 *p_uuid;
3034	int i, updated_uuids = 0;
3035
3036	p_uuid = kmalloc(sizeof(u64)*UI_EXTENDED_SIZE, GFP_NOIO);
 
 
 
 
 
 
 
3037
3038	for (i = UI_CURRENT; i < UI_EXTENDED_SIZE; i++)
3039		p_uuid[i] = be64_to_cpu(p->uuid[i]);
3040
3041	kfree(mdev->p_uuid);
3042	mdev->p_uuid = p_uuid;
3043
3044	if (mdev->state.conn < C_CONNECTED &&
3045	    mdev->state.disk < D_INCONSISTENT &&
3046	    mdev->state.role == R_PRIMARY &&
3047	    (mdev->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) {
3048		dev_err(DEV, "Can only connect to data with current UUID=%016llX\n",
3049		    (unsigned long long)mdev->ed_uuid);
3050		drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
3051		return false;
3052	}
3053
3054	if (get_ldev(mdev)) {
3055		int skip_initial_sync =
3056			mdev->state.conn == C_CONNECTED &&
3057			mdev->agreed_pro_version >= 90 &&
3058			mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED &&
3059			(p_uuid[UI_FLAGS] & 8);
3060		if (skip_initial_sync) {
3061			dev_info(DEV, "Accepted new current UUID, preparing to skip initial sync\n");
3062			drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
3063					"clear_n_write from receive_uuids",
3064					BM_LOCKED_TEST_ALLOWED);
3065			_drbd_uuid_set(mdev, UI_CURRENT, p_uuid[UI_CURRENT]);
3066			_drbd_uuid_set(mdev, UI_BITMAP, 0);
3067			_drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
3068					CS_VERBOSE, NULL);
3069			drbd_md_sync(mdev);
3070			updated_uuids = 1;
3071		}
3072		put_ldev(mdev);
3073	} else if (mdev->state.disk < D_INCONSISTENT &&
3074		   mdev->state.role == R_PRIMARY) {
3075		/* I am a diskless primary, the peer just created a new current UUID
3076		   for me. */
3077		updated_uuids = drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
3078	}
3079
3080	/* Before we test for the disk state, we should wait until an eventually
3081	   ongoing cluster wide state change is finished. That is important if
3082	   we are primary and are detaching from our disk. We need to see the
3083	   new disk state... */
3084	wait_event(mdev->misc_wait, !test_bit(CLUSTER_ST_CHANGE, &mdev->flags));
3085	if (mdev->state.conn >= C_CONNECTED && mdev->state.disk < D_INCONSISTENT)
3086		updated_uuids |= drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
 
3087
3088	if (updated_uuids)
3089		drbd_print_uuids(mdev, "receiver updated UUIDs to");
3090
3091	return true;
3092}
3093
3094/**
3095 * convert_state() - Converts the peer's view of the cluster state to our point of view
3096 * @ps:		The state as seen by the peer.
3097 */
3098static union drbd_state convert_state(union drbd_state ps)
3099{
3100	union drbd_state ms;
3101
3102	static enum drbd_conns c_tab[] = {
 
3103		[C_CONNECTED] = C_CONNECTED,
3104
3105		[C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
3106		[C_STARTING_SYNC_T] = C_STARTING_SYNC_S,
3107		[C_DISCONNECTING] = C_TEAR_DOWN, /* C_NETWORK_FAILURE, */
3108		[C_VERIFY_S]       = C_VERIFY_T,
3109		[C_MASK]   = C_MASK,
3110	};
3111
3112	ms.i = ps.i;
3113
3114	ms.conn = c_tab[ps.conn];
3115	ms.peer = ps.role;
3116	ms.role = ps.peer;
3117	ms.pdsk = ps.disk;
3118	ms.disk = ps.pdsk;
3119	ms.peer_isp = (ps.aftr_isp | ps.user_isp);
3120
3121	return ms;
3122}
3123
3124static int receive_req_state(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3125{
3126	struct p_req_state *p = &mdev->data.rbuf.req_state;
 
 
3127	union drbd_state mask, val;
3128	enum drbd_state_rv rv;
3129
 
 
 
 
 
3130	mask.i = be32_to_cpu(p->mask);
3131	val.i = be32_to_cpu(p->val);
3132
3133	if (test_bit(DISCARD_CONCURRENT, &mdev->flags) &&
3134	    test_bit(CLUSTER_ST_CHANGE, &mdev->flags)) {
3135		drbd_send_sr_reply(mdev, SS_CONCURRENT_ST_CHG);
3136		return true;
3137	}
3138
3139	mask = convert_state(mask);
3140	val = convert_state(val);
3141
3142	rv = drbd_change_state(mdev, CS_VERBOSE, mask, val);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3143
3144	drbd_send_sr_reply(mdev, rv);
3145	drbd_md_sync(mdev);
3146
3147	return true;
3148}
3149
3150static int receive_state(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3151{
3152	struct p_state *p = &mdev->data.rbuf.state;
 
 
3153	union drbd_state os, ns, peer_state;
3154	enum drbd_disk_state real_peer_disk;
3155	enum chg_state_flags cs_flags;
3156	int rv;
3157
 
 
 
 
 
3158	peer_state.i = be32_to_cpu(p->state);
3159
3160	real_peer_disk = peer_state.disk;
3161	if (peer_state.disk == D_NEGOTIATING) {
3162		real_peer_disk = mdev->p_uuid[UI_FLAGS] & 4 ? D_INCONSISTENT : D_CONSISTENT;
3163		dev_info(DEV, "real peer disk state = %s\n", drbd_disk_str(real_peer_disk));
3164	}
3165
3166	spin_lock_irq(&mdev->req_lock);
3167 retry:
3168	os = ns = mdev->state;
3169	spin_unlock_irq(&mdev->req_lock);
3170
3171	/* peer says his disk is uptodate, while we think it is inconsistent,
3172	 * and this happens while we think we have a sync going on. */
3173	if (os.pdsk == D_INCONSISTENT && real_peer_disk == D_UP_TO_DATE &&
 
 
 
 
 
 
 
 
 
 
 
3174	    os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
3175		/* If we are (becoming) SyncSource, but peer is still in sync
3176		 * preparation, ignore its uptodate-ness to avoid flapping, it
3177		 * will change to inconsistent once the peer reaches active
3178		 * syncing states.
3179		 * It may have changed syncer-paused flags, however, so we
3180		 * cannot ignore this completely. */
3181		if (peer_state.conn > C_CONNECTED &&
3182		    peer_state.conn < C_SYNC_SOURCE)
3183			real_peer_disk = D_INCONSISTENT;
3184
3185		/* if peer_state changes to connected at the same time,
3186		 * it explicitly notifies us that it finished resync.
3187		 * Maybe we should finish it up, too? */
3188		else if (os.conn >= C_SYNC_SOURCE &&
3189			 peer_state.conn == C_CONNECTED) {
3190			if (drbd_bm_total_weight(mdev) <= mdev->rs_failed)
3191				drbd_resync_finished(mdev);
3192			return true;
3193		}
3194	}
3195
 
 
 
 
 
 
 
 
3196	/* peer says his disk is inconsistent, while we think it is uptodate,
3197	 * and this happens while the peer still thinks we have a sync going on,
3198	 * but we think we are already done with the sync.
3199	 * We ignore this to avoid flapping pdsk.
3200	 * This should not happen, if the peer is a recent version of drbd. */
3201	if (os.pdsk == D_UP_TO_DATE && real_peer_disk == D_INCONSISTENT &&
3202	    os.conn == C_CONNECTED && peer_state.conn > C_SYNC_SOURCE)
3203		real_peer_disk = D_UP_TO_DATE;
3204
3205	if (ns.conn == C_WF_REPORT_PARAMS)
3206		ns.conn = C_CONNECTED;
3207
3208	if (peer_state.conn == C_AHEAD)
3209		ns.conn = C_BEHIND;
3210
3211	if (mdev->p_uuid && peer_state.disk >= D_NEGOTIATING &&
3212	    get_ldev_if_state(mdev, D_NEGOTIATING)) {
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3213		int cr; /* consider resync */
3214
3215		/* if we established a new connection */
3216		cr  = (os.conn < C_CONNECTED);
3217		/* if we had an established connection
3218		 * and one of the nodes newly attaches a disk */
3219		cr |= (os.conn == C_CONNECTED &&
3220		       (peer_state.disk == D_NEGOTIATING ||
3221			os.disk == D_NEGOTIATING));
3222		/* if we have both been inconsistent, and the peer has been
3223		 * forced to be UpToDate with --overwrite-data */
3224		cr |= test_bit(CONSIDER_RESYNC, &mdev->flags);
3225		/* if we had been plain connected, and the admin requested to
3226		 * start a sync by "invalidate" or "invalidate-remote" */
3227		cr |= (os.conn == C_CONNECTED &&
3228				(peer_state.conn >= C_STARTING_SYNC_S &&
3229				 peer_state.conn <= C_WF_BITMAP_T));
3230
3231		if (cr)
3232			ns.conn = drbd_sync_handshake(mdev, peer_state.role, real_peer_disk);
3233
3234		put_ldev(mdev);
3235		if (ns.conn == C_MASK) {
3236			ns.conn = C_CONNECTED;
3237			if (mdev->state.disk == D_NEGOTIATING) {
3238				drbd_force_state(mdev, NS(disk, D_FAILED));
3239			} else if (peer_state.disk == D_NEGOTIATING) {
3240				dev_err(DEV, "Disk attach process on the peer node was aborted.\n");
3241				peer_state.disk = D_DISKLESS;
3242				real_peer_disk = D_DISKLESS;
3243			} else {
3244				if (test_and_clear_bit(CONN_DRY_RUN, &mdev->flags))
3245					return false;
3246				D_ASSERT(os.conn == C_WF_REPORT_PARAMS);
3247				drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
3248				return false;
3249			}
3250		}
3251	}
3252
3253	spin_lock_irq(&mdev->req_lock);
3254	if (mdev->state.i != os.i)
3255		goto retry;
3256	clear_bit(CONSIDER_RESYNC, &mdev->flags);
3257	ns.peer = peer_state.role;
3258	ns.pdsk = real_peer_disk;
3259	ns.peer_isp = (peer_state.aftr_isp | peer_state.user_isp);
3260	if ((ns.conn == C_CONNECTED || ns.conn == C_WF_BITMAP_S) && ns.disk == D_NEGOTIATING)
3261		ns.disk = mdev->new_state_tmp.disk;
3262	cs_flags = CS_VERBOSE + (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED ? 0 : CS_HARD);
3263	if (ns.pdsk == D_CONSISTENT && is_susp(ns) && ns.conn == C_CONNECTED && os.conn < C_CONNECTED &&
3264	    test_bit(NEW_CUR_UUID, &mdev->flags)) {
3265		/* Do not allow tl_restart(resend) for a rebooted peer. We can only allow this
3266		   for temporal network outages! */
3267		spin_unlock_irq(&mdev->req_lock);
3268		dev_err(DEV, "Aborting Connect, can not thaw IO with an only Consistent peer\n");
3269		tl_clear(mdev);
3270		drbd_uuid_new_current(mdev);
3271		clear_bit(NEW_CUR_UUID, &mdev->flags);
3272		drbd_force_state(mdev, NS2(conn, C_PROTOCOL_ERROR, susp, 0));
3273		return false;
3274	}
3275	rv = _drbd_set_state(mdev, ns, cs_flags, NULL);
3276	ns = mdev->state;
3277	spin_unlock_irq(&mdev->req_lock);
3278
3279	if (rv < SS_SUCCESS) {
3280		drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
3281		return false;
3282	}
3283
3284	if (os.conn > C_WF_REPORT_PARAMS) {
3285		if (ns.conn > C_CONNECTED && peer_state.conn <= C_CONNECTED &&
3286		    peer_state.disk != D_NEGOTIATING ) {
3287			/* we want resync, peer has not yet decided to sync... */
3288			/* Nowadays only used when forcing a node into primary role and
3289			   setting its disk to UpToDate with that */
3290			drbd_send_uuids(mdev);
3291			drbd_send_state(mdev);
3292		}
3293	}
3294
3295	mdev->net_conf->want_lose = 0;
3296
3297	drbd_md_sync(mdev); /* update connected indicator, la_size, ... */
3298
3299	return true;
3300}
3301
3302static int receive_sync_uuid(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3303{
3304	struct p_rs_uuid *p = &mdev->data.rbuf.rs_uuid;
 
 
 
 
 
 
 
3305
3306	wait_event(mdev->misc_wait,
3307		   mdev->state.conn == C_WF_SYNC_UUID ||
3308		   mdev->state.conn == C_BEHIND ||
3309		   mdev->state.conn < C_CONNECTED ||
3310		   mdev->state.disk < D_NEGOTIATING);
3311
3312	/* D_ASSERT( mdev->state.conn == C_WF_SYNC_UUID ); */
3313
3314	/* Here the _drbd_uuid_ functions are right, current should
3315	   _not_ be rotated into the history */
3316	if (get_ldev_if_state(mdev, D_NEGOTIATING)) {
3317		_drbd_uuid_set(mdev, UI_CURRENT, be64_to_cpu(p->uuid));
3318		_drbd_uuid_set(mdev, UI_BITMAP, 0UL);
3319
3320		drbd_print_uuids(mdev, "updated sync uuid");
3321		drbd_start_resync(mdev, C_SYNC_TARGET);
3322
3323		put_ldev(mdev);
3324	} else
3325		dev_err(DEV, "Ignoring SyncUUID packet!\n");
3326
3327	return true;
3328}
3329
3330/**
3331 * receive_bitmap_plain
3332 *
3333 * Return 0 when done, 1 when another iteration is needed, and a negative error
3334 * code upon failure.
3335 */
3336static int
3337receive_bitmap_plain(struct drbd_conf *mdev, unsigned int data_size,
3338		     unsigned long *buffer, struct bm_xfer_ctx *c)
3339{
3340	unsigned num_words = min_t(size_t, BM_PACKET_WORDS, c->bm_words - c->word_offset);
3341	unsigned want = num_words * sizeof(long);
 
 
 
3342	int err;
3343
3344	if (want != data_size) {
3345		dev_err(DEV, "%s:want (%u) != data_size (%u)\n", __func__, want, data_size);
3346		return -EIO;
3347	}
3348	if (want == 0)
3349		return 0;
3350	err = drbd_recv(mdev, buffer, want);
3351	if (err != want) {
3352		if (err >= 0)
3353			err = -EIO;
3354		return err;
3355	}
3356
3357	drbd_bm_merge_lel(mdev, c->word_offset, num_words, buffer);
3358
3359	c->word_offset += num_words;
3360	c->bit_offset = c->word_offset * BITS_PER_LONG;
3361	if (c->bit_offset > c->bm_bits)
3362		c->bit_offset = c->bm_bits;
3363
3364	return 1;
3365}
3366
3367/**
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3368 * recv_bm_rle_bits
3369 *
3370 * Return 0 when done, 1 when another iteration is needed, and a negative error
3371 * code upon failure.
3372 */
3373static int
3374recv_bm_rle_bits(struct drbd_conf *mdev,
3375		struct p_compressed_bm *p,
3376		struct bm_xfer_ctx *c)
 
3377{
3378	struct bitstream bs;
3379	u64 look_ahead;
3380	u64 rl;
3381	u64 tmp;
3382	unsigned long s = c->bit_offset;
3383	unsigned long e;
3384	int len = be16_to_cpu(p->head.length) - (sizeof(*p) - sizeof(p->head));
3385	int toggle = DCBP_get_start(p);
3386	int have;
3387	int bits;
3388
3389	bitstream_init(&bs, p->code, len, DCBP_get_pad_bits(p));
3390
3391	bits = bitstream_get_bits(&bs, &look_ahead, 64);
3392	if (bits < 0)
3393		return -EIO;
3394
3395	for (have = bits; have > 0; s += rl, toggle = !toggle) {
3396		bits = vli_decode_bits(&rl, look_ahead);
3397		if (bits <= 0)
3398			return -EIO;
3399
3400		if (toggle) {
3401			e = s + rl -1;
3402			if (e >= c->bm_bits) {
3403				dev_err(DEV, "bitmap overflow (e:%lu) while decoding bm RLE packet\n", e);
3404				return -EIO;
3405			}
3406			_drbd_bm_set_bits(mdev, s, e);
3407		}
3408
3409		if (have < bits) {
3410			dev_err(DEV, "bitmap decoding error: h:%d b:%d la:0x%08llx l:%u/%u\n",
3411				have, bits, look_ahead,
3412				(unsigned int)(bs.cur.b - p->code),
3413				(unsigned int)bs.buf_len);
3414			return -EIO;
3415		}
3416		look_ahead >>= bits;
 
 
 
 
3417		have -= bits;
3418
3419		bits = bitstream_get_bits(&bs, &tmp, 64 - have);
3420		if (bits < 0)
3421			return -EIO;
3422		look_ahead |= tmp << have;
3423		have += bits;
3424	}
3425
3426	c->bit_offset = s;
3427	bm_xfer_ctx_bit_to_word_offset(c);
3428
3429	return (s != c->bm_bits);
3430}
3431
3432/**
3433 * decode_bitmap_c
3434 *
3435 * Return 0 when done, 1 when another iteration is needed, and a negative error
3436 * code upon failure.
3437 */
3438static int
3439decode_bitmap_c(struct drbd_conf *mdev,
3440		struct p_compressed_bm *p,
3441		struct bm_xfer_ctx *c)
 
3442{
3443	if (DCBP_get_code(p) == RLE_VLI_Bits)
3444		return recv_bm_rle_bits(mdev, p, c);
3445
3446	/* other variants had been implemented for evaluation,
3447	 * but have been dropped as this one turned out to be "best"
3448	 * during all our tests. */
3449
3450	dev_err(DEV, "receive_bitmap_c: unknown encoding %u\n", p->encoding);
3451	drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
3452	return -EIO;
3453}
3454
3455void INFO_bm_xfer_stats(struct drbd_conf *mdev,
3456		const char *direction, struct bm_xfer_ctx *c)
3457{
3458	/* what would it take to transfer it "plaintext" */
3459	unsigned plain = sizeof(struct p_header80) *
3460		((c->bm_words+BM_PACKET_WORDS-1)/BM_PACKET_WORDS+1)
3461		+ c->bm_words * sizeof(long);
3462	unsigned total = c->bytes[0] + c->bytes[1];
3463	unsigned r;
 
 
3464
3465	/* total can not be zero. but just in case: */
3466	if (total == 0)
3467		return;
3468
3469	/* don't report if not compressed */
3470	if (total >= plain)
3471		return;
3472
3473	/* total < plain. check for overflow, still */
3474	r = (total > UINT_MAX/1000) ? (total / (plain/1000))
3475		                    : (1000 * total / plain);
3476
3477	if (r > 1000)
3478		r = 1000;
3479
3480	r = 1000 - r;
3481	dev_info(DEV, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), "
3482	     "total %u; compression: %u.%u%%\n",
3483			direction,
3484			c->bytes[1], c->packets[1],
3485			c->bytes[0], c->packets[0],
3486			total, r/10, r % 10);
3487}
3488
3489/* Since we are processing the bitfield from lower addresses to higher,
3490   it does not matter if the process it in 32 bit chunks or 64 bit
3491   chunks as long as it is little endian. (Understand it as byte stream,
3492   beginning with the lowest byte...) If we would use big endian
3493   we would need to process it from the highest address to the lowest,
3494   in order to be agnostic to the 32 vs 64 bits issue.
3495
3496   returns 0 on failure, 1 if we successfully received it. */
3497static int receive_bitmap(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3498{
 
 
3499	struct bm_xfer_ctx c;
3500	void *buffer;
3501	int err;
3502	int ok = false;
3503	struct p_header80 *h = &mdev->data.rbuf.header.h80;
3504
3505	drbd_bm_lock(mdev, "receive bitmap", BM_LOCKED_SET_ALLOWED);
 
 
 
 
 
3506	/* you are supposed to send additional out-of-sync information
3507	 * if you actually set bits during this phase */
3508
3509	/* maybe we should use some per thread scratch page,
3510	 * and allocate that during initial device creation? */
3511	buffer	 = (unsigned long *) __get_free_page(GFP_NOIO);
3512	if (!buffer) {
3513		dev_err(DEV, "failed to allocate one page buffer in %s\n", __func__);
3514		goto out;
3515	}
3516
3517	c = (struct bm_xfer_ctx) {
3518		.bm_bits = drbd_bm_bits(mdev),
3519		.bm_words = drbd_bm_words(mdev),
3520	};
3521
3522	for(;;) {
3523		if (cmd == P_BITMAP) {
3524			err = receive_bitmap_plain(mdev, data_size, buffer, &c);
3525		} else if (cmd == P_COMPRESSED_BITMAP) {
3526			/* MAYBE: sanity check that we speak proto >= 90,
3527			 * and the feature is enabled! */
3528			struct p_compressed_bm *p;
3529
3530			if (data_size > BM_PACKET_PAYLOAD_BYTES) {
3531				dev_err(DEV, "ReportCBitmap packet too large\n");
 
3532				goto out;
3533			}
3534			/* use the page buff */
3535			p = buffer;
3536			memcpy(p, h, sizeof(*h));
3537			if (drbd_recv(mdev, p->head.payload, data_size) != data_size)
3538				goto out;
3539			if (data_size <= (sizeof(*p) - sizeof(p->head))) {
3540				dev_err(DEV, "ReportCBitmap packet too small (l:%u)\n", data_size);
3541				goto out;
3542			}
3543			err = decode_bitmap_c(mdev, p, &c);
 
 
 
3544		} else {
3545			dev_warn(DEV, "receive_bitmap: cmd neither ReportBitMap nor ReportCBitMap (is 0x%x)", cmd);
 
3546			goto out;
3547		}
3548
3549		c.packets[cmd == P_BITMAP]++;
3550		c.bytes[cmd == P_BITMAP] += sizeof(struct p_header80) + data_size;
3551
3552		if (err <= 0) {
3553			if (err < 0)
3554				goto out;
3555			break;
3556		}
3557		if (!drbd_recv_header(mdev, &cmd, &data_size))
 
3558			goto out;
3559	}
3560
3561	INFO_bm_xfer_stats(mdev, "receive", &c);
3562
3563	if (mdev->state.conn == C_WF_BITMAP_T) {
3564		enum drbd_state_rv rv;
3565
3566		ok = !drbd_send_bitmap(mdev);
3567		if (!ok)
3568			goto out;
3569		/* Omit CS_ORDERED with this state transition to avoid deadlocks. */
3570		rv = _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
3571		D_ASSERT(rv == SS_SUCCESS);
3572	} else if (mdev->state.conn != C_WF_BITMAP_S) {
3573		/* admin may have requested C_DISCONNECTING,
3574		 * other threads may have noticed network errors */
3575		dev_info(DEV, "unexpected cstate (%s) in receive_bitmap\n",
3576		    drbd_conn_str(mdev->state.conn));
3577	}
 
3578
3579	ok = true;
3580 out:
3581	drbd_bm_unlock(mdev);
3582	if (ok && mdev->state.conn == C_WF_BITMAP_S)
3583		drbd_start_resync(mdev, C_SYNC_SOURCE);
3584	free_page((unsigned long) buffer);
3585	return ok;
3586}
3587
3588static int receive_skip(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3589{
3590	/* TODO zero copy sink :) */
3591	static char sink[128];
3592	int size, want, r;
3593
3594	dev_warn(DEV, "skipping unknown optional packet type %d, l: %d!\n",
3595		 cmd, data_size);
3596
3597	size = data_size;
3598	while (size > 0) {
3599		want = min_t(int, size, sizeof(sink));
3600		r = drbd_recv(mdev, sink, want);
3601		ERR_IF(r <= 0) break;
3602		size -= r;
3603	}
3604	return size == 0;
3605}
3606
3607static int receive_UnplugRemote(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3608{
3609	/* Make sure we've acked all the TCP data associated
3610	 * with the data requests being unplugged */
3611	drbd_tcp_quickack(mdev->data.socket);
3612
3613	return true;
3614}
3615
3616static int receive_out_of_sync(struct drbd_conf *mdev, enum drbd_packets cmd, unsigned int data_size)
3617{
3618	struct p_block_desc *p = &mdev->data.rbuf.block_desc;
 
 
3619
3620	switch (mdev->state.conn) {
 
 
 
 
 
3621	case C_WF_SYNC_UUID:
3622	case C_WF_BITMAP_T:
3623	case C_BEHIND:
3624			break;
3625	default:
3626		dev_err(DEV, "ASSERT FAILED cstate = %s, expected: WFSyncUUID|WFBitMapT|Behind\n",
3627				drbd_conn_str(mdev->state.conn));
3628	}
3629
3630	drbd_set_out_of_sync(mdev, be64_to_cpu(p->sector), be32_to_cpu(p->blksize));
3631
3632	return true;
3633}
3634
3635typedef int (*drbd_cmd_handler_f)(struct drbd_conf *, enum drbd_packets cmd, unsigned int to_receive);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3636
3637struct data_cmd {
3638	int expect_payload;
3639	size_t pkt_size;
3640	drbd_cmd_handler_f function;
3641};
3642
3643static struct data_cmd drbd_cmd_handler[] = {
3644	[P_DATA]	    = { 1, sizeof(struct p_data), receive_Data },
3645	[P_DATA_REPLY]	    = { 1, sizeof(struct p_data), receive_DataReply },
3646	[P_RS_DATA_REPLY]   = { 1, sizeof(struct p_data), receive_RSDataReply } ,
3647	[P_BARRIER]	    = { 0, sizeof(struct p_barrier), receive_Barrier } ,
3648	[P_BITMAP]	    = { 1, sizeof(struct p_header80), receive_bitmap } ,
3649	[P_COMPRESSED_BITMAP] = { 1, sizeof(struct p_header80), receive_bitmap } ,
3650	[P_UNPLUG_REMOTE]   = { 0, sizeof(struct p_header80), receive_UnplugRemote },
3651	[P_DATA_REQUEST]    = { 0, sizeof(struct p_block_req), receive_DataRequest },
3652	[P_RS_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3653	[P_SYNC_PARAM]	    = { 1, sizeof(struct p_header80), receive_SyncParam },
3654	[P_SYNC_PARAM89]    = { 1, sizeof(struct p_header80), receive_SyncParam },
3655	[P_PROTOCOL]        = { 1, sizeof(struct p_protocol), receive_protocol },
3656	[P_UUIDS]	    = { 0, sizeof(struct p_uuids), receive_uuids },
3657	[P_SIZES]	    = { 0, sizeof(struct p_sizes), receive_sizes },
3658	[P_STATE]	    = { 0, sizeof(struct p_state), receive_state },
3659	[P_STATE_CHG_REQ]   = { 0, sizeof(struct p_req_state), receive_req_state },
3660	[P_SYNC_UUID]       = { 0, sizeof(struct p_rs_uuid), receive_sync_uuid },
3661	[P_OV_REQUEST]      = { 0, sizeof(struct p_block_req), receive_DataRequest },
3662	[P_OV_REPLY]        = { 1, sizeof(struct p_block_req), receive_DataRequest },
3663	[P_CSUM_RS_REQUEST] = { 1, sizeof(struct p_block_req), receive_DataRequest },
 
3664	[P_DELAY_PROBE]     = { 0, sizeof(struct p_delay_probe93), receive_skip },
3665	[P_OUT_OF_SYNC]     = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
3666	/* anything missing from this table is in
3667	 * the asender_tbl, see get_asender_cmd */
3668	[P_MAX_CMD]	    = { 0, 0, NULL },
 
 
3669};
3670
3671/* All handler functions that expect a sub-header get that sub-heder in
3672   mdev->data.rbuf.header.head.payload.
3673
3674   Usually in mdev->data.rbuf.header.head the callback can find the usual
3675   p_header, but they may not rely on that. Since there is also p_header95 !
3676 */
3677
3678static void drbdd(struct drbd_conf *mdev)
3679{
3680	union p_header *header = &mdev->data.rbuf.header;
3681	unsigned int packet_size;
3682	enum drbd_packets cmd;
3683	size_t shs; /* sub header size */
3684	int rv;
3685
3686	while (get_t_state(&mdev->receiver) == Running) {
3687		drbd_thread_current_set_cpu(mdev);
3688		if (!drbd_recv_header(mdev, &cmd, &packet_size))
 
 
 
3689			goto err_out;
3690
3691		if (unlikely(cmd >= P_MAX_CMD || !drbd_cmd_handler[cmd].function)) {
3692			dev_err(DEV, "unknown packet type %d, l: %d!\n", cmd, packet_size);
 
 
3693			goto err_out;
3694		}
3695
3696		shs = drbd_cmd_handler[cmd].pkt_size - sizeof(union p_header);
3697		if (packet_size - shs > 0 && !drbd_cmd_handler[cmd].expect_payload) {
3698			dev_err(DEV, "No payload expected %s l:%d\n", cmdname(cmd), packet_size);
 
 
 
 
 
 
 
 
3699			goto err_out;
3700		}
3701
3702		if (shs) {
3703			rv = drbd_recv(mdev, &header->h80.payload, shs);
3704			if (unlikely(rv != shs)) {
3705				if (!signal_pending(current))
3706					dev_warn(DEV, "short read while reading sub header: rv=%d\n", rv);
3707				goto err_out;
3708			}
3709		}
3710
3711		rv = drbd_cmd_handler[cmd].function(mdev, cmd, packet_size - shs);
3712
3713		if (unlikely(!rv)) {
3714			dev_err(DEV, "error receiving %s, l: %d!\n",
3715			    cmdname(cmd), packet_size);
3716			goto err_out;
3717		}
3718	}
 
3719
3720	if (0) {
3721	err_out:
3722		drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
3723	}
3724	/* If we leave here, we probably want to update at least the
3725	 * "Connected" indicator on stable storage. Do so explicitly here. */
3726	drbd_md_sync(mdev);
3727}
3728
3729void drbd_flush_workqueue(struct drbd_conf *mdev)
3730{
3731	struct drbd_wq_barrier barr;
3732
3733	barr.w.cb = w_prev_work_done;
3734	init_completion(&barr.done);
3735	drbd_queue_work(&mdev->data.work, &barr.w);
3736	wait_for_completion(&barr.done);
3737}
3738
3739void drbd_free_tl_hash(struct drbd_conf *mdev)
3740{
3741	struct hlist_head *h;
3742
3743	spin_lock_irq(&mdev->req_lock);
 
 
 
 
 
3744
3745	if (!mdev->tl_hash || mdev->state.conn != C_STANDALONE) {
3746		spin_unlock_irq(&mdev->req_lock);
3747		return;
 
 
 
 
 
 
 
 
 
 
 
 
 
3748	}
3749	/* paranoia code */
3750	for (h = mdev->ee_hash; h < mdev->ee_hash + mdev->ee_hash_s; h++)
3751		if (h->first)
3752			dev_err(DEV, "ASSERT FAILED ee_hash[%u].first == %p, expected NULL\n",
3753				(int)(h - mdev->ee_hash), h->first);
3754	kfree(mdev->ee_hash);
3755	mdev->ee_hash = NULL;
3756	mdev->ee_hash_s = 0;
3757
3758	/* paranoia code */
3759	for (h = mdev->tl_hash; h < mdev->tl_hash + mdev->tl_hash_s; h++)
3760		if (h->first)
3761			dev_err(DEV, "ASSERT FAILED tl_hash[%u] == %p, expected NULL\n",
3762				(int)(h - mdev->tl_hash), h->first);
3763	kfree(mdev->tl_hash);
3764	mdev->tl_hash = NULL;
3765	mdev->tl_hash_s = 0;
3766	spin_unlock_irq(&mdev->req_lock);
3767}
3768
3769static void drbd_disconnect(struct drbd_conf *mdev)
3770{
3771	enum drbd_fencing_p fp;
3772	union drbd_state os, ns;
3773	int rv = SS_UNKNOWN_ERROR;
3774	unsigned int i;
3775
3776	if (mdev->state.conn == C_STANDALONE)
3777		return;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3778
3779	/* asender does not clean up anything. it must not interfere, either */
3780	drbd_thread_stop(&mdev->asender);
3781	drbd_free_sock(mdev);
 
3782
3783	/* wait for current activity to cease. */
3784	spin_lock_irq(&mdev->req_lock);
3785	_drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
3786	_drbd_wait_ee_list_empty(mdev, &mdev->sync_ee);
3787	_drbd_wait_ee_list_empty(mdev, &mdev->read_ee);
3788	spin_unlock_irq(&mdev->req_lock);
3789
3790	/* We do not have data structures that would allow us to
3791	 * get the rs_pending_cnt down to 0 again.
3792	 *  * On C_SYNC_TARGET we do not have any data structures describing
3793	 *    the pending RSDataRequest's we have sent.
3794	 *  * On C_SYNC_SOURCE there is no data structure that tracks
3795	 *    the P_RS_DATA_REPLY blocks that we sent to the SyncTarget.
3796	 *  And no, it is not the sum of the reference counts in the
3797	 *  resync_LRU. The resync_LRU tracks the whole operation including
3798	 *  the disk-IO, while the rs_pending_cnt only tracks the blocks
3799	 *  on the fly. */
3800	drbd_rs_cancel_all(mdev);
3801	mdev->rs_total = 0;
3802	mdev->rs_failed = 0;
3803	atomic_set(&mdev->rs_pending_cnt, 0);
3804	wake_up(&mdev->misc_wait);
3805
3806	del_timer(&mdev->request_timer);
3807
3808	/* make sure syncer is stopped and w_resume_next_sg queued */
3809	del_timer_sync(&mdev->resync_timer);
3810	resync_timer_fn((unsigned long)mdev);
3811
3812	/* wait for all w_e_end_data_req, w_e_end_rsdata_req, w_send_barrier,
3813	 * w_make_resync_request etc. which may still be on the worker queue
3814	 * to be "canceled" */
3815	drbd_flush_workqueue(mdev);
3816
3817	/* This also does reclaim_net_ee().  If we do this too early, we might
3818	 * miss some resync ee and pages.*/
3819	drbd_process_done_ee(mdev);
3820
3821	kfree(mdev->p_uuid);
3822	mdev->p_uuid = NULL;
3823
3824	if (!is_susp(mdev->state))
3825		tl_clear(mdev);
3826
3827	dev_info(DEV, "Connection closed\n");
3828
3829	drbd_md_sync(mdev);
3830
3831	fp = FP_DONT_CARE;
3832	if (get_ldev(mdev)) {
3833		fp = mdev->ldev->dc.fencing;
3834		put_ldev(mdev);
3835	}
3836
3837	if (mdev->state.role == R_PRIMARY && fp >= FP_RESOURCE && mdev->state.pdsk >= D_UNKNOWN)
3838		drbd_try_outdate_peer_async(mdev);
 
3839
3840	spin_lock_irq(&mdev->req_lock);
3841	os = mdev->state;
3842	if (os.conn >= C_UNCONNECTED) {
3843		/* Do not restart in case we are C_DISCONNECTING */
3844		ns = os;
3845		ns.conn = C_UNCONNECTED;
3846		rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
3847	}
3848	spin_unlock_irq(&mdev->req_lock);
3849
3850	if (os.conn == C_DISCONNECTING) {
3851		wait_event(mdev->net_cnt_wait, atomic_read(&mdev->net_cnt) == 0);
3852
3853		crypto_free_hash(mdev->cram_hmac_tfm);
3854		mdev->cram_hmac_tfm = NULL;
3855
3856		kfree(mdev->net_conf);
3857		mdev->net_conf = NULL;
3858		drbd_request_state(mdev, NS(conn, C_STANDALONE));
 
3859	}
3860
3861	/* serialize with bitmap writeout triggered by the state change,
3862	 * if any. */
3863	wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
3864
3865	/* tcp_close and release of sendpage pages can be deferred.  I don't
3866	 * want to use SO_LINGER, because apparently it can be deferred for
3867	 * more than 20 seconds (longest time I checked).
3868	 *
3869	 * Actually we don't care for exactly when the network stack does its
3870	 * put_page(), but release our reference on these pages right here.
3871	 */
3872	i = drbd_release_ee(mdev, &mdev->net_ee);
3873	if (i)
3874		dev_info(DEV, "net_ee not empty, killed %u entries\n", i);
3875	i = atomic_read(&mdev->pp_in_use_by_net);
3876	if (i)
3877		dev_info(DEV, "pp_in_use_by_net = %d, expected 0\n", i);
3878	i = atomic_read(&mdev->pp_in_use);
3879	if (i)
3880		dev_info(DEV, "pp_in_use = %d, expected 0\n", i);
3881
3882	D_ASSERT(list_empty(&mdev->read_ee));
3883	D_ASSERT(list_empty(&mdev->active_ee));
3884	D_ASSERT(list_empty(&mdev->sync_ee));
3885	D_ASSERT(list_empty(&mdev->done_ee));
3886
3887	/* ok, no more ee's on the fly, it is safe to reset the epoch_size */
3888	atomic_set(&mdev->current_epoch->epoch_size, 0);
3889	D_ASSERT(list_empty(&mdev->current_epoch->list));
3890}
3891
3892/*
3893 * We support PRO_VERSION_MIN to PRO_VERSION_MAX. The protocol version
3894 * we can agree on is stored in agreed_pro_version.
3895 *
3896 * feature flags and the reserved array should be enough room for future
3897 * enhancements of the handshake protocol, and possible plugins...
3898 *
3899 * for now, they are expected to be zero, but ignored.
3900 */
3901static int drbd_send_handshake(struct drbd_conf *mdev)
3902{
3903	/* ASSERT current == mdev->receiver ... */
3904	struct p_handshake *p = &mdev->data.sbuf.handshake;
3905	int ok;
3906
3907	if (mutex_lock_interruptible(&mdev->data.mutex)) {
3908		dev_err(DEV, "interrupted during initial handshake\n");
3909		return 0; /* interrupted. not ok. */
3910	}
3911
3912	if (mdev->data.socket == NULL) {
3913		mutex_unlock(&mdev->data.mutex);
3914		return 0;
3915	}
3916
 
 
 
 
3917	memset(p, 0, sizeof(*p));
3918	p->protocol_min = cpu_to_be32(PRO_VERSION_MIN);
3919	p->protocol_max = cpu_to_be32(PRO_VERSION_MAX);
3920	ok = _drbd_send_cmd( mdev, mdev->data.socket, P_HAND_SHAKE,
3921			     (struct p_header80 *)p, sizeof(*p), 0 );
3922	mutex_unlock(&mdev->data.mutex);
3923	return ok;
3924}
3925
3926/*
3927 * return values:
3928 *   1 yes, we have a valid connection
3929 *   0 oops, did not work out, please try again
3930 *  -1 peer talks different language,
3931 *     no point in trying again, please go standalone.
3932 */
3933static int drbd_do_handshake(struct drbd_conf *mdev)
3934{
3935	/* ASSERT current == mdev->receiver ... */
3936	struct p_handshake *p = &mdev->data.rbuf.handshake;
3937	const int expect = sizeof(struct p_handshake) - sizeof(struct p_header80);
3938	unsigned int length;
3939	enum drbd_packets cmd;
3940	int rv;
3941
3942	rv = drbd_send_handshake(mdev);
3943	if (!rv)
3944		return 0;
3945
3946	rv = drbd_recv_header(mdev, &cmd, &length);
3947	if (!rv)
3948		return 0;
3949
3950	if (cmd != P_HAND_SHAKE) {
3951		dev_err(DEV, "expected HandShake packet, received: %s (0x%04x)\n",
3952		     cmdname(cmd), cmd);
3953		return -1;
3954	}
3955
3956	if (length != expect) {
3957		dev_err(DEV, "expected HandShake length: %u, received: %u\n",
3958		     expect, length);
3959		return -1;
3960	}
3961
3962	rv = drbd_recv(mdev, &p->head.payload, expect);
3963
3964	if (rv != expect) {
3965		if (!signal_pending(current))
3966			dev_warn(DEV, "short read receiving handshake packet: l=%u\n", rv);
3967		return 0;
3968	}
3969
3970	p->protocol_min = be32_to_cpu(p->protocol_min);
3971	p->protocol_max = be32_to_cpu(p->protocol_max);
3972	if (p->protocol_max == 0)
3973		p->protocol_max = p->protocol_min;
3974
3975	if (PRO_VERSION_MAX < p->protocol_min ||
3976	    PRO_VERSION_MIN > p->protocol_max)
3977		goto incompat;
3978
3979	mdev->agreed_pro_version = min_t(int, PRO_VERSION_MAX, p->protocol_max);
 
 
 
 
3980
3981	dev_info(DEV, "Handshake successful: "
3982	     "Agreed network protocol version %d\n", mdev->agreed_pro_version);
 
 
 
 
 
3983
3984	return 1;
3985
3986 incompat:
3987	dev_err(DEV, "incompatible DRBD dialects: "
3988	    "I support %d-%d, peer supports %d-%d\n",
3989	    PRO_VERSION_MIN, PRO_VERSION_MAX,
3990	    p->protocol_min, p->protocol_max);
3991	return -1;
3992}
3993
3994#if !defined(CONFIG_CRYPTO_HMAC) && !defined(CONFIG_CRYPTO_HMAC_MODULE)
3995static int drbd_do_auth(struct drbd_conf *mdev)
3996{
3997	dev_err(DEV, "This kernel was build without CONFIG_CRYPTO_HMAC.\n");
3998	dev_err(DEV, "You need to disable 'cram-hmac-alg' in drbd.conf.\n");
3999	return -1;
4000}
4001#else
4002#define CHALLENGE_LEN 64
4003
4004/* Return value:
4005	1 - auth succeeded,
4006	0 - failed, try again (network error),
4007	-1 - auth failed, don't try again.
4008*/
4009
4010static int drbd_do_auth(struct drbd_conf *mdev)
4011{
 
4012	char my_challenge[CHALLENGE_LEN];  /* 64 Bytes... */
4013	struct scatterlist sg;
4014	char *response = NULL;
4015	char *right_response = NULL;
4016	char *peers_ch = NULL;
4017	unsigned int key_len = strlen(mdev->net_conf->shared_secret);
 
4018	unsigned int resp_size;
4019	struct hash_desc desc;
4020	enum drbd_packets cmd;
4021	unsigned int length;
4022	int rv;
4023
4024	desc.tfm = mdev->cram_hmac_tfm;
4025	desc.flags = 0;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4026
4027	rv = crypto_hash_setkey(mdev->cram_hmac_tfm,
4028				(u8 *)mdev->net_conf->shared_secret, key_len);
4029	if (rv) {
4030		dev_err(DEV, "crypto_hash_setkey() failed with %d\n", rv);
4031		rv = -1;
4032		goto fail;
4033	}
4034
4035	get_random_bytes(my_challenge, CHALLENGE_LEN);
4036
4037	rv = drbd_send_cmd2(mdev, P_AUTH_CHALLENGE, my_challenge, CHALLENGE_LEN);
4038	if (!rv)
 
4039		goto fail;
4040
4041	rv = drbd_recv_header(mdev, &cmd, &length);
 
4042	if (!rv)
4043		goto fail;
4044
4045	if (cmd != P_AUTH_CHALLENGE) {
4046		dev_err(DEV, "expected AuthChallenge packet, received: %s (0x%04x)\n",
4047		    cmdname(cmd), cmd);
4048		rv = 0;
4049		goto fail;
4050	}
4051
4052	if (length > CHALLENGE_LEN * 2) {
4053		dev_err(DEV, "expected AuthChallenge payload too big.\n");
 
 
 
 
 
 
 
4054		rv = -1;
4055		goto fail;
4056	}
4057
4058	peers_ch = kmalloc(length, GFP_NOIO);
4059	if (peers_ch == NULL) {
4060		dev_err(DEV, "kmalloc of peers_ch failed\n");
4061		rv = -1;
4062		goto fail;
4063	}
4064
4065	rv = drbd_recv(mdev, peers_ch, length);
 
 
 
 
4066
4067	if (rv != length) {
4068		if (!signal_pending(current))
4069			dev_warn(DEV, "short read AuthChallenge: l=%u\n", rv);
4070		rv = 0;
4071		goto fail;
4072	}
4073
4074	resp_size = crypto_hash_digestsize(mdev->cram_hmac_tfm);
4075	response = kmalloc(resp_size, GFP_NOIO);
4076	if (response == NULL) {
4077		dev_err(DEV, "kmalloc of response failed\n");
4078		rv = -1;
4079		goto fail;
4080	}
4081
4082	sg_init_table(&sg, 1);
4083	sg_set_buf(&sg, peers_ch, length);
 
 
 
 
4084
4085	rv = crypto_hash_digest(&desc, &sg, sg.length, response);
4086	if (rv) {
4087		dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
4088		rv = -1;
4089		goto fail;
4090	}
4091
4092	rv = drbd_send_cmd2(mdev, P_AUTH_RESPONSE, response, resp_size);
4093	if (!rv)
4094		goto fail;
4095
4096	rv = drbd_recv_header(mdev, &cmd, &length);
 
4097	if (!rv)
4098		goto fail;
4099
4100	if (cmd != P_AUTH_RESPONSE) {
4101		dev_err(DEV, "expected AuthResponse packet, received: %s (0x%04x)\n",
4102			cmdname(cmd), cmd);
4103		rv = 0;
4104		goto fail;
4105	}
4106
4107	if (length != resp_size) {
4108		dev_err(DEV, "expected AuthResponse payload of wrong size\n");
 
4109		rv = 0;
4110		goto fail;
4111	}
4112
4113	rv = drbd_recv(mdev, response , resp_size);
 
 
 
 
4114
4115	if (rv != resp_size) {
4116		if (!signal_pending(current))
4117			dev_warn(DEV, "short read receiving AuthResponse: l=%u\n", rv);
4118		rv = 0;
4119		goto fail;
4120	}
4121
4122	right_response = kmalloc(resp_size, GFP_NOIO);
4123	if (right_response == NULL) {
4124		dev_err(DEV, "kmalloc of right_response failed\n");
4125		rv = -1;
4126		goto fail;
4127	}
4128
4129	sg_set_buf(&sg, my_challenge, CHALLENGE_LEN);
4130
4131	rv = crypto_hash_digest(&desc, &sg, sg.length, right_response);
4132	if (rv) {
4133		dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
4134		rv = -1;
4135		goto fail;
4136	}
4137
4138	rv = !memcmp(response, right_response, resp_size);
4139
4140	if (rv)
4141		dev_info(DEV, "Peer authenticated using %d bytes of '%s' HMAC\n",
4142		     resp_size, mdev->net_conf->cram_hmac_alg);
4143	else
4144		rv = -1;
4145
4146 fail:
4147	kfree(peers_ch);
4148	kfree(response);
4149	kfree(right_response);
 
 
 
 
4150
4151	return rv;
4152}
4153#endif
4154
4155int drbdd_init(struct drbd_thread *thi)
4156{
4157	struct drbd_conf *mdev = thi->mdev;
4158	unsigned int minor = mdev_to_minor(mdev);
4159	int h;
4160
4161	sprintf(current->comm, "drbd%d_receiver", minor);
4162
4163	dev_info(DEV, "receiver (re)started\n");
4164
4165	do {
4166		h = drbd_connect(mdev);
4167		if (h == 0) {
4168			drbd_disconnect(mdev);
4169			schedule_timeout_interruptible(HZ);
4170		}
4171		if (h == -1) {
4172			dev_warn(DEV, "Discarding network configuration.\n");
4173			drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
4174		}
4175	} while (h == 0);
4176
4177	if (h > 0) {
4178		if (get_net_conf(mdev)) {
4179			drbdd(mdev);
4180			put_net_conf(mdev);
4181		}
4182	}
4183
4184	drbd_disconnect(mdev);
4185
4186	dev_info(DEV, "receiver terminated\n");
4187	return 0;
4188}
4189
4190/* ********* acknowledge sender ******** */
4191
4192static int got_RqSReply(struct drbd_conf *mdev, struct p_header80 *h)
4193{
4194	struct p_req_state_reply *p = (struct p_req_state_reply *)h;
 
 
 
 
 
 
 
 
 
 
 
 
 
4195
 
 
 
 
 
4196	int retcode = be32_to_cpu(p->retcode);
4197
 
 
 
 
 
 
 
 
 
 
4198	if (retcode >= SS_SUCCESS) {
4199		set_bit(CL_ST_CHG_SUCCESS, &mdev->flags);
4200	} else {
4201		set_bit(CL_ST_CHG_FAIL, &mdev->flags);
4202		dev_err(DEV, "Requested state change failed by peer: %s (%d)\n",
4203		    drbd_set_st_err_str(retcode), retcode);
4204	}
4205	wake_up(&mdev->state_wait);
4206
4207	return true;
4208}
4209
4210static int got_Ping(struct drbd_conf *mdev, struct p_header80 *h)
4211{
4212	return drbd_send_ping_ack(mdev);
4213
4214}
4215
4216static int got_PingAck(struct drbd_conf *mdev, struct p_header80 *h)
4217{
4218	/* restore idle timeout */
4219	mdev->meta.socket->sk->sk_rcvtimeo = mdev->net_conf->ping_int*HZ;
4220	if (!test_and_set_bit(GOT_PING_ACK, &mdev->flags))
4221		wake_up(&mdev->misc_wait);
4222
4223	return true;
4224}
4225
4226static int got_IsInSync(struct drbd_conf *mdev, struct p_header80 *h)
4227{
4228	struct p_block_ack *p = (struct p_block_ack *)h;
 
 
4229	sector_t sector = be64_to_cpu(p->sector);
4230	int blksize = be32_to_cpu(p->blksize);
4231
4232	D_ASSERT(mdev->agreed_pro_version >= 89);
 
 
 
 
 
4233
4234	update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4235
4236	if (get_ldev(mdev)) {
4237		drbd_rs_complete_io(mdev, sector);
4238		drbd_set_in_sync(mdev, sector, blksize);
4239		/* rs_same_csums is supposed to count in units of BM_BLOCK_SIZE */
4240		mdev->rs_same_csum += (blksize >> BM_BLOCK_SHIFT);
4241		put_ldev(mdev);
4242	}
4243	dec_rs_pending(mdev);
4244	atomic_add(blksize >> 9, &mdev->rs_sect_in);
4245
4246	return true;
4247}
4248
4249/* when we receive the ACK for a write request,
4250 * verify that we actually know about it */
4251static struct drbd_request *_ack_id_to_req(struct drbd_conf *mdev,
4252	u64 id, sector_t sector)
4253{
4254	struct hlist_head *slot = tl_hash_slot(mdev, sector);
4255	struct hlist_node *n;
4256	struct drbd_request *req;
4257
4258	hlist_for_each_entry(req, n, slot, collision) {
4259		if ((unsigned long)req == (unsigned long)id) {
4260			if (req->sector != sector) {
4261				dev_err(DEV, "_ack_id_to_req: found req %p but it has "
4262				    "wrong sector (%llus versus %llus)\n", req,
4263				    (unsigned long long)req->sector,
4264				    (unsigned long long)sector);
4265				break;
4266			}
4267			return req;
4268		}
4269	}
4270	return NULL;
4271}
4272
4273typedef struct drbd_request *(req_validator_fn)
4274	(struct drbd_conf *mdev, u64 id, sector_t sector);
4275
4276static int validate_req_change_req_state(struct drbd_conf *mdev,
4277	u64 id, sector_t sector, req_validator_fn validator,
4278	const char *func, enum drbd_req_event what)
4279{
 
4280	struct drbd_request *req;
4281	struct bio_and_error m;
4282
4283	spin_lock_irq(&mdev->req_lock);
4284	req = validator(mdev, id, sector);
4285	if (unlikely(!req)) {
4286		spin_unlock_irq(&mdev->req_lock);
4287
4288		dev_err(DEV, "%s: failed to find req %p, sector %llus\n", func,
4289			(void *)(unsigned long)id, (unsigned long long)sector);
4290		return false;
4291	}
4292	__req_mod(req, what, &m);
4293	spin_unlock_irq(&mdev->req_lock);
4294
4295	if (m.bio)
4296		complete_master_bio(mdev, &m);
4297	return true;
4298}
4299
4300static int got_BlockAck(struct drbd_conf *mdev, struct p_header80 *h)
4301{
4302	struct p_block_ack *p = (struct p_block_ack *)h;
 
 
4303	sector_t sector = be64_to_cpu(p->sector);
4304	int blksize = be32_to_cpu(p->blksize);
4305	enum drbd_req_event what;
4306
4307	update_peer_seq(mdev, be32_to_cpu(p->seq_num));
 
 
 
4308
4309	if (is_syncer_block_id(p->block_id)) {
4310		drbd_set_in_sync(mdev, sector, blksize);
4311		dec_rs_pending(mdev);
4312		return true;
 
 
4313	}
4314	switch (be16_to_cpu(h->command)) {
4315	case P_RS_WRITE_ACK:
4316		D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
4317		what = write_acked_by_peer_and_sis;
4318		break;
4319	case P_WRITE_ACK:
4320		D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
4321		what = write_acked_by_peer;
4322		break;
4323	case P_RECV_ACK:
4324		D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_B);
4325		what = recv_acked_by_peer;
4326		break;
4327	case P_DISCARD_ACK:
4328		D_ASSERT(mdev->net_conf->wire_protocol == DRBD_PROT_C);
4329		what = conflict_discarded_by_peer;
 
 
4330		break;
4331	default:
4332		D_ASSERT(0);
4333		return false;
4334	}
4335
4336	return validate_req_change_req_state(mdev, p->block_id, sector,
4337		_ack_id_to_req, __func__ , what);
 
4338}
4339
4340static int got_NegAck(struct drbd_conf *mdev, struct p_header80 *h)
4341{
4342	struct p_block_ack *p = (struct p_block_ack *)h;
 
 
4343	sector_t sector = be64_to_cpu(p->sector);
4344	int size = be32_to_cpu(p->blksize);
4345	struct drbd_request *req;
4346	struct bio_and_error m;
4347
4348	update_peer_seq(mdev, be32_to_cpu(p->seq_num));
 
 
 
4349
4350	if (is_syncer_block_id(p->block_id)) {
4351		dec_rs_pending(mdev);
4352		drbd_rs_failed_io(mdev, sector, size);
4353		return true;
4354	}
4355
4356	spin_lock_irq(&mdev->req_lock);
4357	req = _ack_id_to_req(mdev, p->block_id, sector);
4358	if (!req) {
4359		spin_unlock_irq(&mdev->req_lock);
4360		if (mdev->net_conf->wire_protocol == DRBD_PROT_A ||
4361		    mdev->net_conf->wire_protocol == DRBD_PROT_B) {
4362			/* Protocol A has no P_WRITE_ACKs, but has P_NEG_ACKs.
4363			   The master bio might already be completed, therefore the
4364			   request is no longer in the collision hash.
4365			   => Do not try to validate block_id as request. */
4366			/* In Protocol B we might already have got a P_RECV_ACK
4367			   but then get a P_NEG_ACK after wards. */
4368			drbd_set_out_of_sync(mdev, sector, size);
4369			return true;
4370		} else {
4371			dev_err(DEV, "%s: failed to find req %p, sector %llus\n", __func__,
4372				(void *)(unsigned long)p->block_id, (unsigned long long)sector);
4373			return false;
4374		}
4375	}
4376	__req_mod(req, neg_acked, &m);
4377	spin_unlock_irq(&mdev->req_lock);
4378
4379	if (m.bio)
4380		complete_master_bio(mdev, &m);
4381	return true;
 
 
 
 
 
 
 
 
 
4382}
4383
4384static int got_NegDReply(struct drbd_conf *mdev, struct p_header80 *h)
4385{
4386	struct p_block_ack *p = (struct p_block_ack *)h;
 
 
4387	sector_t sector = be64_to_cpu(p->sector);
4388
4389	update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4390	dev_err(DEV, "Got NegDReply; Sector %llus, len %u; Fail original request.\n",
 
 
 
 
 
 
4391	    (unsigned long long)sector, be32_to_cpu(p->blksize));
4392
4393	return validate_req_change_req_state(mdev, p->block_id, sector,
4394		_ar_id_to_req, __func__ , neg_acked);
 
4395}
4396
4397static int got_NegRSDReply(struct drbd_conf *mdev, struct p_header80 *h)
4398{
 
 
4399	sector_t sector;
4400	int size;
4401	struct p_block_ack *p = (struct p_block_ack *)h;
 
 
 
 
 
4402
4403	sector = be64_to_cpu(p->sector);
4404	size = be32_to_cpu(p->blksize);
4405
4406	update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4407
4408	dec_rs_pending(mdev);
4409
4410	if (get_ldev_if_state(mdev, D_FAILED)) {
4411		drbd_rs_complete_io(mdev, sector);
4412		switch (be16_to_cpu(h->command)) {
4413		case P_NEG_RS_DREPLY:
4414			drbd_rs_failed_io(mdev, sector, size);
 
4415		case P_RS_CANCEL:
4416			break;
4417		default:
4418			D_ASSERT(0);
4419			put_ldev(mdev);
4420			return false;
4421		}
4422		put_ldev(mdev);
4423	}
4424
4425	return true;
4426}
4427
4428static int got_BarrierAck(struct drbd_conf *mdev, struct p_header80 *h)
4429{
4430	struct p_barrier_ack *p = (struct p_barrier_ack *)h;
 
 
 
 
4431
4432	tl_release(mdev, p->barrier, be32_to_cpu(p->set_size));
 
 
4433
4434	if (mdev->state.conn == C_AHEAD &&
4435	    atomic_read(&mdev->ap_in_flight) == 0 &&
4436	    !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->current_epoch->flags)) {
4437		mdev->start_resync_timer.expires = jiffies + HZ;
4438		add_timer(&mdev->start_resync_timer);
 
4439	}
 
4440
4441	return true;
4442}
4443
4444static int got_OVResult(struct drbd_conf *mdev, struct p_header80 *h)
4445{
4446	struct p_block_ack *p = (struct p_block_ack *)h;
4447	struct drbd_work *w;
 
 
4448	sector_t sector;
4449	int size;
4450
 
 
 
 
 
4451	sector = be64_to_cpu(p->sector);
4452	size = be32_to_cpu(p->blksize);
4453
4454	update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4455
4456	if (be64_to_cpu(p->block_id) == ID_OUT_OF_SYNC)
4457		drbd_ov_oos_found(mdev, sector, size);
4458	else
4459		ov_oos_print(mdev);
4460
4461	if (!get_ldev(mdev))
4462		return true;
4463
4464	drbd_rs_complete_io(mdev, sector);
4465	dec_rs_pending(mdev);
4466
4467	--mdev->ov_left;
4468
4469	/* let's advance progress step marks only for every other megabyte */
4470	if ((mdev->ov_left & 0x200) == 0x200)
4471		drbd_advance_rs_marks(mdev, mdev->ov_left);
4472
4473	if (mdev->ov_left == 0) {
4474		w = kmalloc(sizeof(*w), GFP_NOIO);
4475		if (w) {
4476			w->cb = w_ov_finished;
4477			drbd_queue_work_front(&mdev->data.work, w);
 
4478		} else {
4479			dev_err(DEV, "kmalloc(w) failed.");
4480			ov_oos_print(mdev);
4481			drbd_resync_finished(mdev);
4482		}
4483	}
4484	put_ldev(mdev);
4485	return true;
4486}
4487
4488static int got_skip(struct drbd_conf *mdev, struct p_header80 *h)
4489{
4490	return true;
4491}
4492
4493struct asender_cmd {
4494	size_t pkt_size;
4495	int (*process)(struct drbd_conf *mdev, struct p_header80 *h);
4496};
4497
4498static struct asender_cmd *get_asender_cmd(int cmd)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4499{
4500	static struct asender_cmd asender_tbl[] = {
4501		/* anything missing from this table is in
4502		 * the drbd_cmd_handler (drbd_default_handler) table,
4503		 * see the beginning of drbdd() */
4504	[P_PING]	    = { sizeof(struct p_header80), got_Ping },
4505	[P_PING_ACK]	    = { sizeof(struct p_header80), got_PingAck },
4506	[P_RECV_ACK]	    = { sizeof(struct p_block_ack), got_BlockAck },
4507	[P_WRITE_ACK]	    = { sizeof(struct p_block_ack), got_BlockAck },
4508	[P_RS_WRITE_ACK]    = { sizeof(struct p_block_ack), got_BlockAck },
4509	[P_DISCARD_ACK]	    = { sizeof(struct p_block_ack), got_BlockAck },
4510	[P_NEG_ACK]	    = { sizeof(struct p_block_ack), got_NegAck },
4511	[P_NEG_DREPLY]	    = { sizeof(struct p_block_ack), got_NegDReply },
4512	[P_NEG_RS_DREPLY]   = { sizeof(struct p_block_ack), got_NegRSDReply},
4513	[P_OV_RESULT]	    = { sizeof(struct p_block_ack), got_OVResult },
4514	[P_BARRIER_ACK]	    = { sizeof(struct p_barrier_ack), got_BarrierAck },
4515	[P_STATE_CHG_REPLY] = { sizeof(struct p_req_state_reply), got_RqSReply },
4516	[P_RS_IS_IN_SYNC]   = { sizeof(struct p_block_ack), got_IsInSync },
4517	[P_DELAY_PROBE]     = { sizeof(struct p_delay_probe93), got_skip },
4518	[P_RS_CANCEL]       = { sizeof(struct p_block_ack), got_NegRSDReply},
4519	[P_MAX_CMD]	    = { 0, NULL },
4520	};
4521	if (cmd > P_MAX_CMD || asender_tbl[cmd].process == NULL)
4522		return NULL;
4523	return &asender_tbl[cmd];
4524}
4525
4526int drbd_asender(struct drbd_thread *thi)
4527{
4528	struct drbd_conf *mdev = thi->mdev;
4529	struct p_header80 *h = &mdev->meta.rbuf.header.h80;
4530	struct asender_cmd *cmd = NULL;
4531
4532	int rv, len;
4533	void *buf    = h;
4534	int received = 0;
4535	int expect   = sizeof(struct p_header80);
4536	int empty;
4537	int ping_timeout_active = 0;
4538
4539	sprintf(current->comm, "drbd%d_asender", mdev_to_minor(mdev));
4540
4541	current->policy = SCHED_RR;  /* Make this a realtime task! */
4542	current->rt_priority = 2;    /* more important than all other tasks */
4543
4544	while (get_t_state(thi) == Running) {
4545		drbd_thread_current_set_cpu(mdev);
4546		if (test_and_clear_bit(SEND_PING, &mdev->flags)) {
4547			ERR_IF(!drbd_send_ping(mdev)) goto reconnect;
4548			mdev->meta.socket->sk->sk_rcvtimeo =
4549				mdev->net_conf->ping_timeo*HZ/10;
4550			ping_timeout_active = 1;
4551		}
4552
4553		/* conditionally cork;
4554		 * it may hurt latency if we cork without much to send */
4555		if (!mdev->net_conf->no_cork &&
4556			3 < atomic_read(&mdev->unacked_cnt))
4557			drbd_tcp_cork(mdev->meta.socket);
4558		while (1) {
4559			clear_bit(SIGNAL_ASENDER, &mdev->flags);
4560			flush_signals(current);
4561			if (!drbd_process_done_ee(mdev))
4562				goto reconnect;
4563			/* to avoid race with newly queued ACKs */
4564			set_bit(SIGNAL_ASENDER, &mdev->flags);
4565			spin_lock_irq(&mdev->req_lock);
4566			empty = list_empty(&mdev->done_ee);
4567			spin_unlock_irq(&mdev->req_lock);
4568			/* new ack may have been queued right here,
4569			 * but then there is also a signal pending,
4570			 * and we start over... */
4571			if (empty)
4572				break;
4573		}
4574		/* but unconditionally uncork unless disabled */
4575		if (!mdev->net_conf->no_cork)
4576			drbd_tcp_uncork(mdev->meta.socket);
4577
4578		/* short circuit, recv_msg would return EINTR anyways. */
4579		if (signal_pending(current))
4580			continue;
 
 
 
4581
4582		rv = drbd_recv_short(mdev, mdev->meta.socket,
4583				     buf, expect-received, 0);
4584		clear_bit(SIGNAL_ASENDER, &mdev->flags);
 
 
 
 
 
4585
4586		flush_signals(current);
 
4587
4588		/* Note:
4589		 * -EINTR	 (on meta) we got a signal
4590		 * -EAGAIN	 (on meta) rcvtimeo expired
4591		 * -ECONNRESET	 other side closed the connection
4592		 * -ERESTARTSYS  (on data) we got a signal
4593		 * rv <  0	 other than above: unexpected error!
4594		 * rv == expected: full header or command
4595		 * rv <  expected: "woken" by signal during receive
4596		 * rv == 0	 : "connection shut down by peer"
4597		 */
4598		if (likely(rv > 0)) {
4599			received += rv;
4600			buf	 += rv;
4601		} else if (rv == 0) {
4602			dev_err(DEV, "meta connection shut down by peer.\n");
 
 
 
 
 
 
 
 
 
 
 
 
4603			goto reconnect;
4604		} else if (rv == -EAGAIN) {
4605			/* If the data socket received something meanwhile,
4606			 * that is good enough: peer is still alive. */
4607			if (time_after(mdev->last_received,
4608				jiffies - mdev->meta.socket->sk->sk_rcvtimeo))
4609				continue;
4610			if (ping_timeout_active) {
4611				dev_err(DEV, "PingAck did not arrive in time.\n");
4612				goto reconnect;
4613			}
4614			set_bit(SEND_PING, &mdev->flags);
4615			continue;
4616		} else if (rv == -EINTR) {
 
 
 
 
4617			continue;
4618		} else {
4619			dev_err(DEV, "sock_recvmsg returned %d\n", rv);
4620			goto reconnect;
4621		}
4622
4623		if (received == expect && cmd == NULL) {
4624			if (unlikely(h->magic != BE_DRBD_MAGIC)) {
4625				dev_err(DEV, "magic?? on meta m: 0x%08x c: %d l: %d\n",
4626				    be32_to_cpu(h->magic),
4627				    be16_to_cpu(h->command),
4628				    be16_to_cpu(h->length));
4629				goto reconnect;
4630			}
4631			cmd = get_asender_cmd(be16_to_cpu(h->command));
4632			len = be16_to_cpu(h->length);
4633			if (unlikely(cmd == NULL)) {
4634				dev_err(DEV, "unknown command?? on meta m: 0x%08x c: %d l: %d\n",
4635				    be32_to_cpu(h->magic),
4636				    be16_to_cpu(h->command),
4637				    be16_to_cpu(h->length));
4638				goto disconnect;
4639			}
4640			expect = cmd->pkt_size;
4641			ERR_IF(len != expect-sizeof(struct p_header80))
 
 
4642				goto reconnect;
 
4643		}
4644		if (received == expect) {
4645			mdev->last_received = jiffies;
4646			D_ASSERT(cmd != NULL);
4647			if (!cmd->process(mdev, h))
 
 
4648				goto reconnect;
 
 
 
4649
4650			/* the idle_timeout (ping-int)
4651			 * has been restored in got_PingAck() */
4652			if (cmd == get_asender_cmd(P_PING_ACK))
4653				ping_timeout_active = 0;
4654
4655			buf	 = h;
4656			received = 0;
4657			expect	 = sizeof(struct p_header80);
4658			cmd	 = NULL;
4659		}
4660	}
4661
4662	if (0) {
4663reconnect:
4664		drbd_force_state(mdev, NS(conn, C_NETWORK_FAILURE));
4665		drbd_md_sync(mdev);
4666	}
4667	if (0) {
4668disconnect:
4669		drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
4670		drbd_md_sync(mdev);
4671	}
4672	clear_bit(SIGNAL_ASENDER, &mdev->flags);
4673
4674	D_ASSERT(mdev->state.conn < C_CONNECTED);
4675	dev_info(DEV, "asender terminated\n");
4676
4677	return 0;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4678}
v6.9.4
   1// SPDX-License-Identifier: GPL-2.0-only
   2/*
   3   drbd_receiver.c
   4
   5   This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
   6
   7   Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
   8   Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
   9   Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
  10
 
 
 
 
 
 
 
 
 
 
 
 
 
  11 */
  12
  13
  14#include <linux/module.h>
  15
  16#include <linux/uaccess.h>
  17#include <net/sock.h>
  18
  19#include <linux/drbd.h>
  20#include <linux/fs.h>
  21#include <linux/file.h>
  22#include <linux/in.h>
  23#include <linux/mm.h>
  24#include <linux/memcontrol.h>
  25#include <linux/mm_inline.h>
  26#include <linux/slab.h>
  27#include <uapi/linux/sched/types.h>
  28#include <linux/sched/signal.h>
  29#include <linux/pkt_sched.h>
 
  30#include <linux/unistd.h>
  31#include <linux/vmalloc.h>
  32#include <linux/random.h>
  33#include <linux/string.h>
  34#include <linux/scatterlist.h>
  35#include <linux/part_stat.h>
  36#include "drbd_int.h"
  37#include "drbd_protocol.h"
  38#include "drbd_req.h"
 
  39#include "drbd_vli.h"
  40
  41#define PRO_FEATURES (DRBD_FF_TRIM|DRBD_FF_THIN_RESYNC|DRBD_FF_WSAME|DRBD_FF_WZEROES)
  42
  43struct packet_info {
  44	enum drbd_packet cmd;
  45	unsigned int size;
  46	unsigned int vnr;
  47	void *data;
  48};
  49
  50enum finish_epoch {
  51	FE_STILL_LIVE,
  52	FE_DESTROYED,
  53	FE_RECYCLED,
  54};
  55
  56static int drbd_do_features(struct drbd_connection *connection);
  57static int drbd_do_auth(struct drbd_connection *connection);
  58static int drbd_disconnected(struct drbd_peer_device *);
  59static void conn_wait_active_ee_empty(struct drbd_connection *connection);
  60static enum finish_epoch drbd_may_finish_epoch(struct drbd_connection *, struct drbd_epoch *, enum epoch_event);
  61static int e_end_block(struct drbd_work *, int);
  62
  63
  64#define GFP_TRY	(__GFP_HIGHMEM | __GFP_NOWARN)
  65
  66/*
  67 * some helper functions to deal with single linked page lists,
  68 * page->private being our "next" pointer.
  69 */
  70
  71/* If at least n pages are linked at head, get n pages off.
  72 * Otherwise, don't modify head, and return NULL.
  73 * Locking is the responsibility of the caller.
  74 */
  75static struct page *page_chain_del(struct page **head, int n)
  76{
  77	struct page *page;
  78	struct page *tmp;
  79
  80	BUG_ON(!n);
  81	BUG_ON(!head);
  82
  83	page = *head;
  84
  85	if (!page)
  86		return NULL;
  87
  88	while (page) {
  89		tmp = page_chain_next(page);
  90		if (--n == 0)
  91			break; /* found sufficient pages */
  92		if (tmp == NULL)
  93			/* insufficient pages, don't use any of them. */
  94			return NULL;
  95		page = tmp;
  96	}
  97
  98	/* add end of list marker for the returned list */
  99	set_page_private(page, 0);
 100	/* actual return value, and adjustment of head */
 101	page = *head;
 102	*head = tmp;
 103	return page;
 104}
 105
 106/* may be used outside of locks to find the tail of a (usually short)
 107 * "private" page chain, before adding it back to a global chain head
 108 * with page_chain_add() under a spinlock. */
 109static struct page *page_chain_tail(struct page *page, int *len)
 110{
 111	struct page *tmp;
 112	int i = 1;
 113	while ((tmp = page_chain_next(page))) {
 114		++i;
 115		page = tmp;
 116	}
 117	if (len)
 118		*len = i;
 119	return page;
 120}
 121
 122static int page_chain_free(struct page *page)
 123{
 124	struct page *tmp;
 125	int i = 0;
 126	page_chain_for_each_safe(page, tmp) {
 127		put_page(page);
 128		++i;
 129	}
 130	return i;
 131}
 132
 133static void page_chain_add(struct page **head,
 134		struct page *chain_first, struct page *chain_last)
 135{
 136#if 1
 137	struct page *tmp;
 138	tmp = page_chain_tail(chain_first, NULL);
 139	BUG_ON(tmp != chain_last);
 140#endif
 141
 142	/* add chain to head */
 143	set_page_private(chain_last, (unsigned long)*head);
 144	*head = chain_first;
 145}
 146
 147static struct page *__drbd_alloc_pages(struct drbd_device *device,
 148				       unsigned int number)
 149{
 150	struct page *page = NULL;
 151	struct page *tmp = NULL;
 152	unsigned int i = 0;
 153
 154	/* Yes, testing drbd_pp_vacant outside the lock is racy.
 155	 * So what. It saves a spin_lock. */
 156	if (drbd_pp_vacant >= number) {
 157		spin_lock(&drbd_pp_lock);
 158		page = page_chain_del(&drbd_pp_pool, number);
 159		if (page)
 160			drbd_pp_vacant -= number;
 161		spin_unlock(&drbd_pp_lock);
 162		if (page)
 163			return page;
 164	}
 165
 166	/* GFP_TRY, because we must not cause arbitrary write-out: in a DRBD
 167	 * "criss-cross" setup, that might cause write-out on some other DRBD,
 168	 * which in turn might block on the other node at this very place.  */
 169	for (i = 0; i < number; i++) {
 170		tmp = alloc_page(GFP_TRY);
 171		if (!tmp)
 172			break;
 173		set_page_private(tmp, (unsigned long)page);
 174		page = tmp;
 175	}
 176
 177	if (i == number)
 178		return page;
 179
 180	/* Not enough pages immediately available this time.
 181	 * No need to jump around here, drbd_alloc_pages will retry this
 182	 * function "soon". */
 183	if (page) {
 184		tmp = page_chain_tail(page, NULL);
 185		spin_lock(&drbd_pp_lock);
 186		page_chain_add(&drbd_pp_pool, page, tmp);
 187		drbd_pp_vacant += i;
 188		spin_unlock(&drbd_pp_lock);
 189	}
 190	return NULL;
 191}
 192
 193static void reclaim_finished_net_peer_reqs(struct drbd_device *device,
 194					   struct list_head *to_be_freed)
 195{
 196	struct drbd_peer_request *peer_req, *tmp;
 
 197
 198	/* The EEs are always appended to the end of the list. Since
 199	   they are sent in order over the wire, they have to finish
 200	   in order. As soon as we see the first not finished we can
 201	   stop to examine the list... */
 202
 203	list_for_each_entry_safe(peer_req, tmp, &device->net_ee, w.list) {
 204		if (drbd_peer_req_has_active_page(peer_req))
 
 205			break;
 206		list_move(&peer_req->w.list, to_be_freed);
 207	}
 208}
 209
 210static void drbd_reclaim_net_peer_reqs(struct drbd_device *device)
 211{
 212	LIST_HEAD(reclaimed);
 213	struct drbd_peer_request *peer_req, *t;
 214
 215	spin_lock_irq(&device->resource->req_lock);
 216	reclaim_finished_net_peer_reqs(device, &reclaimed);
 217	spin_unlock_irq(&device->resource->req_lock);
 218	list_for_each_entry_safe(peer_req, t, &reclaimed, w.list)
 219		drbd_free_net_peer_req(device, peer_req);
 220}
 221
 222static void conn_reclaim_net_peer_reqs(struct drbd_connection *connection)
 223{
 224	struct drbd_peer_device *peer_device;
 225	int vnr;
 226
 227	rcu_read_lock();
 228	idr_for_each_entry(&connection->peer_devices, peer_device, vnr) {
 229		struct drbd_device *device = peer_device->device;
 230		if (!atomic_read(&device->pp_in_use_by_net))
 231			continue;
 232
 233		kref_get(&device->kref);
 234		rcu_read_unlock();
 235		drbd_reclaim_net_peer_reqs(device);
 236		kref_put(&device->kref, drbd_destroy_device);
 237		rcu_read_lock();
 238	}
 239	rcu_read_unlock();
 240}
 241
 242/**
 243 * drbd_alloc_pages() - Returns @number pages, retries forever (or until signalled)
 244 * @peer_device:	DRBD device.
 245 * @number:		number of pages requested
 246 * @retry:		whether to retry, if not enough pages are available right now
 247 *
 248 * Tries to allocate number pages, first from our own page pool, then from
 249 * the kernel.
 250 * Possibly retry until DRBD frees sufficient pages somewhere else.
 251 *
 252 * If this allocation would exceed the max_buffers setting, we throttle
 253 * allocation (schedule_timeout) to give the system some room to breathe.
 254 *
 255 * We do not use max-buffers as hard limit, because it could lead to
 256 * congestion and further to a distributed deadlock during online-verify or
 257 * (checksum based) resync, if the max-buffers, socket buffer sizes and
 258 * resync-rate settings are mis-configured.
 259 *
 260 * Returns a page chain linked via page->private.
 261 */
 262struct page *drbd_alloc_pages(struct drbd_peer_device *peer_device, unsigned int number,
 263			      bool retry)
 264{
 265	struct drbd_device *device = peer_device->device;
 266	struct page *page = NULL;
 267	struct net_conf *nc;
 268	DEFINE_WAIT(wait);
 269	unsigned int mxb;
 270
 271	rcu_read_lock();
 272	nc = rcu_dereference(peer_device->connection->net_conf);
 273	mxb = nc ? nc->max_buffers : 1000000;
 274	rcu_read_unlock();
 275
 276	if (atomic_read(&device->pp_in_use) < mxb)
 277		page = __drbd_alloc_pages(device, number);
 278
 279	/* Try to keep the fast path fast, but occasionally we need
 280	 * to reclaim the pages we lended to the network stack. */
 281	if (page && atomic_read(&device->pp_in_use_by_net) > 512)
 282		drbd_reclaim_net_peer_reqs(device);
 283
 284	while (page == NULL) {
 285		prepare_to_wait(&drbd_pp_wait, &wait, TASK_INTERRUPTIBLE);
 286
 287		drbd_reclaim_net_peer_reqs(device);
 288
 289		if (atomic_read(&device->pp_in_use) < mxb) {
 290			page = __drbd_alloc_pages(device, number);
 291			if (page)
 292				break;
 293		}
 294
 295		if (!retry)
 296			break;
 297
 298		if (signal_pending(current)) {
 299			drbd_warn(device, "drbd_alloc_pages interrupted!\n");
 300			break;
 301		}
 302
 303		if (schedule_timeout(HZ/10) == 0)
 304			mxb = UINT_MAX;
 305	}
 306	finish_wait(&drbd_pp_wait, &wait);
 307
 308	if (page)
 309		atomic_add(number, &device->pp_in_use);
 310	return page;
 311}
 312
 313/* Must not be used from irq, as that may deadlock: see drbd_alloc_pages.
 314 * Is also used from inside an other spin_lock_irq(&resource->req_lock);
 315 * Either links the page chain back to the global pool,
 316 * or returns all pages to the system. */
 317static void drbd_free_pages(struct drbd_device *device, struct page *page, int is_net)
 318{
 319	atomic_t *a = is_net ? &device->pp_in_use_by_net : &device->pp_in_use;
 320	int i;
 321
 322	if (page == NULL)
 323		return;
 324
 325	if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE) * drbd_minor_count)
 326		i = page_chain_free(page);
 327	else {
 328		struct page *tmp;
 329		tmp = page_chain_tail(page, &i);
 330		spin_lock(&drbd_pp_lock);
 331		page_chain_add(&drbd_pp_pool, page, tmp);
 332		drbd_pp_vacant += i;
 333		spin_unlock(&drbd_pp_lock);
 334	}
 335	i = atomic_sub_return(i, a);
 336	if (i < 0)
 337		drbd_warn(device, "ASSERTION FAILED: %s: %d < 0\n",
 338			is_net ? "pp_in_use_by_net" : "pp_in_use", i);
 339	wake_up(&drbd_pp_wait);
 340}
 341
 342/*
 343You need to hold the req_lock:
 344 _drbd_wait_ee_list_empty()
 345
 346You must not have the req_lock:
 347 drbd_free_peer_req()
 348 drbd_alloc_peer_req()
 349 drbd_free_peer_reqs()
 
 350 drbd_ee_fix_bhs()
 351 drbd_finish_peer_reqs()
 352 drbd_clear_done_ee()
 353 drbd_wait_ee_list_empty()
 354*/
 355
 356/* normal: payload_size == request size (bi_size)
 357 * w_same: payload_size == logical_block_size
 358 * trim: payload_size == 0 */
 359struct drbd_peer_request *
 360drbd_alloc_peer_req(struct drbd_peer_device *peer_device, u64 id, sector_t sector,
 361		    unsigned int request_size, unsigned int payload_size, gfp_t gfp_mask) __must_hold(local)
 362{
 363	struct drbd_device *device = peer_device->device;
 364	struct drbd_peer_request *peer_req;
 365	struct page *page = NULL;
 366	unsigned int nr_pages = PFN_UP(payload_size);
 367
 368	if (drbd_insert_fault(device, DRBD_FAULT_AL_EE))
 369		return NULL;
 370
 371	peer_req = mempool_alloc(&drbd_ee_mempool, gfp_mask & ~__GFP_HIGHMEM);
 372	if (!peer_req) {
 373		if (!(gfp_mask & __GFP_NOWARN))
 374			drbd_err(device, "%s: allocation failed\n", __func__);
 375		return NULL;
 376	}
 377
 378	if (nr_pages) {
 379		page = drbd_alloc_pages(peer_device, nr_pages,
 380					gfpflags_allow_blocking(gfp_mask));
 381		if (!page)
 382			goto fail;
 383	}
 384
 385	memset(peer_req, 0, sizeof(*peer_req));
 386	INIT_LIST_HEAD(&peer_req->w.list);
 387	drbd_clear_interval(&peer_req->i);
 388	peer_req->i.size = request_size;
 389	peer_req->i.sector = sector;
 390	peer_req->submit_jif = jiffies;
 391	peer_req->peer_device = peer_device;
 392	peer_req->pages = page;
 393	/*
 394	 * The block_id is opaque to the receiver.  It is not endianness
 395	 * converted, and sent back to the sender unchanged.
 396	 */
 397	peer_req->block_id = id;
 398
 399	return peer_req;
 400
 401 fail:
 402	mempool_free(peer_req, &drbd_ee_mempool);
 403	return NULL;
 404}
 405
 406void __drbd_free_peer_req(struct drbd_device *device, struct drbd_peer_request *peer_req,
 407		       int is_net)
 408{
 409	might_sleep();
 410	if (peer_req->flags & EE_HAS_DIGEST)
 411		kfree(peer_req->digest);
 412	drbd_free_pages(device, peer_req->pages, is_net);
 413	D_ASSERT(device, atomic_read(&peer_req->pending_bios) == 0);
 414	D_ASSERT(device, drbd_interval_empty(&peer_req->i));
 415	if (!expect(device, !(peer_req->flags & EE_CALL_AL_COMPLETE_IO))) {
 416		peer_req->flags &= ~EE_CALL_AL_COMPLETE_IO;
 417		drbd_al_complete_io(device, &peer_req->i);
 418	}
 419	mempool_free(peer_req, &drbd_ee_mempool);
 420}
 421
 422int drbd_free_peer_reqs(struct drbd_device *device, struct list_head *list)
 423{
 424	LIST_HEAD(work_list);
 425	struct drbd_peer_request *peer_req, *t;
 426	int count = 0;
 427	int is_net = list == &device->net_ee;
 428
 429	spin_lock_irq(&device->resource->req_lock);
 430	list_splice_init(list, &work_list);
 431	spin_unlock_irq(&device->resource->req_lock);
 432
 433	list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
 434		__drbd_free_peer_req(device, peer_req, is_net);
 435		count++;
 436	}
 437	return count;
 438}
 439
 
 440/*
 441 * See also comments in _req_mod(,BARRIER_ACKED) and receive_Barrier.
 
 
 
 
 
 
 442 */
 443static int drbd_finish_peer_reqs(struct drbd_device *device)
 444{
 445	LIST_HEAD(work_list);
 446	LIST_HEAD(reclaimed);
 447	struct drbd_peer_request *peer_req, *t;
 448	int err = 0;
 449
 450	spin_lock_irq(&device->resource->req_lock);
 451	reclaim_finished_net_peer_reqs(device, &reclaimed);
 452	list_splice_init(&device->done_ee, &work_list);
 453	spin_unlock_irq(&device->resource->req_lock);
 454
 455	list_for_each_entry_safe(peer_req, t, &reclaimed, w.list)
 456		drbd_free_net_peer_req(device, peer_req);
 457
 458	/* possible callbacks here:
 459	 * e_end_block, and e_end_resync_block, e_send_superseded.
 460	 * all ignore the last argument.
 461	 */
 462	list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
 463		int err2;
 464
 465		/* list_del not necessary, next/prev members not touched */
 466		err2 = peer_req->w.cb(&peer_req->w, !!err);
 467		if (!err)
 468			err = err2;
 469		drbd_free_peer_req(device, peer_req);
 470	}
 471	wake_up(&device->ee_wait);
 472
 473	return err;
 474}
 475
 476static void _drbd_wait_ee_list_empty(struct drbd_device *device,
 477				     struct list_head *head)
 478{
 479	DEFINE_WAIT(wait);
 480
 481	/* avoids spin_lock/unlock
 482	 * and calling prepare_to_wait in the fast path */
 483	while (!list_empty(head)) {
 484		prepare_to_wait(&device->ee_wait, &wait, TASK_UNINTERRUPTIBLE);
 485		spin_unlock_irq(&device->resource->req_lock);
 486		io_schedule();
 487		finish_wait(&device->ee_wait, &wait);
 488		spin_lock_irq(&device->resource->req_lock);
 489	}
 490}
 491
 492static void drbd_wait_ee_list_empty(struct drbd_device *device,
 493				    struct list_head *head)
 494{
 495	spin_lock_irq(&device->resource->req_lock);
 496	_drbd_wait_ee_list_empty(device, head);
 497	spin_unlock_irq(&device->resource->req_lock);
 498}
 499
 500static int drbd_recv_short(struct socket *sock, void *buf, size_t size, int flags)
 
 
 
 501{
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 502	struct kvec iov = {
 503		.iov_base = buf,
 504		.iov_len = size,
 505	};
 506	struct msghdr msg = {
 
 
 507		.msg_flags = (flags ? flags : MSG_WAITALL | MSG_NOSIGNAL)
 508	};
 509	iov_iter_kvec(&msg.msg_iter, ITER_DEST, &iov, 1, size);
 510	return sock_recvmsg(sock, &msg, msg.msg_flags);
 
 
 
 
 
 
 511}
 512
 513static int drbd_recv(struct drbd_connection *connection, void *buf, size_t size)
 514{
 
 
 
 
 
 
 
 
 
 
 515	int rv;
 516
 517	rv = drbd_recv_short(connection->data.socket, buf, size, 0);
 
 518
 519	if (rv < 0) {
 520		if (rv == -ECONNRESET)
 521			drbd_info(connection, "sock was reset by peer\n");
 522		else if (rv != -ERESTARTSYS)
 523			drbd_err(connection, "sock_recvmsg returned %d\n", rv);
 524	} else if (rv == 0) {
 525		if (test_bit(DISCONNECT_SENT, &connection->flags)) {
 526			long t;
 527			rcu_read_lock();
 528			t = rcu_dereference(connection->net_conf)->ping_timeo * HZ/10;
 529			rcu_read_unlock();
 530
 531			t = wait_event_timeout(connection->ping_wait, connection->cstate < C_WF_REPORT_PARAMS, t);
 
 
 
 532
 533			if (t)
 534				goto out;
 
 
 
 
 
 
 
 
 
 
 
 
 
 535		}
 536		drbd_info(connection, "sock was shut down by peer\n");
 537	}
 
 538
 539	if (rv != size)
 540		conn_request_state(connection, NS(conn, C_BROKEN_PIPE), CS_HARD);
 541
 542out:
 543	return rv;
 544}
 545
 546static int drbd_recv_all(struct drbd_connection *connection, void *buf, size_t size)
 547{
 548	int err;
 549
 550	err = drbd_recv(connection, buf, size);
 551	if (err != size) {
 552		if (err >= 0)
 553			err = -EIO;
 554	} else
 555		err = 0;
 556	return err;
 557}
 558
 559static int drbd_recv_all_warn(struct drbd_connection *connection, void *buf, size_t size)
 560{
 561	int err;
 562
 563	err = drbd_recv_all(connection, buf, size);
 564	if (err && !signal_pending(current))
 565		drbd_warn(connection, "short read (expected size %d)\n", (int)size);
 566	return err;
 567}
 568
 569/* quoting tcp(7):
 570 *   On individual connections, the socket buffer size must be set prior to the
 571 *   listen(2) or connect(2) calls in order to have it take effect.
 572 * This is our wrapper to do so.
 573 */
 574static void drbd_setbufsize(struct socket *sock, unsigned int snd,
 575		unsigned int rcv)
 576{
 577	/* open coded SO_SNDBUF, SO_RCVBUF */
 578	if (snd) {
 579		sock->sk->sk_sndbuf = snd;
 580		sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
 581	}
 582	if (rcv) {
 583		sock->sk->sk_rcvbuf = rcv;
 584		sock->sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
 585	}
 586}
 587
 588static struct socket *drbd_try_connect(struct drbd_connection *connection)
 589{
 590	const char *what;
 591	struct socket *sock;
 592	struct sockaddr_in6 src_in6;
 593	struct sockaddr_in6 peer_in6;
 594	struct net_conf *nc;
 595	int err, peer_addr_len, my_addr_len;
 596	int sndbuf_size, rcvbuf_size, connect_int;
 597	int disconnect_on_error = 1;
 598
 599	rcu_read_lock();
 600	nc = rcu_dereference(connection->net_conf);
 601	if (!nc) {
 602		rcu_read_unlock();
 603		return NULL;
 604	}
 605	sndbuf_size = nc->sndbuf_size;
 606	rcvbuf_size = nc->rcvbuf_size;
 607	connect_int = nc->connect_int;
 608	rcu_read_unlock();
 609
 610	my_addr_len = min_t(int, connection->my_addr_len, sizeof(src_in6));
 611	memcpy(&src_in6, &connection->my_addr, my_addr_len);
 612
 613	if (((struct sockaddr *)&connection->my_addr)->sa_family == AF_INET6)
 614		src_in6.sin6_port = 0;
 615	else
 616		((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
 617
 618	peer_addr_len = min_t(int, connection->peer_addr_len, sizeof(src_in6));
 619	memcpy(&peer_in6, &connection->peer_addr, peer_addr_len);
 620
 621	what = "sock_create_kern";
 622	err = sock_create_kern(&init_net, ((struct sockaddr *)&src_in6)->sa_family,
 623			       SOCK_STREAM, IPPROTO_TCP, &sock);
 624	if (err < 0) {
 625		sock = NULL;
 626		goto out;
 627	}
 628
 629	sock->sk->sk_rcvtimeo =
 630	sock->sk->sk_sndtimeo = connect_int * HZ;
 631	drbd_setbufsize(sock, sndbuf_size, rcvbuf_size);
 
 632
 633       /* explicitly bind to the configured IP as source IP
 634	*  for the outgoing connections.
 635	*  This is needed for multihomed hosts and to be
 636	*  able to use lo: interfaces for drbd.
 637	* Make sure to use 0 as port number, so linux selects
 638	*  a free one dynamically.
 639	*/
 
 
 
 
 
 
 
 640	what = "bind before connect";
 641	err = sock->ops->bind(sock, (struct sockaddr *) &src_in6, my_addr_len);
 
 
 642	if (err < 0)
 643		goto out;
 644
 645	/* connect may fail, peer not yet available.
 646	 * stay C_WF_CONNECTION, don't go Disconnecting! */
 647	disconnect_on_error = 0;
 648	what = "connect";
 649	err = sock->ops->connect(sock, (struct sockaddr *) &peer_in6, peer_addr_len, 0);
 
 
 650
 651out:
 652	if (err < 0) {
 653		if (sock) {
 654			sock_release(sock);
 655			sock = NULL;
 656		}
 657		switch (-err) {
 658			/* timeout, busy, signal pending */
 659		case ETIMEDOUT: case EAGAIN: case EINPROGRESS:
 660		case EINTR: case ERESTARTSYS:
 661			/* peer not (yet) available, network problem */
 662		case ECONNREFUSED: case ENETUNREACH:
 663		case EHOSTDOWN:    case EHOSTUNREACH:
 664			disconnect_on_error = 0;
 665			break;
 666		default:
 667			drbd_err(connection, "%s failed, err = %d\n", what, err);
 668		}
 669		if (disconnect_on_error)
 670			conn_request_state(connection, NS(conn, C_DISCONNECTING), CS_HARD);
 671	}
 672
 673	return sock;
 674}
 675
 676struct accept_wait_data {
 677	struct drbd_connection *connection;
 678	struct socket *s_listen;
 679	struct completion door_bell;
 680	void (*original_sk_state_change)(struct sock *sk);
 681
 682};
 683
 684static void drbd_incoming_connection(struct sock *sk)
 685{
 686	struct accept_wait_data *ad = sk->sk_user_data;
 687	void (*state_change)(struct sock *sk);
 688
 689	state_change = ad->original_sk_state_change;
 690	if (sk->sk_state == TCP_ESTABLISHED)
 691		complete(&ad->door_bell);
 692	state_change(sk);
 693}
 694
 695static int prepare_listen_socket(struct drbd_connection *connection, struct accept_wait_data *ad)
 696{
 697	int err, sndbuf_size, rcvbuf_size, my_addr_len;
 698	struct sockaddr_in6 my_addr;
 699	struct socket *s_listen;
 700	struct net_conf *nc;
 701	const char *what;
 702
 703	rcu_read_lock();
 704	nc = rcu_dereference(connection->net_conf);
 705	if (!nc) {
 706		rcu_read_unlock();
 707		return -EIO;
 708	}
 709	sndbuf_size = nc->sndbuf_size;
 710	rcvbuf_size = nc->rcvbuf_size;
 711	rcu_read_unlock();
 712
 713	my_addr_len = min_t(int, connection->my_addr_len, sizeof(struct sockaddr_in6));
 714	memcpy(&my_addr, &connection->my_addr, my_addr_len);
 715
 716	what = "sock_create_kern";
 717	err = sock_create_kern(&init_net, ((struct sockaddr *)&my_addr)->sa_family,
 718			       SOCK_STREAM, IPPROTO_TCP, &s_listen);
 719	if (err) {
 720		s_listen = NULL;
 721		goto out;
 722	}
 723
 724	s_listen->sk->sk_reuse = SK_CAN_REUSE; /* SO_REUSEADDR */
 725	drbd_setbufsize(s_listen, sndbuf_size, rcvbuf_size);
 
 
 
 
 
 
 726
 727	what = "bind before listen";
 728	err = s_listen->ops->bind(s_listen, (struct sockaddr *)&my_addr, my_addr_len);
 
 
 729	if (err < 0)
 730		goto out;
 731
 732	ad->s_listen = s_listen;
 733	write_lock_bh(&s_listen->sk->sk_callback_lock);
 734	ad->original_sk_state_change = s_listen->sk->sk_state_change;
 735	s_listen->sk->sk_state_change = drbd_incoming_connection;
 736	s_listen->sk->sk_user_data = ad;
 737	write_unlock_bh(&s_listen->sk->sk_callback_lock);
 738
 739	what = "listen";
 740	err = s_listen->ops->listen(s_listen, 5);
 741	if (err < 0)
 742		goto out;
 743
 744	return 0;
 745out:
 746	if (s_listen)
 747		sock_release(s_listen);
 748	if (err < 0) {
 749		if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
 750			drbd_err(connection, "%s failed, err = %d\n", what, err);
 751			conn_request_state(connection, NS(conn, C_DISCONNECTING), CS_HARD);
 752		}
 753	}
 
 754
 755	return -EIO;
 756}
 757
 758static void unregister_state_change(struct sock *sk, struct accept_wait_data *ad)
 759{
 760	write_lock_bh(&sk->sk_callback_lock);
 761	sk->sk_state_change = ad->original_sk_state_change;
 762	sk->sk_user_data = NULL;
 763	write_unlock_bh(&sk->sk_callback_lock);
 764}
 765
 766static struct socket *drbd_wait_for_connect(struct drbd_connection *connection, struct accept_wait_data *ad)
 
 767{
 768	int timeo, connect_int, err = 0;
 769	struct socket *s_estab = NULL;
 770	struct net_conf *nc;
 771
 772	rcu_read_lock();
 773	nc = rcu_dereference(connection->net_conf);
 774	if (!nc) {
 775		rcu_read_unlock();
 776		return NULL;
 777	}
 778	connect_int = nc->connect_int;
 779	rcu_read_unlock();
 780
 781	timeo = connect_int * HZ;
 782	/* 28.5% random jitter */
 783	timeo += get_random_u32_below(2) ? timeo / 7 : -timeo / 7;
 784
 785	err = wait_for_completion_interruptible_timeout(&ad->door_bell, timeo);
 786	if (err <= 0)
 787		return NULL;
 788
 789	err = kernel_accept(ad->s_listen, &s_estab, 0);
 790	if (err < 0) {
 791		if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
 792			drbd_err(connection, "accept failed, err = %d\n", err);
 793			conn_request_state(connection, NS(conn, C_DISCONNECTING), CS_HARD);
 794		}
 795	}
 796
 797	if (s_estab)
 798		unregister_state_change(s_estab->sk, ad);
 799
 800	return s_estab;
 801}
 802
 803static int decode_header(struct drbd_connection *, void *, struct packet_info *);
 804
 805static int send_first_packet(struct drbd_connection *connection, struct drbd_socket *sock,
 806			     enum drbd_packet cmd)
 807{
 808	if (!conn_prepare_command(connection, sock))
 809		return -EIO;
 810	return conn_send_command(connection, sock, cmd, 0, NULL, 0);
 811}
 812
 813static int receive_first_packet(struct drbd_connection *connection, struct socket *sock)
 814{
 815	unsigned int header_size = drbd_header_size(connection);
 816	struct packet_info pi;
 817	struct net_conf *nc;
 818	int err;
 819
 820	rcu_read_lock();
 821	nc = rcu_dereference(connection->net_conf);
 822	if (!nc) {
 823		rcu_read_unlock();
 824		return -EIO;
 825	}
 826	sock->sk->sk_rcvtimeo = nc->ping_timeo * 4 * HZ / 10;
 827	rcu_read_unlock();
 828
 829	err = drbd_recv_short(sock, connection->data.rbuf, header_size, 0);
 830	if (err != header_size) {
 831		if (err >= 0)
 832			err = -EIO;
 833		return err;
 834	}
 835	err = decode_header(connection, connection->data.rbuf, &pi);
 836	if (err)
 837		return err;
 838	return pi.cmd;
 839}
 840
 841/**
 842 * drbd_socket_okay() - Free the socket if its connection is not okay
 
 843 * @sock:	pointer to the pointer to the socket.
 844 */
 845static bool drbd_socket_okay(struct socket **sock)
 846{
 847	int rr;
 848	char tb[4];
 849
 850	if (!*sock)
 851		return false;
 852
 853	rr = drbd_recv_short(*sock, tb, 4, MSG_DONTWAIT | MSG_PEEK);
 854
 855	if (rr > 0 || rr == -EAGAIN) {
 856		return true;
 857	} else {
 858		sock_release(*sock);
 859		*sock = NULL;
 860		return false;
 861	}
 862}
 863
 864static bool connection_established(struct drbd_connection *connection,
 865				   struct socket **sock1,
 866				   struct socket **sock2)
 867{
 868	struct net_conf *nc;
 869	int timeout;
 870	bool ok;
 871
 872	if (!*sock1 || !*sock2)
 873		return false;
 874
 875	rcu_read_lock();
 876	nc = rcu_dereference(connection->net_conf);
 877	timeout = (nc->sock_check_timeo ?: nc->ping_timeo) * HZ / 10;
 878	rcu_read_unlock();
 879	schedule_timeout_interruptible(timeout);
 880
 881	ok = drbd_socket_okay(sock1);
 882	ok = drbd_socket_okay(sock2) && ok;
 883
 884	return ok;
 885}
 886
 887/* Gets called if a connection is established, or if a new minor gets created
 888   in a connection */
 889int drbd_connected(struct drbd_peer_device *peer_device)
 890{
 891	struct drbd_device *device = peer_device->device;
 892	int err;
 893
 894	atomic_set(&device->packet_seq, 0);
 895	device->peer_seq = 0;
 896
 897	device->state_mutex = peer_device->connection->agreed_pro_version < 100 ?
 898		&peer_device->connection->cstate_mutex :
 899		&device->own_state_mutex;
 900
 901	err = drbd_send_sync_param(peer_device);
 902	if (!err)
 903		err = drbd_send_sizes(peer_device, 0, 0);
 904	if (!err)
 905		err = drbd_send_uuids(peer_device);
 906	if (!err)
 907		err = drbd_send_current_state(peer_device);
 908	clear_bit(USE_DEGR_WFC_T, &device->flags);
 909	clear_bit(RESIZE_PENDING, &device->flags);
 910	atomic_set(&device->ap_in_flight, 0);
 911	mod_timer(&device->request_timer, jiffies + HZ); /* just start it here. */
 912	return err;
 913}
 914
 915/*
 916 * return values:
 917 *   1 yes, we have a valid connection
 918 *   0 oops, did not work out, please try again
 919 *  -1 peer talks different language,
 920 *     no point in trying again, please go standalone.
 921 *  -2 We do not have a network config...
 922 */
 923static int conn_connect(struct drbd_connection *connection)
 924{
 925	struct drbd_socket sock, msock;
 926	struct drbd_peer_device *peer_device;
 927	struct net_conf *nc;
 928	int vnr, timeout, h;
 929	bool discard_my_data, ok;
 930	enum drbd_state_rv rv;
 931	struct accept_wait_data ad = {
 932		.connection = connection,
 933		.door_bell = COMPLETION_INITIALIZER_ONSTACK(ad.door_bell),
 934	};
 935
 936	clear_bit(DISCONNECT_SENT, &connection->flags);
 937	if (conn_request_state(connection, NS(conn, C_WF_CONNECTION), CS_VERBOSE) < SS_SUCCESS)
 938		return -2;
 939
 940	mutex_init(&sock.mutex);
 941	sock.sbuf = connection->data.sbuf;
 942	sock.rbuf = connection->data.rbuf;
 943	sock.socket = NULL;
 944	mutex_init(&msock.mutex);
 945	msock.sbuf = connection->meta.sbuf;
 946	msock.rbuf = connection->meta.rbuf;
 947	msock.socket = NULL;
 948
 949	/* Assume that the peer only understands protocol 80 until we know better.  */
 950	connection->agreed_pro_version = 80;
 951
 952	if (prepare_listen_socket(connection, &ad))
 953		return 0;
 954
 955	do {
 956		struct socket *s;
 
 
 
 
 
 
 
 957
 958		s = drbd_try_connect(connection);
 959		if (s) {
 960			if (!sock.socket) {
 961				sock.socket = s;
 962				send_first_packet(connection, &sock, P_INITIAL_DATA);
 963			} else if (!msock.socket) {
 964				clear_bit(RESOLVE_CONFLICTS, &connection->flags);
 965				msock.socket = s;
 966				send_first_packet(connection, &msock, P_INITIAL_META);
 
 967			} else {
 968				drbd_err(connection, "Logic error in conn_connect()\n");
 969				goto out_release_sockets;
 970			}
 971		}
 972
 973		if (connection_established(connection, &sock.socket, &msock.socket))
 974			break;
 
 
 
 
 
 975
 976retry:
 977		s = drbd_wait_for_connect(connection, &ad);
 978		if (s) {
 979			int fp = receive_first_packet(connection, s);
 980			drbd_socket_okay(&sock.socket);
 981			drbd_socket_okay(&msock.socket);
 982			switch (fp) {
 983			case P_INITIAL_DATA:
 984				if (sock.socket) {
 985					drbd_warn(connection, "initial packet S crossed\n");
 986					sock_release(sock.socket);
 987					sock.socket = s;
 988					goto randomize;
 989				}
 990				sock.socket = s;
 991				break;
 992			case P_INITIAL_META:
 993				set_bit(RESOLVE_CONFLICTS, &connection->flags);
 994				if (msock.socket) {
 995					drbd_warn(connection, "initial packet M crossed\n");
 996					sock_release(msock.socket);
 997					msock.socket = s;
 998					goto randomize;
 999				}
1000				msock.socket = s;
 
1001				break;
1002			default:
1003				drbd_warn(connection, "Error receiving initial packet\n");
1004				sock_release(s);
1005randomize:
1006				if (get_random_u32_below(2))
1007					goto retry;
1008			}
1009		}
1010
1011		if (connection->cstate <= C_DISCONNECTING)
1012			goto out_release_sockets;
1013		if (signal_pending(current)) {
1014			flush_signals(current);
1015			smp_rmb();
1016			if (get_t_state(&connection->receiver) == EXITING)
1017				goto out_release_sockets;
1018		}
1019
1020		ok = connection_established(connection, &sock.socket, &msock.socket);
1021	} while (!ok);
 
 
 
 
 
1022
1023	if (ad.s_listen)
1024		sock_release(ad.s_listen);
1025
1026	sock.socket->sk->sk_reuse = SK_CAN_REUSE; /* SO_REUSEADDR */
1027	msock.socket->sk->sk_reuse = SK_CAN_REUSE; /* SO_REUSEADDR */
1028
1029	sock.socket->sk->sk_allocation = GFP_NOIO;
1030	msock.socket->sk->sk_allocation = GFP_NOIO;
1031
1032	sock.socket->sk->sk_use_task_frag = false;
1033	msock.socket->sk->sk_use_task_frag = false;
1034
1035	sock.socket->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
1036	msock.socket->sk->sk_priority = TC_PRIO_INTERACTIVE;
1037
1038	/* NOT YET ...
1039	 * sock.socket->sk->sk_sndtimeo = connection->net_conf->timeout*HZ/10;
1040	 * sock.socket->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
1041	 * first set it to the P_CONNECTION_FEATURES timeout,
1042	 * which we set to 4x the configured ping_timeout. */
1043	rcu_read_lock();
1044	nc = rcu_dereference(connection->net_conf);
1045
1046	sock.socket->sk->sk_sndtimeo =
1047	sock.socket->sk->sk_rcvtimeo = nc->ping_timeo*4*HZ/10;
1048
1049	msock.socket->sk->sk_rcvtimeo = nc->ping_int*HZ;
1050	timeout = nc->timeout * HZ / 10;
1051	discard_my_data = nc->discard_my_data;
1052	rcu_read_unlock();
1053
1054	msock.socket->sk->sk_sndtimeo = timeout;
 
1055
1056	/* we don't want delays.
1057	 * we use TCP_CORK where appropriate, though */
1058	tcp_sock_set_nodelay(sock.socket->sk);
1059	tcp_sock_set_nodelay(msock.socket->sk);
1060
1061	connection->data.socket = sock.socket;
1062	connection->meta.socket = msock.socket;
1063	connection->last_received = jiffies;
1064
1065	h = drbd_do_features(connection);
 
 
1066	if (h <= 0)
1067		return h;
1068
1069	if (connection->cram_hmac_tfm) {
1070		/* drbd_request_state(device, NS(conn, WFAuth)); */
1071		switch (drbd_do_auth(connection)) {
1072		case -1:
1073			drbd_err(connection, "Authentication of peer failed\n");
1074			return -1;
1075		case 0:
1076			drbd_err(connection, "Authentication of peer failed, trying again.\n");
1077			return 0;
1078		}
1079	}
1080
1081	connection->data.socket->sk->sk_sndtimeo = timeout;
1082	connection->data.socket->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
1083
1084	if (drbd_send_protocol(connection) == -EOPNOTSUPP)
1085		return -1;
1086
1087	/* Prevent a race between resync-handshake and
1088	 * being promoted to Primary.
1089	 *
1090	 * Grab and release the state mutex, so we know that any current
1091	 * drbd_set_role() is finished, and any incoming drbd_set_role
1092	 * will see the STATE_SENT flag, and wait for it to be cleared.
1093	 */
1094	idr_for_each_entry(&connection->peer_devices, peer_device, vnr)
1095		mutex_lock(peer_device->device->state_mutex);
1096
1097	/* avoid a race with conn_request_state( C_DISCONNECTING ) */
1098	spin_lock_irq(&connection->resource->req_lock);
1099	set_bit(STATE_SENT, &connection->flags);
1100	spin_unlock_irq(&connection->resource->req_lock);
1101
1102	idr_for_each_entry(&connection->peer_devices, peer_device, vnr)
1103		mutex_unlock(peer_device->device->state_mutex);
1104
1105	rcu_read_lock();
1106	idr_for_each_entry(&connection->peer_devices, peer_device, vnr) {
1107		struct drbd_device *device = peer_device->device;
1108		kref_get(&device->kref);
1109		rcu_read_unlock();
1110
1111		if (discard_my_data)
1112			set_bit(DISCARD_MY_DATA, &device->flags);
1113		else
1114			clear_bit(DISCARD_MY_DATA, &device->flags);
1115
1116		drbd_connected(peer_device);
1117		kref_put(&device->kref, drbd_destroy_device);
1118		rcu_read_lock();
1119	}
1120	rcu_read_unlock();
 
 
 
 
1121
1122	rv = conn_request_state(connection, NS(conn, C_WF_REPORT_PARAMS), CS_VERBOSE);
1123	if (rv < SS_SUCCESS || connection->cstate != C_WF_REPORT_PARAMS) {
1124		clear_bit(STATE_SENT, &connection->flags);
1125		return 0;
1126	}
1127
1128	drbd_thread_start(&connection->ack_receiver);
1129	/* opencoded create_singlethread_workqueue(),
1130	 * to be able to use format string arguments */
1131	connection->ack_sender =
1132		alloc_ordered_workqueue("drbd_as_%s", WQ_MEM_RECLAIM, connection->resource->name);
1133	if (!connection->ack_sender) {
1134		drbd_err(connection, "Failed to create workqueue ack_sender\n");
1135		return 0;
1136	}
1137
1138	mutex_lock(&connection->resource->conf_update);
1139	/* The discard_my_data flag is a single-shot modifier to the next
1140	 * connection attempt, the handshake of which is now well underway.
1141	 * No need for rcu style copying of the whole struct
1142	 * just to clear a single value. */
1143	connection->net_conf->discard_my_data = 0;
1144	mutex_unlock(&connection->resource->conf_update);
1145
1146	return h;
1147
1148out_release_sockets:
1149	if (ad.s_listen)
1150		sock_release(ad.s_listen);
1151	if (sock.socket)
1152		sock_release(sock.socket);
1153	if (msock.socket)
1154		sock_release(msock.socket);
1155	return -1;
1156}
1157
1158static int decode_header(struct drbd_connection *connection, void *header, struct packet_info *pi)
1159{
1160	unsigned int header_size = drbd_header_size(connection);
 
1161
1162	if (header_size == sizeof(struct p_header100) &&
1163	    *(__be32 *)header == cpu_to_be32(DRBD_MAGIC_100)) {
1164		struct p_header100 *h = header;
1165		if (h->pad != 0) {
1166			drbd_err(connection, "Header padding is not zero\n");
1167			return -EINVAL;
1168		}
1169		pi->vnr = be16_to_cpu(h->volume);
1170		pi->cmd = be16_to_cpu(h->command);
1171		pi->size = be32_to_cpu(h->length);
1172	} else if (header_size == sizeof(struct p_header95) &&
1173		   *(__be16 *)header == cpu_to_be16(DRBD_MAGIC_BIG)) {
1174		struct p_header95 *h = header;
1175		pi->cmd = be16_to_cpu(h->command);
1176		pi->size = be32_to_cpu(h->length);
1177		pi->vnr = 0;
1178	} else if (header_size == sizeof(struct p_header80) &&
1179		   *(__be32 *)header == cpu_to_be32(DRBD_MAGIC)) {
1180		struct p_header80 *h = header;
1181		pi->cmd = be16_to_cpu(h->command);
1182		pi->size = be16_to_cpu(h->length);
1183		pi->vnr = 0;
1184	} else {
1185		drbd_err(connection, "Wrong magic value 0x%08x in protocol version %d\n",
1186			 be32_to_cpu(*(__be32 *)header),
1187			 connection->agreed_pro_version);
1188		return -EINVAL;
1189	}
1190	pi->data = header + header_size;
1191	return 0;
1192}
1193
1194static void drbd_unplug_all_devices(struct drbd_connection *connection)
1195{
1196	if (current->plug == &connection->receiver_plug) {
1197		blk_finish_plug(&connection->receiver_plug);
1198		blk_start_plug(&connection->receiver_plug);
1199	} /* else: maybe just schedule() ?? */
1200}
1201
1202static int drbd_recv_header(struct drbd_connection *connection, struct packet_info *pi)
1203{
1204	void *buffer = connection->data.rbuf;
1205	int err;
1206
1207	err = drbd_recv_all_warn(connection, buffer, drbd_header_size(connection));
1208	if (err)
1209		return err;
1210
1211	err = decode_header(connection, buffer, pi);
1212	connection->last_received = jiffies;
1213
1214	return err;
1215}
1216
1217static int drbd_recv_header_maybe_unplug(struct drbd_connection *connection, struct packet_info *pi)
1218{
1219	void *buffer = connection->data.rbuf;
1220	unsigned int size = drbd_header_size(connection);
1221	int err;
1222
1223	err = drbd_recv_short(connection->data.socket, buffer, size, MSG_NOSIGNAL|MSG_DONTWAIT);
1224	if (err != size) {
1225		/* If we have nothing in the receive buffer now, to reduce
1226		 * application latency, try to drain the backend queues as
1227		 * quickly as possible, and let remote TCP know what we have
1228		 * received so far. */
1229		if (err == -EAGAIN) {
1230			tcp_sock_set_quickack(connection->data.socket->sk, 2);
1231			drbd_unplug_all_devices(connection);
1232		}
1233		if (err > 0) {
1234			buffer += err;
1235			size -= err;
1236		}
1237		err = drbd_recv_all_warn(connection, buffer, size);
1238		if (err)
1239			return err;
1240	}
 
1241
1242	err = decode_header(connection, connection->data.rbuf, pi);
1243	connection->last_received = jiffies;
1244
1245	return err;
1246}
1247/* This is blkdev_issue_flush, but asynchronous.
1248 * We want to submit to all component volumes in parallel,
1249 * then wait for all completions.
1250 */
1251struct issue_flush_context {
1252	atomic_t pending;
1253	int error;
1254	struct completion done;
1255};
1256struct one_flush_context {
1257	struct drbd_device *device;
1258	struct issue_flush_context *ctx;
1259};
1260
1261static void one_flush_endio(struct bio *bio)
1262{
1263	struct one_flush_context *octx = bio->bi_private;
1264	struct drbd_device *device = octx->device;
1265	struct issue_flush_context *ctx = octx->ctx;
1266
1267	if (bio->bi_status) {
1268		ctx->error = blk_status_to_errno(bio->bi_status);
1269		drbd_info(device, "local disk FLUSH FAILED with status %d\n", bio->bi_status);
1270	}
1271	kfree(octx);
1272	bio_put(bio);
1273
1274	clear_bit(FLUSH_PENDING, &device->flags);
1275	put_ldev(device);
1276	kref_put(&device->kref, drbd_destroy_device);
1277
1278	if (atomic_dec_and_test(&ctx->pending))
1279		complete(&ctx->done);
1280}
1281
1282static void submit_one_flush(struct drbd_device *device, struct issue_flush_context *ctx)
1283{
1284	struct bio *bio = bio_alloc(device->ldev->backing_bdev, 0,
1285				    REQ_OP_WRITE | REQ_PREFLUSH, GFP_NOIO);
1286	struct one_flush_context *octx = kmalloc(sizeof(*octx), GFP_NOIO);
1287
1288	if (!octx) {
1289		drbd_warn(device, "Could not allocate a octx, CANNOT ISSUE FLUSH\n");
1290		/* FIXME: what else can I do now?  disconnecting or detaching
1291		 * really does not help to improve the state of the world, either.
1292		 */
1293		bio_put(bio);
1294
1295		ctx->error = -ENOMEM;
1296		put_ldev(device);
1297		kref_put(&device->kref, drbd_destroy_device);
1298		return;
1299	}
1300
1301	octx->device = device;
1302	octx->ctx = ctx;
1303	bio->bi_private = octx;
1304	bio->bi_end_io = one_flush_endio;
1305
1306	device->flush_jif = jiffies;
1307	set_bit(FLUSH_PENDING, &device->flags);
1308	atomic_inc(&ctx->pending);
1309	submit_bio(bio);
1310}
1311
1312static void drbd_flush(struct drbd_connection *connection)
1313{
1314	if (connection->resource->write_ordering >= WO_BDEV_FLUSH) {
1315		struct drbd_peer_device *peer_device;
1316		struct issue_flush_context ctx;
1317		int vnr;
1318
1319		atomic_set(&ctx.pending, 1);
1320		ctx.error = 0;
1321		init_completion(&ctx.done);
1322
1323		rcu_read_lock();
1324		idr_for_each_entry(&connection->peer_devices, peer_device, vnr) {
1325			struct drbd_device *device = peer_device->device;
1326
1327			if (!get_ldev(device))
1328				continue;
1329			kref_get(&device->kref);
1330			rcu_read_unlock();
1331
1332			submit_one_flush(device, &ctx);
1333
1334			rcu_read_lock();
1335		}
1336		rcu_read_unlock();
1337
1338		/* Do we want to add a timeout,
1339		 * if disk-timeout is set? */
1340		if (!atomic_dec_and_test(&ctx.pending))
1341			wait_for_completion(&ctx.done);
1342
1343		if (ctx.error) {
1344			/* would rather check on EOPNOTSUPP, but that is not reliable.
1345			 * don't try again for ANY return value != 0
1346			 * if (rv == -EOPNOTSUPP) */
1347			/* Any error is already reported by bio_endio callback. */
1348			drbd_bump_write_ordering(connection->resource, NULL, WO_DRAIN_IO);
1349		}
 
1350	}
1351}
1352
1353/**
1354 * drbd_may_finish_epoch() - Applies an epoch_event to the epoch's state, eventually finishes it.
1355 * @connection:	DRBD connection.
1356 * @epoch:	Epoch object.
1357 * @ev:		Epoch event.
1358 */
1359static enum finish_epoch drbd_may_finish_epoch(struct drbd_connection *connection,
1360					       struct drbd_epoch *epoch,
1361					       enum epoch_event ev)
1362{
1363	int epoch_size;
1364	struct drbd_epoch *next_epoch;
1365	enum finish_epoch rv = FE_STILL_LIVE;
1366
1367	spin_lock(&connection->epoch_lock);
1368	do {
1369		next_epoch = NULL;
1370
1371		epoch_size = atomic_read(&epoch->epoch_size);
1372
1373		switch (ev & ~EV_CLEANUP) {
1374		case EV_PUT:
1375			atomic_dec(&epoch->active);
1376			break;
1377		case EV_GOT_BARRIER_NR:
1378			set_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags);
1379			break;
1380		case EV_BECAME_LAST:
1381			/* nothing to do*/
1382			break;
1383		}
1384
1385		if (epoch_size != 0 &&
1386		    atomic_read(&epoch->active) == 0 &&
1387		    (test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags) || ev & EV_CLEANUP)) {
1388			if (!(ev & EV_CLEANUP)) {
1389				spin_unlock(&connection->epoch_lock);
1390				drbd_send_b_ack(epoch->connection, epoch->barrier_nr, epoch_size);
1391				spin_lock(&connection->epoch_lock);
1392			}
1393#if 0
1394			/* FIXME: dec unacked on connection, once we have
1395			 * something to count pending connection packets in. */
1396			if (test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags))
1397				dec_unacked(epoch->connection);
1398#endif
1399
1400			if (connection->current_epoch != epoch) {
1401				next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
1402				list_del(&epoch->list);
1403				ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
1404				connection->epochs--;
1405				kfree(epoch);
1406
1407				if (rv == FE_STILL_LIVE)
1408					rv = FE_DESTROYED;
1409			} else {
1410				epoch->flags = 0;
1411				atomic_set(&epoch->epoch_size, 0);
1412				/* atomic_set(&epoch->active, 0); is already zero */
1413				if (rv == FE_STILL_LIVE)
1414					rv = FE_RECYCLED;
 
1415			}
1416		}
1417
1418		if (!next_epoch)
1419			break;
1420
1421		epoch = next_epoch;
1422	} while (1);
1423
1424	spin_unlock(&connection->epoch_lock);
1425
1426	return rv;
1427}
1428
1429static enum write_ordering_e
1430max_allowed_wo(struct drbd_backing_dev *bdev, enum write_ordering_e wo)
1431{
1432	struct disk_conf *dc;
1433
1434	dc = rcu_dereference(bdev->disk_conf);
1435
1436	if (wo == WO_BDEV_FLUSH && !dc->disk_flushes)
1437		wo = WO_DRAIN_IO;
1438	if (wo == WO_DRAIN_IO && !dc->disk_drain)
1439		wo = WO_NONE;
1440
1441	return wo;
1442}
1443
1444/*
1445 * drbd_bump_write_ordering() - Fall back to an other write ordering method
 
1446 * @wo:		Write ordering method to try.
1447 */
1448void drbd_bump_write_ordering(struct drbd_resource *resource, struct drbd_backing_dev *bdev,
1449			      enum write_ordering_e wo)
1450{
1451	struct drbd_device *device;
1452	enum write_ordering_e pwo;
1453	int vnr;
1454	static char *write_ordering_str[] = {
1455		[WO_NONE] = "none",
1456		[WO_DRAIN_IO] = "drain",
1457		[WO_BDEV_FLUSH] = "flush",
1458	};
1459
1460	pwo = resource->write_ordering;
1461	if (wo != WO_BDEV_FLUSH)
1462		wo = min(pwo, wo);
1463	rcu_read_lock();
1464	idr_for_each_entry(&resource->devices, device, vnr) {
1465		if (get_ldev(device)) {
1466			wo = max_allowed_wo(device->ldev, wo);
1467			if (device->ldev == bdev)
1468				bdev = NULL;
1469			put_ldev(device);
1470		}
1471	}
1472
1473	if (bdev)
1474		wo = max_allowed_wo(bdev, wo);
1475
1476	rcu_read_unlock();
1477
1478	resource->write_ordering = wo;
1479	if (pwo != resource->write_ordering || wo == WO_BDEV_FLUSH)
1480		drbd_info(resource, "Method to ensure write ordering: %s\n", write_ordering_str[resource->write_ordering]);
1481}
1482
1483/*
1484 * Mapping "discard" to ZEROOUT with UNMAP does not work for us:
1485 * Drivers have to "announce" q->limits.max_write_zeroes_sectors, or it
1486 * will directly go to fallback mode, submitting normal writes, and
1487 * never even try to UNMAP.
1488 *
1489 * And dm-thin does not do this (yet), mostly because in general it has
1490 * to assume that "skip_block_zeroing" is set.  See also:
1491 * https://www.mail-archive.com/dm-devel%40redhat.com/msg07965.html
1492 * https://www.redhat.com/archives/dm-devel/2018-January/msg00271.html
1493 *
1494 * We *may* ignore the discard-zeroes-data setting, if so configured.
1495 *
1496 * Assumption is that this "discard_zeroes_data=0" is only because the backend
1497 * may ignore partial unaligned discards.
1498 *
1499 * LVM/DM thin as of at least
1500 *   LVM version:     2.02.115(2)-RHEL7 (2015-01-28)
1501 *   Library version: 1.02.93-RHEL7 (2015-01-28)
1502 *   Driver version:  4.29.0
1503 * still behaves this way.
1504 *
1505 * For unaligned (wrt. alignment and granularity) or too small discards,
1506 * we zero-out the initial (and/or) trailing unaligned partial chunks,
1507 * but discard all the aligned full chunks.
1508 *
1509 * At least for LVM/DM thin, with skip_block_zeroing=false,
1510 * the result is effectively "discard_zeroes_data=1".
1511 */
1512/* flags: EE_TRIM|EE_ZEROOUT */
1513int drbd_issue_discard_or_zero_out(struct drbd_device *device, sector_t start, unsigned int nr_sectors, int flags)
1514{
1515	struct block_device *bdev = device->ldev->backing_bdev;
1516	sector_t tmp, nr;
1517	unsigned int max_discard_sectors, granularity;
1518	int alignment;
1519	int err = 0;
1520
1521	if ((flags & EE_ZEROOUT) || !(flags & EE_TRIM))
1522		goto zero_out;
1523
1524	/* Zero-sector (unknown) and one-sector granularities are the same.  */
1525	granularity = max(bdev_discard_granularity(bdev) >> 9, 1U);
1526	alignment = (bdev_discard_alignment(bdev) >> 9) % granularity;
1527
1528	max_discard_sectors = min(bdev_max_discard_sectors(bdev), (1U << 22));
1529	max_discard_sectors -= max_discard_sectors % granularity;
1530	if (unlikely(!max_discard_sectors))
1531		goto zero_out;
1532
1533	if (nr_sectors < granularity)
1534		goto zero_out;
1535
1536	tmp = start;
1537	if (sector_div(tmp, granularity) != alignment) {
1538		if (nr_sectors < 2*granularity)
1539			goto zero_out;
1540		/* start + gran - (start + gran - align) % gran */
1541		tmp = start + granularity - alignment;
1542		tmp = start + granularity - sector_div(tmp, granularity);
1543
1544		nr = tmp - start;
1545		/* don't flag BLKDEV_ZERO_NOUNMAP, we don't know how many
1546		 * layers are below us, some may have smaller granularity */
1547		err |= blkdev_issue_zeroout(bdev, start, nr, GFP_NOIO, 0);
1548		nr_sectors -= nr;
1549		start = tmp;
1550	}
1551	while (nr_sectors >= max_discard_sectors) {
1552		err |= blkdev_issue_discard(bdev, start, max_discard_sectors,
1553					    GFP_NOIO);
1554		nr_sectors -= max_discard_sectors;
1555		start += max_discard_sectors;
1556	}
1557	if (nr_sectors) {
1558		/* max_discard_sectors is unsigned int (and a multiple of
1559		 * granularity, we made sure of that above already);
1560		 * nr is < max_discard_sectors;
1561		 * I don't need sector_div here, even though nr is sector_t */
1562		nr = nr_sectors;
1563		nr -= (unsigned int)nr % granularity;
1564		if (nr) {
1565			err |= blkdev_issue_discard(bdev, start, nr, GFP_NOIO);
1566			nr_sectors -= nr;
1567			start += nr;
1568		}
1569	}
1570 zero_out:
1571	if (nr_sectors) {
1572		err |= blkdev_issue_zeroout(bdev, start, nr_sectors, GFP_NOIO,
1573				(flags & EE_TRIM) ? 0 : BLKDEV_ZERO_NOUNMAP);
1574	}
1575	return err != 0;
1576}
1577
1578static bool can_do_reliable_discards(struct drbd_device *device)
1579{
1580	struct disk_conf *dc;
1581	bool can_do;
1582
1583	if (!bdev_max_discard_sectors(device->ldev->backing_bdev))
1584		return false;
1585
1586	rcu_read_lock();
1587	dc = rcu_dereference(device->ldev->disk_conf);
1588	can_do = dc->discard_zeroes_if_aligned;
1589	rcu_read_unlock();
1590	return can_do;
1591}
1592
1593static void drbd_issue_peer_discard_or_zero_out(struct drbd_device *device, struct drbd_peer_request *peer_req)
1594{
1595	/* If the backend cannot discard, or does not guarantee
1596	 * read-back zeroes in discarded ranges, we fall back to
1597	 * zero-out.  Unless configuration specifically requested
1598	 * otherwise. */
1599	if (!can_do_reliable_discards(device))
1600		peer_req->flags |= EE_ZEROOUT;
1601
1602	if (drbd_issue_discard_or_zero_out(device, peer_req->i.sector,
1603	    peer_req->i.size >> 9, peer_req->flags & (EE_ZEROOUT|EE_TRIM)))
1604		peer_req->flags |= EE_WAS_ERROR;
1605	drbd_endio_write_sec_final(peer_req);
1606}
1607
1608static int peer_request_fault_type(struct drbd_peer_request *peer_req)
1609{
1610	if (peer_req_op(peer_req) == REQ_OP_READ) {
1611		return peer_req->flags & EE_APPLICATION ?
1612			DRBD_FAULT_DT_RD : DRBD_FAULT_RS_RD;
1613	} else {
1614		return peer_req->flags & EE_APPLICATION ?
1615			DRBD_FAULT_DT_WR : DRBD_FAULT_RS_WR;
1616	}
1617}
1618
1619/**
1620 * drbd_submit_peer_request()
1621 * @peer_req:	peer request
 
 
1622 *
1623 * May spread the pages to multiple bios,
1624 * depending on bio_add_page restrictions.
1625 *
1626 * Returns 0 if all bios have been submitted,
1627 * -ENOMEM if we could not allocate enough bios,
1628 * -ENOSPC (any better suggestion?) if we have not been able to bio_add_page a
1629 *  single page to an empty bio (which should never happen and likely indicates
1630 *  that the lower level IO stack is in some way broken). This has been observed
1631 *  on certain Xen deployments.
1632 */
1633/* TODO allocate from our own bio_set. */
1634int drbd_submit_peer_request(struct drbd_peer_request *peer_req)
 
1635{
1636	struct drbd_device *device = peer_req->peer_device->device;
1637	struct bio *bios = NULL;
1638	struct bio *bio;
1639	struct page *page = peer_req->pages;
1640	sector_t sector = peer_req->i.sector;
1641	unsigned int data_size = peer_req->i.size;
1642	unsigned int n_bios = 0;
1643	unsigned int nr_pages = PFN_UP(data_size);
1644
1645	/* TRIM/DISCARD: for now, always use the helper function
1646	 * blkdev_issue_zeroout(..., discard=true).
1647	 * It's synchronous, but it does the right thing wrt. bio splitting.
1648	 * Correctness first, performance later.  Next step is to code an
1649	 * asynchronous variant of the same.
1650	 */
1651	if (peer_req->flags & (EE_TRIM | EE_ZEROOUT)) {
1652		/* wait for all pending IO completions, before we start
1653		 * zeroing things out. */
1654		conn_wait_active_ee_empty(peer_req->peer_device->connection);
1655		/* add it to the active list now,
1656		 * so we can find it to present it in debugfs */
1657		peer_req->submit_jif = jiffies;
1658		peer_req->flags |= EE_SUBMITTED;
1659
1660		/* If this was a resync request from receive_rs_deallocated(),
1661		 * it is already on the sync_ee list */
1662		if (list_empty(&peer_req->w.list)) {
1663			spin_lock_irq(&device->resource->req_lock);
1664			list_add_tail(&peer_req->w.list, &device->active_ee);
1665			spin_unlock_irq(&device->resource->req_lock);
1666		}
1667
1668		drbd_issue_peer_discard_or_zero_out(device, peer_req);
1669		return 0;
1670	}
1671
1672	/* In most cases, we will only need one bio.  But in case the lower
1673	 * level restrictions happen to be different at this offset on this
1674	 * side than those of the sending peer, we may need to submit the
1675	 * request in more than one bio.
1676	 *
1677	 * Plain bio_alloc is good enough here, this is no DRBD internally
1678	 * generated bio, but a bio allocated on behalf of the peer.
1679	 */
1680next_bio:
1681	/* _DISCARD, _WRITE_ZEROES handled above.
1682	 * REQ_OP_FLUSH (empty flush) not expected,
1683	 * should have been mapped to a "drbd protocol barrier".
1684	 * REQ_OP_SECURE_ERASE: I don't see how we could ever support that.
1685	 */
1686	if (!(peer_req_op(peer_req) == REQ_OP_WRITE ||
1687				peer_req_op(peer_req) == REQ_OP_READ)) {
1688		drbd_err(device, "Invalid bio op received: 0x%x\n", peer_req->opf);
1689		return -EINVAL;
1690	}
1691
1692	bio = bio_alloc(device->ldev->backing_bdev, nr_pages, peer_req->opf, GFP_NOIO);
1693	/* > peer_req->i.sector, unless this is the first bio */
1694	bio->bi_iter.bi_sector = sector;
1695	bio->bi_private = peer_req;
1696	bio->bi_end_io = drbd_peer_request_endio;
1697
1698	bio->bi_next = bios;
1699	bios = bio;
1700	++n_bios;
1701
1702	page_chain_for_each(page) {
1703		unsigned len = min_t(unsigned, data_size, PAGE_SIZE);
1704		if (!bio_add_page(bio, page, len, 0))
 
 
 
 
 
 
 
 
 
 
 
1705			goto next_bio;
1706		data_size -= len;
 
1707		sector += len >> 9;
1708		--nr_pages;
1709	}
1710	D_ASSERT(device, data_size == 0);
1711	D_ASSERT(device, page == NULL);
1712
1713	atomic_set(&peer_req->pending_bios, n_bios);
1714	/* for debugfs: update timestamp, mark as submitted */
1715	peer_req->submit_jif = jiffies;
1716	peer_req->flags |= EE_SUBMITTED;
1717	do {
1718		bio = bios;
1719		bios = bios->bi_next;
1720		bio->bi_next = NULL;
1721
1722		drbd_submit_bio_noacct(device, peer_request_fault_type(peer_req), bio);
1723	} while (bios);
1724	return 0;
1725}
1726
1727static void drbd_remove_epoch_entry_interval(struct drbd_device *device,
1728					     struct drbd_peer_request *peer_req)
1729{
1730	struct drbd_interval *i = &peer_req->i;
1731
1732	drbd_remove_interval(&device->write_requests, i);
1733	drbd_clear_interval(i);
1734
1735	/* Wake up any processes waiting for this peer request to complete.  */
1736	if (i->waiting)
1737		wake_up(&device->misc_wait);
1738}
1739
1740static void conn_wait_active_ee_empty(struct drbd_connection *connection)
1741{
1742	struct drbd_peer_device *peer_device;
1743	int vnr;
1744
1745	rcu_read_lock();
1746	idr_for_each_entry(&connection->peer_devices, peer_device, vnr) {
1747		struct drbd_device *device = peer_device->device;
1748
1749		kref_get(&device->kref);
1750		rcu_read_unlock();
1751		drbd_wait_ee_list_empty(device, &device->active_ee);
1752		kref_put(&device->kref, drbd_destroy_device);
1753		rcu_read_lock();
1754	}
1755	rcu_read_unlock();
1756}
1757
1758static int receive_Barrier(struct drbd_connection *connection, struct packet_info *pi)
1759{
1760	int rv;
1761	struct p_barrier *p = pi->data;
1762	struct drbd_epoch *epoch;
1763
1764	/* FIXME these are unacked on connection,
1765	 * not a specific (peer)device.
1766	 */
1767	connection->current_epoch->barrier_nr = p->barrier;
1768	connection->current_epoch->connection = connection;
1769	rv = drbd_may_finish_epoch(connection, connection->current_epoch, EV_GOT_BARRIER_NR);
1770
1771	/* P_BARRIER_ACK may imply that the corresponding extent is dropped from
1772	 * the activity log, which means it would not be resynced in case the
1773	 * R_PRIMARY crashes now.
1774	 * Therefore we must send the barrier_ack after the barrier request was
1775	 * completed. */
1776	switch (connection->resource->write_ordering) {
1777	case WO_NONE:
1778		if (rv == FE_RECYCLED)
1779			return 0;
1780
1781		/* receiver context, in the writeout path of the other node.
1782		 * avoid potential distributed deadlock */
1783		epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1784		if (epoch)
1785			break;
1786		else
1787			drbd_warn(connection, "Allocation of an epoch failed, slowing down\n");
1788		fallthrough;
1789
1790	case WO_BDEV_FLUSH:
1791	case WO_DRAIN_IO:
1792		conn_wait_active_ee_empty(connection);
1793		drbd_flush(connection);
1794
1795		if (atomic_read(&connection->current_epoch->epoch_size)) {
1796			epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1797			if (epoch)
1798				break;
1799		}
1800
1801		return 0;
 
 
 
 
 
 
1802	default:
1803		drbd_err(connection, "Strangeness in connection->write_ordering %d\n",
1804			 connection->resource->write_ordering);
1805		return -EIO;
1806	}
1807
1808	epoch->flags = 0;
1809	atomic_set(&epoch->epoch_size, 0);
1810	atomic_set(&epoch->active, 0);
1811
1812	spin_lock(&connection->epoch_lock);
1813	if (atomic_read(&connection->current_epoch->epoch_size)) {
1814		list_add(&epoch->list, &connection->current_epoch->list);
1815		connection->current_epoch = epoch;
1816		connection->epochs++;
1817	} else {
1818		/* The current_epoch got recycled while we allocated this one... */
1819		kfree(epoch);
1820	}
1821	spin_unlock(&connection->epoch_lock);
1822
1823	return 0;
1824}
1825
1826/* quick wrapper in case payload size != request_size (write same) */
1827static void drbd_csum_ee_size(struct crypto_shash *h,
1828			      struct drbd_peer_request *r, void *d,
1829			      unsigned int payload_size)
1830{
1831	unsigned int tmp = r->i.size;
1832	r->i.size = payload_size;
1833	drbd_csum_ee(h, r, d);
1834	r->i.size = tmp;
1835}
1836
1837/* used from receive_RSDataReply (recv_resync_read)
1838 * and from receive_Data.
1839 * data_size: actual payload ("data in")
1840 * 	for normal writes that is bi_size.
1841 * 	for discards, that is zero.
1842 * 	for write same, it is logical_block_size.
1843 * both trim and write same have the bi_size ("data len to be affected")
1844 * as extra argument in the packet header.
1845 */
1846static struct drbd_peer_request *
1847read_in_block(struct drbd_peer_device *peer_device, u64 id, sector_t sector,
1848	      struct packet_info *pi) __must_hold(local)
1849{
1850	struct drbd_device *device = peer_device->device;
1851	const sector_t capacity = get_capacity(device->vdisk);
1852	struct drbd_peer_request *peer_req;
1853	struct page *page;
1854	int digest_size, err;
1855	unsigned int data_size = pi->size, ds;
1856	void *dig_in = peer_device->connection->int_dig_in;
1857	void *dig_vv = peer_device->connection->int_dig_vv;
1858	unsigned long *data;
1859	struct p_trim *trim = (pi->cmd == P_TRIM) ? pi->data : NULL;
1860	struct p_trim *zeroes = (pi->cmd == P_ZEROES) ? pi->data : NULL;
1861
1862	digest_size = 0;
1863	if (!trim && peer_device->connection->peer_integrity_tfm) {
1864		digest_size = crypto_shash_digestsize(peer_device->connection->peer_integrity_tfm);
1865		/*
1866		 * FIXME: Receive the incoming digest into the receive buffer
1867		 *	  here, together with its struct p_data?
1868		 */
1869		err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size);
1870		if (err)
 
1871			return NULL;
1872		data_size -= digest_size;
1873	}
1874
1875	/* assume request_size == data_size, but special case trim. */
1876	ds = data_size;
1877	if (trim) {
1878		if (!expect(peer_device, data_size == 0))
1879			return NULL;
1880		ds = be32_to_cpu(trim->size);
1881	} else if (zeroes) {
1882		if (!expect(peer_device, data_size == 0))
1883			return NULL;
1884		ds = be32_to_cpu(zeroes->size);
1885	}
1886
1887	if (!expect(peer_device, IS_ALIGNED(ds, 512)))
1888		return NULL;
1889	if (trim || zeroes) {
1890		if (!expect(peer_device, ds <= (DRBD_MAX_BBIO_SECTORS << 9)))
1891			return NULL;
1892	} else if (!expect(peer_device, ds <= DRBD_MAX_BIO_SIZE))
1893		return NULL;
1894
1895	/* even though we trust out peer,
1896	 * we sometimes have to double check. */
1897	if (sector + (ds>>9) > capacity) {
1898		drbd_err(device, "request from peer beyond end of local disk: "
1899			"capacity: %llus < sector: %llus + size: %u\n",
1900			(unsigned long long)capacity,
1901			(unsigned long long)sector, ds);
1902		return NULL;
1903	}
1904
1905	/* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1906	 * "criss-cross" setup, that might cause write-out on some other DRBD,
1907	 * which in turn might block on the other node at this very place.  */
1908	peer_req = drbd_alloc_peer_req(peer_device, id, sector, ds, data_size, GFP_NOIO);
1909	if (!peer_req)
1910		return NULL;
1911
1912	peer_req->flags |= EE_WRITE;
1913	if (trim) {
1914		peer_req->flags |= EE_TRIM;
1915		return peer_req;
1916	}
1917	if (zeroes) {
1918		peer_req->flags |= EE_ZEROOUT;
1919		return peer_req;
1920	}
1921
1922	/* receive payload size bytes into page chain */
1923	ds = data_size;
1924	page = peer_req->pages;
1925	page_chain_for_each(page) {
1926		unsigned len = min_t(int, ds, PAGE_SIZE);
1927		data = kmap(page);
1928		err = drbd_recv_all_warn(peer_device->connection, data, len);
1929		if (drbd_insert_fault(device, DRBD_FAULT_RECEIVE)) {
1930			drbd_err(device, "Fault injection: Corrupting data on receive\n");
1931			data[0] = data[0] ^ (unsigned long)-1;
1932		}
1933		kunmap(page);
1934		if (err) {
1935			drbd_free_peer_req(device, peer_req);
 
 
 
1936			return NULL;
1937		}
1938		ds -= len;
1939	}
1940
1941	if (digest_size) {
1942		drbd_csum_ee_size(peer_device->connection->peer_integrity_tfm, peer_req, dig_vv, data_size);
1943		if (memcmp(dig_in, dig_vv, digest_size)) {
1944			drbd_err(device, "Digest integrity check FAILED: %llus +%u\n",
1945				(unsigned long long)sector, data_size);
1946			drbd_free_peer_req(device, peer_req);
 
 
1947			return NULL;
1948		}
1949	}
1950	device->recv_cnt += data_size >> 9;
1951	return peer_req;
1952}
1953
1954/* drbd_drain_block() just takes a data block
1955 * out of the socket input buffer, and discards it.
1956 */
1957static int drbd_drain_block(struct drbd_peer_device *peer_device, int data_size)
1958{
1959	struct page *page;
1960	int err = 0;
1961	void *data;
1962
1963	if (!data_size)
1964		return 0;
1965
1966	page = drbd_alloc_pages(peer_device, 1, 1);
1967
1968	data = kmap(page);
1969	while (data_size) {
1970		unsigned int len = min_t(int, data_size, PAGE_SIZE);
1971
1972		err = drbd_recv_all_warn(peer_device->connection, data, len);
1973		if (err)
 
 
 
1974			break;
1975		data_size -= len;
 
1976	}
1977	kunmap(page);
1978	drbd_free_pages(peer_device->device, page, 0);
1979	return err;
1980}
1981
1982static int recv_dless_read(struct drbd_peer_device *peer_device, struct drbd_request *req,
1983			   sector_t sector, int data_size)
1984{
1985	struct bio_vec bvec;
1986	struct bvec_iter iter;
1987	struct bio *bio;
1988	int digest_size, err, expect;
1989	void *dig_in = peer_device->connection->int_dig_in;
1990	void *dig_vv = peer_device->connection->int_dig_vv;
1991
1992	digest_size = 0;
1993	if (peer_device->connection->peer_integrity_tfm) {
1994		digest_size = crypto_shash_digestsize(peer_device->connection->peer_integrity_tfm);
1995		err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size);
1996		if (err)
1997			return err;
1998		data_size -= digest_size;
 
 
 
 
 
1999	}
2000
 
 
2001	/* optimistically update recv_cnt.  if receiving fails below,
2002	 * we disconnect anyways, and counters will be reset. */
2003	peer_device->device->recv_cnt += data_size>>9;
2004
2005	bio = req->master_bio;
2006	D_ASSERT(peer_device->device, sector == bio->bi_iter.bi_sector);
2007
2008	bio_for_each_segment(bvec, bio, iter) {
2009		void *mapped = bvec_kmap_local(&bvec);
2010		expect = min_t(int, data_size, bvec.bv_len);
2011		err = drbd_recv_all_warn(peer_device->connection, mapped, expect);
2012		kunmap_local(mapped);
2013		if (err)
2014			return err;
2015		data_size -= expect;
 
 
 
 
 
 
2016	}
2017
2018	if (digest_size) {
2019		drbd_csum_bio(peer_device->connection->peer_integrity_tfm, bio, dig_vv);
2020		if (memcmp(dig_in, dig_vv, digest_size)) {
2021			drbd_err(peer_device, "Digest integrity check FAILED. Broken NICs?\n");
2022			return -EINVAL;
2023		}
2024	}
2025
2026	D_ASSERT(peer_device->device, data_size == 0);
2027	return 0;
2028}
2029
2030/*
2031 * e_end_resync_block() is called in ack_sender context via
2032 * drbd_finish_peer_reqs().
2033 */
2034static int e_end_resync_block(struct drbd_work *w, int unused)
2035{
2036	struct drbd_peer_request *peer_req =
2037		container_of(w, struct drbd_peer_request, w);
2038	struct drbd_peer_device *peer_device = peer_req->peer_device;
2039	struct drbd_device *device = peer_device->device;
2040	sector_t sector = peer_req->i.sector;
2041	int err;
2042
2043	D_ASSERT(device, drbd_interval_empty(&peer_req->i));
2044
2045	if (likely((peer_req->flags & EE_WAS_ERROR) == 0)) {
2046		drbd_set_in_sync(peer_device, sector, peer_req->i.size);
2047		err = drbd_send_ack(peer_device, P_RS_WRITE_ACK, peer_req);
2048	} else {
2049		/* Record failure to sync */
2050		drbd_rs_failed_io(peer_device, sector, peer_req->i.size);
2051
2052		err  = drbd_send_ack(peer_device, P_NEG_ACK, peer_req);
2053	}
2054	dec_unacked(device);
2055
2056	return err;
2057}
2058
2059static int recv_resync_read(struct drbd_peer_device *peer_device, sector_t sector,
2060			    struct packet_info *pi) __releases(local)
2061{
2062	struct drbd_device *device = peer_device->device;
2063	struct drbd_peer_request *peer_req;
2064
2065	peer_req = read_in_block(peer_device, ID_SYNCER, sector, pi);
2066	if (!peer_req)
2067		goto fail;
2068
2069	dec_rs_pending(peer_device);
2070
2071	inc_unacked(device);
2072	/* corresponding dec_unacked() in e_end_resync_block()
2073	 * respective _drbd_clear_done_ee */
2074
2075	peer_req->w.cb = e_end_resync_block;
2076	peer_req->opf = REQ_OP_WRITE;
2077	peer_req->submit_jif = jiffies;
2078
2079	spin_lock_irq(&device->resource->req_lock);
2080	list_add_tail(&peer_req->w.list, &device->sync_ee);
2081	spin_unlock_irq(&device->resource->req_lock);
2082
2083	atomic_add(pi->size >> 9, &device->rs_sect_ev);
2084	if (drbd_submit_peer_request(peer_req) == 0)
2085		return 0;
2086
2087	/* don't care for the reason here */
2088	drbd_err(device, "submit failed, triggering re-connect\n");
2089	spin_lock_irq(&device->resource->req_lock);
2090	list_del(&peer_req->w.list);
2091	spin_unlock_irq(&device->resource->req_lock);
2092
2093	drbd_free_peer_req(device, peer_req);
2094fail:
2095	put_ldev(device);
2096	return -EIO;
2097}
2098
2099static struct drbd_request *
2100find_request(struct drbd_device *device, struct rb_root *root, u64 id,
2101	     sector_t sector, bool missing_ok, const char *func)
2102{
2103	struct drbd_request *req;
2104
2105	/* Request object according to our peer */
2106	req = (struct drbd_request *)(unsigned long)id;
2107	if (drbd_contains_interval(root, sector, &req->i) && req->i.local)
2108		return req;
2109	if (!missing_ok) {
2110		drbd_err(device, "%s: failed to find request 0x%lx, sector %llus\n", func,
2111			(unsigned long)id, (unsigned long long)sector);
2112	}
2113	return NULL;
2114}
2115
2116static int receive_DataReply(struct drbd_connection *connection, struct packet_info *pi)
2117{
2118	struct drbd_peer_device *peer_device;
2119	struct drbd_device *device;
2120	struct drbd_request *req;
2121	sector_t sector;
2122	int err;
2123	struct p_data *p = pi->data;
2124
2125	peer_device = conn_peer_device(connection, pi->vnr);
2126	if (!peer_device)
2127		return -EIO;
2128	device = peer_device->device;
2129
2130	sector = be64_to_cpu(p->sector);
 
 
 
 
 
 
2131
2132	spin_lock_irq(&device->resource->req_lock);
2133	req = find_request(device, &device->read_requests, p->block_id, sector, false, __func__);
2134	spin_unlock_irq(&device->resource->req_lock);
2135	if (unlikely(!req))
2136		return -EIO;
2137
2138	err = recv_dless_read(peer_device, req, sector, pi->size);
2139	if (!err)
2140		req_mod(req, DATA_RECEIVED, peer_device);
2141	/* else: nothing. handled from drbd_disconnect...
2142	 * I don't think we may complete this just yet
2143	 * in case we are "on-disconnect: freeze" */
2144
2145	return err;
2146}
2147
2148static int receive_RSDataReply(struct drbd_connection *connection, struct packet_info *pi)
2149{
2150	struct drbd_peer_device *peer_device;
2151	struct drbd_device *device;
2152	sector_t sector;
2153	int err;
2154	struct p_data *p = pi->data;
2155
2156	peer_device = conn_peer_device(connection, pi->vnr);
2157	if (!peer_device)
2158		return -EIO;
2159	device = peer_device->device;
2160
2161	sector = be64_to_cpu(p->sector);
2162	D_ASSERT(device, p->block_id == ID_SYNCER);
2163
2164	if (get_ldev(device)) {
2165		/* data is submitted to disk within recv_resync_read.
2166		 * corresponding put_ldev done below on error,
2167		 * or in drbd_peer_request_endio. */
2168		err = recv_resync_read(peer_device, sector, pi);
2169	} else {
2170		if (drbd_ratelimit())
2171			drbd_err(device, "Can not write resync data to local disk.\n");
2172
2173		err = drbd_drain_block(peer_device, pi->size);
2174
2175		drbd_send_ack_dp(peer_device, P_NEG_ACK, p, pi->size);
2176	}
2177
2178	atomic_add(pi->size >> 9, &device->rs_sect_in);
2179
2180	return err;
2181}
2182
2183static void restart_conflicting_writes(struct drbd_device *device,
2184				       sector_t sector, int size)
2185{
2186	struct drbd_interval *i;
2187	struct drbd_request *req;
2188
2189	drbd_for_each_overlap(i, &device->write_requests, sector, size) {
2190		if (!i->local)
2191			continue;
2192		req = container_of(i, struct drbd_request, i);
2193		if (req->rq_state & RQ_LOCAL_PENDING ||
2194		    !(req->rq_state & RQ_POSTPONED))
2195			continue;
2196		/* as it is RQ_POSTPONED, this will cause it to
2197		 * be queued on the retry workqueue. */
2198		__req_mod(req, CONFLICT_RESOLVED, NULL, NULL);
2199	}
2200}
2201
2202/*
2203 * e_end_block() is called in ack_sender context via drbd_finish_peer_reqs().
2204 */
2205static int e_end_block(struct drbd_work *w, int cancel)
2206{
2207	struct drbd_peer_request *peer_req =
2208		container_of(w, struct drbd_peer_request, w);
2209	struct drbd_peer_device *peer_device = peer_req->peer_device;
2210	struct drbd_device *device = peer_device->device;
2211	sector_t sector = peer_req->i.sector;
2212	int err = 0, pcmd;
2213
2214	if (peer_req->flags & EE_SEND_WRITE_ACK) {
2215		if (likely((peer_req->flags & EE_WAS_ERROR) == 0)) {
2216			pcmd = (device->state.conn >= C_SYNC_SOURCE &&
2217				device->state.conn <= C_PAUSED_SYNC_T &&
2218				peer_req->flags & EE_MAY_SET_IN_SYNC) ?
2219				P_RS_WRITE_ACK : P_WRITE_ACK;
2220			err = drbd_send_ack(peer_device, pcmd, peer_req);
2221			if (pcmd == P_RS_WRITE_ACK)
2222				drbd_set_in_sync(peer_device, sector, peer_req->i.size);
2223		} else {
2224			err = drbd_send_ack(peer_device, P_NEG_ACK, peer_req);
2225			/* we expect it to be marked out of sync anyways...
2226			 * maybe assert this?  */
2227		}
2228		dec_unacked(device);
2229	}
2230
2231	/* we delete from the conflict detection hash _after_ we sent out the
2232	 * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right.  */
2233	if (peer_req->flags & EE_IN_INTERVAL_TREE) {
2234		spin_lock_irq(&device->resource->req_lock);
2235		D_ASSERT(device, !drbd_interval_empty(&peer_req->i));
2236		drbd_remove_epoch_entry_interval(device, peer_req);
2237		if (peer_req->flags & EE_RESTART_REQUESTS)
2238			restart_conflicting_writes(device, sector, peer_req->i.size);
2239		spin_unlock_irq(&device->resource->req_lock);
2240	} else
2241		D_ASSERT(device, drbd_interval_empty(&peer_req->i));
2242
2243	drbd_may_finish_epoch(peer_device->connection, peer_req->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
2244
2245	return err;
2246}
2247
2248static int e_send_ack(struct drbd_work *w, enum drbd_packet ack)
2249{
2250	struct drbd_peer_request *peer_req =
2251		container_of(w, struct drbd_peer_request, w);
2252	struct drbd_peer_device *peer_device = peer_req->peer_device;
2253	int err;
2254
2255	err = drbd_send_ack(peer_device, ack, peer_req);
2256	dec_unacked(peer_device->device);
2257
2258	return err;
2259}
2260
2261static int e_send_superseded(struct drbd_work *w, int unused)
2262{
2263	return e_send_ack(w, P_SUPERSEDED);
2264}
2265
2266static int e_send_retry_write(struct drbd_work *w, int unused)
2267{
2268	struct drbd_peer_request *peer_req =
2269		container_of(w, struct drbd_peer_request, w);
2270	struct drbd_connection *connection = peer_req->peer_device->connection;
2271
2272	return e_send_ack(w, connection->agreed_pro_version >= 100 ?
2273			     P_RETRY_WRITE : P_SUPERSEDED);
2274}
2275
2276static bool seq_greater(u32 a, u32 b)
2277{
2278	/*
2279	 * We assume 32-bit wrap-around here.
2280	 * For 24-bit wrap-around, we would have to shift:
2281	 *  a <<= 8; b <<= 8;
2282	 */
2283	return (s32)a - (s32)b > 0;
2284}
2285
2286static u32 seq_max(u32 a, u32 b)
2287{
2288	return seq_greater(a, b) ? a : b;
2289}
2290
2291static void update_peer_seq(struct drbd_peer_device *peer_device, unsigned int peer_seq)
2292{
2293	struct drbd_device *device = peer_device->device;
2294	unsigned int newest_peer_seq;
2295
2296	if (test_bit(RESOLVE_CONFLICTS, &peer_device->connection->flags)) {
2297		spin_lock(&device->peer_seq_lock);
2298		newest_peer_seq = seq_max(device->peer_seq, peer_seq);
2299		device->peer_seq = newest_peer_seq;
2300		spin_unlock(&device->peer_seq_lock);
2301		/* wake up only if we actually changed device->peer_seq */
2302		if (peer_seq == newest_peer_seq)
2303			wake_up(&device->seq_wait);
2304	}
2305}
2306
2307static inline int overlaps(sector_t s1, int l1, sector_t s2, int l2)
2308{
2309	return !((s1 + (l1>>9) <= s2) || (s1 >= s2 + (l2>>9)));
2310}
2311
2312/* maybe change sync_ee into interval trees as well? */
2313static bool overlapping_resync_write(struct drbd_device *device, struct drbd_peer_request *peer_req)
2314{
2315	struct drbd_peer_request *rs_req;
2316	bool rv = false;
2317
2318	spin_lock_irq(&device->resource->req_lock);
2319	list_for_each_entry(rs_req, &device->sync_ee, w.list) {
2320		if (overlaps(peer_req->i.sector, peer_req->i.size,
2321			     rs_req->i.sector, rs_req->i.size)) {
2322			rv = true;
2323			break;
2324		}
2325	}
2326	spin_unlock_irq(&device->resource->req_lock);
2327
2328	return rv;
2329}
2330
2331/* Called from receive_Data.
2332 * Synchronize packets on sock with packets on msock.
2333 *
2334 * This is here so even when a P_DATA packet traveling via sock overtook an Ack
2335 * packet traveling on msock, they are still processed in the order they have
2336 * been sent.
2337 *
2338 * Note: we don't care for Ack packets overtaking P_DATA packets.
2339 *
2340 * In case packet_seq is larger than device->peer_seq number, there are
2341 * outstanding packets on the msock. We wait for them to arrive.
2342 * In case we are the logically next packet, we update device->peer_seq
2343 * ourselves. Correctly handles 32bit wrap around.
2344 *
2345 * Assume we have a 10 GBit connection, that is about 1<<30 byte per second,
2346 * about 1<<21 sectors per second. So "worst" case, we have 1<<3 == 8 seconds
2347 * for the 24bit wrap (historical atomic_t guarantee on some archs), and we have
2348 * 1<<9 == 512 seconds aka ages for the 32bit wrap around...
2349 *
2350 * returns 0 if we may process the packet,
2351 * -ERESTARTSYS if we were interrupted (by disconnect signal). */
2352static int wait_for_and_update_peer_seq(struct drbd_peer_device *peer_device, const u32 peer_seq)
2353{
2354	struct drbd_device *device = peer_device->device;
2355	DEFINE_WAIT(wait);
 
2356	long timeout;
2357	int ret = 0, tp;
2358
2359	if (!test_bit(RESOLVE_CONFLICTS, &peer_device->connection->flags))
2360		return 0;
2361
2362	spin_lock(&device->peer_seq_lock);
2363	for (;;) {
2364		if (!seq_greater(peer_seq - 1, device->peer_seq)) {
2365			device->peer_seq = seq_max(device->peer_seq, peer_seq);
2366			break;
2367		}
2368
2369		if (signal_pending(current)) {
2370			ret = -ERESTARTSYS;
2371			break;
2372		}
2373
2374		rcu_read_lock();
2375		tp = rcu_dereference(peer_device->connection->net_conf)->two_primaries;
2376		rcu_read_unlock();
2377
2378		if (!tp)
2379			break;
2380
2381		/* Only need to wait if two_primaries is enabled */
2382		prepare_to_wait(&device->seq_wait, &wait, TASK_INTERRUPTIBLE);
2383		spin_unlock(&device->peer_seq_lock);
2384		rcu_read_lock();
2385		timeout = rcu_dereference(peer_device->connection->net_conf)->ping_timeo*HZ/10;
2386		rcu_read_unlock();
2387		timeout = schedule_timeout(timeout);
2388		spin_lock(&device->peer_seq_lock);
2389		if (!timeout) {
2390			ret = -ETIMEDOUT;
2391			drbd_err(device, "Timed out waiting for missing ack packets; disconnecting\n");
2392			break;
2393		}
2394	}
2395	spin_unlock(&device->peer_seq_lock);
2396	finish_wait(&device->seq_wait, &wait);
 
 
2397	return ret;
2398}
2399
2400static enum req_op wire_flags_to_bio_op(u32 dpf)
 
 
 
2401{
2402	if (dpf & DP_ZEROES)
2403		return REQ_OP_WRITE_ZEROES;
2404	if (dpf & DP_DISCARD)
2405		return REQ_OP_DISCARD;
2406	else
2407		return REQ_OP_WRITE;
2408}
2409
2410/* see also bio_flags_to_wire() */
2411static blk_opf_t wire_flags_to_bio(struct drbd_connection *connection, u32 dpf)
2412{
2413	return wire_flags_to_bio_op(dpf) |
2414		(dpf & DP_RW_SYNC ? REQ_SYNC : 0) |
2415		(dpf & DP_FUA ? REQ_FUA : 0) |
2416		(dpf & DP_FLUSH ? REQ_PREFLUSH : 0);
2417}
2418
2419static void fail_postponed_requests(struct drbd_device *device, sector_t sector,
2420				    unsigned int size)
2421{
2422	struct drbd_peer_device *peer_device = first_peer_device(device);
2423	struct drbd_interval *i;
 
 
 
 
 
2424
2425    repeat:
2426	drbd_for_each_overlap(i, &device->write_requests, sector, size) {
2427		struct drbd_request *req;
2428		struct bio_and_error m;
2429
2430		if (!i->local)
2431			continue;
2432		req = container_of(i, struct drbd_request, i);
2433		if (!(req->rq_state & RQ_POSTPONED))
2434			continue;
2435		req->rq_state &= ~RQ_POSTPONED;
2436		__req_mod(req, NEG_ACKED, peer_device, &m);
2437		spin_unlock_irq(&device->resource->req_lock);
2438		if (m.bio)
2439			complete_master_bio(device, &m);
2440		spin_lock_irq(&device->resource->req_lock);
2441		goto repeat;
2442	}
2443}
2444
2445static int handle_write_conflicts(struct drbd_device *device,
2446				  struct drbd_peer_request *peer_req)
2447{
2448	struct drbd_connection *connection = peer_req->peer_device->connection;
2449	bool resolve_conflicts = test_bit(RESOLVE_CONFLICTS, &connection->flags);
2450	sector_t sector = peer_req->i.sector;
2451	const unsigned int size = peer_req->i.size;
2452	struct drbd_interval *i;
2453	bool equal;
2454	int err;
2455
2456	/*
2457	 * Inserting the peer request into the write_requests tree will prevent
2458	 * new conflicting local requests from being added.
2459	 */
2460	drbd_insert_interval(&device->write_requests, &peer_req->i);
2461
2462    repeat:
2463	drbd_for_each_overlap(i, &device->write_requests, sector, size) {
2464		if (i == &peer_req->i)
2465			continue;
2466		if (i->completed)
2467			continue;
2468
2469		if (!i->local) {
2470			/*
2471			 * Our peer has sent a conflicting remote request; this
2472			 * should not happen in a two-node setup.  Wait for the
2473			 * earlier peer request to complete.
2474			 */
2475			err = drbd_wait_misc(device, i);
2476			if (err)
2477				goto out;
2478			goto repeat;
2479		}
2480
2481		equal = i->sector == sector && i->size == size;
2482		if (resolve_conflicts) {
2483			/*
2484			 * If the peer request is fully contained within the
2485			 * overlapping request, it can be considered overwritten
2486			 * and thus superseded; otherwise, it will be retried
2487			 * once all overlapping requests have completed.
2488			 */
2489			bool superseded = i->sector <= sector && i->sector +
2490				       (i->size >> 9) >= sector + (size >> 9);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2491
2492			if (!equal)
2493				drbd_alert(device, "Concurrent writes detected: "
2494					       "local=%llus +%u, remote=%llus +%u, "
2495					       "assuming %s came first\n",
2496					  (unsigned long long)i->sector, i->size,
2497					  (unsigned long long)sector, size,
2498					  superseded ? "local" : "remote");
2499
2500			peer_req->w.cb = superseded ? e_send_superseded :
2501						   e_send_retry_write;
2502			list_add_tail(&peer_req->w.list, &device->done_ee);
2503			queue_work(connection->ack_sender, &peer_req->peer_device->send_acks_work);
2504
2505			err = -ENOENT;
2506			goto out;
2507		} else {
2508			struct drbd_request *req =
2509				container_of(i, struct drbd_request, i);
2510
2511			if (!equal)
2512				drbd_alert(device, "Concurrent writes detected: "
2513					       "local=%llus +%u, remote=%llus +%u\n",
2514					  (unsigned long long)i->sector, i->size,
2515					  (unsigned long long)sector, size);
2516
2517			if (req->rq_state & RQ_LOCAL_PENDING ||
2518			    !(req->rq_state & RQ_POSTPONED)) {
2519				/*
2520				 * Wait for the node with the discard flag to
2521				 * decide if this request has been superseded
2522				 * or needs to be retried.
2523				 * Requests that have been superseded will
2524				 * disappear from the write_requests tree.
2525				 *
2526				 * In addition, wait for the conflicting
2527				 * request to finish locally before submitting
2528				 * the conflicting peer request.
2529				 */
2530				err = drbd_wait_misc(device, &req->i);
2531				if (err) {
2532					_conn_request_state(connection, NS(conn, C_TIMEOUT), CS_HARD);
2533					fail_postponed_requests(device, sector, size);
2534					goto out;
2535				}
2536				goto repeat;
2537			}
2538			/*
2539			 * Remember to restart the conflicting requests after
2540			 * the new peer request has completed.
2541			 */
2542			peer_req->flags |= EE_RESTART_REQUESTS;
2543		}
2544	}
2545	err = 0;
2546
2547    out:
2548	if (err)
2549		drbd_remove_epoch_entry_interval(device, peer_req);
2550	return err;
2551}
 
 
 
 
 
 
 
 
 
 
 
 
 
2552
2553/* mirrored write */
2554static int receive_Data(struct drbd_connection *connection, struct packet_info *pi)
2555{
2556	struct drbd_peer_device *peer_device;
2557	struct drbd_device *device;
2558	struct net_conf *nc;
2559	sector_t sector;
2560	struct drbd_peer_request *peer_req;
2561	struct p_data *p = pi->data;
2562	u32 peer_seq = be32_to_cpu(p->seq_num);
2563	u32 dp_flags;
2564	int err, tp;
2565
2566	peer_device = conn_peer_device(connection, pi->vnr);
2567	if (!peer_device)
2568		return -EIO;
2569	device = peer_device->device;
2570
2571	if (!get_ldev(device)) {
2572		int err2;
 
2573
2574		err = wait_for_and_update_peer_seq(peer_device, peer_seq);
2575		drbd_send_ack_dp(peer_device, P_NEG_ACK, p, pi->size);
2576		atomic_inc(&connection->current_epoch->epoch_size);
2577		err2 = drbd_drain_block(peer_device, pi->size);
2578		if (!err)
2579			err = err2;
2580		return err;
2581	}
2582
2583	/*
2584	 * Corresponding put_ldev done either below (on various errors), or in
2585	 * drbd_peer_request_endio, if we successfully submit the data at the
2586	 * end of this function.
2587	 */
2588
2589	sector = be64_to_cpu(p->sector);
2590	peer_req = read_in_block(peer_device, p->block_id, sector, pi);
2591	if (!peer_req) {
2592		put_ldev(device);
2593		return -EIO;
2594	}
2595
2596	peer_req->w.cb = e_end_block;
2597	peer_req->submit_jif = jiffies;
2598	peer_req->flags |= EE_APPLICATION;
2599
2600	dp_flags = be32_to_cpu(p->dp_flags);
2601	peer_req->opf = wire_flags_to_bio(connection, dp_flags);
2602	if (pi->cmd == P_TRIM) {
2603		D_ASSERT(peer_device, peer_req->i.size > 0);
2604		D_ASSERT(peer_device, peer_req_op(peer_req) == REQ_OP_DISCARD);
2605		D_ASSERT(peer_device, peer_req->pages == NULL);
2606		/* need to play safe: an older DRBD sender
2607		 * may mean zero-out while sending P_TRIM. */
2608		if (0 == (connection->agreed_features & DRBD_FF_WZEROES))
2609			peer_req->flags |= EE_ZEROOUT;
2610	} else if (pi->cmd == P_ZEROES) {
2611		D_ASSERT(peer_device, peer_req->i.size > 0);
2612		D_ASSERT(peer_device, peer_req_op(peer_req) == REQ_OP_WRITE_ZEROES);
2613		D_ASSERT(peer_device, peer_req->pages == NULL);
2614		/* Do (not) pass down BLKDEV_ZERO_NOUNMAP? */
2615		if (dp_flags & DP_DISCARD)
2616			peer_req->flags |= EE_TRIM;
2617	} else if (peer_req->pages == NULL) {
2618		D_ASSERT(device, peer_req->i.size == 0);
2619		D_ASSERT(device, dp_flags & DP_FLUSH);
2620	}
2621
2622	if (dp_flags & DP_MAY_SET_IN_SYNC)
2623		peer_req->flags |= EE_MAY_SET_IN_SYNC;
2624
2625	spin_lock(&connection->epoch_lock);
2626	peer_req->epoch = connection->current_epoch;
2627	atomic_inc(&peer_req->epoch->epoch_size);
2628	atomic_inc(&peer_req->epoch->active);
2629	spin_unlock(&connection->epoch_lock);
2630
2631	rcu_read_lock();
2632	nc = rcu_dereference(peer_device->connection->net_conf);
2633	tp = nc->two_primaries;
2634	if (peer_device->connection->agreed_pro_version < 100) {
2635		switch (nc->wire_protocol) {
2636		case DRBD_PROT_C:
2637			dp_flags |= DP_SEND_WRITE_ACK;
2638			break;
2639		case DRBD_PROT_B:
2640			dp_flags |= DP_SEND_RECEIVE_ACK;
2641			break;
2642		}
2643	}
2644	rcu_read_unlock();
2645
2646	if (dp_flags & DP_SEND_WRITE_ACK) {
2647		peer_req->flags |= EE_SEND_WRITE_ACK;
2648		inc_unacked(device);
2649		/* corresponding dec_unacked() in e_end_block()
2650		 * respective _drbd_clear_done_ee */
2651	}
2652
2653	if (dp_flags & DP_SEND_RECEIVE_ACK) {
2654		/* I really don't like it that the receiver thread
2655		 * sends on the msock, but anyways */
2656		drbd_send_ack(peer_device, P_RECV_ACK, peer_req);
 
 
 
 
2657	}
2658
2659	if (tp) {
2660		/* two primaries implies protocol C */
2661		D_ASSERT(device, dp_flags & DP_SEND_WRITE_ACK);
2662		peer_req->flags |= EE_IN_INTERVAL_TREE;
2663		err = wait_for_and_update_peer_seq(peer_device, peer_seq);
2664		if (err)
2665			goto out_interrupted;
2666		spin_lock_irq(&device->resource->req_lock);
2667		err = handle_write_conflicts(device, peer_req);
2668		if (err) {
2669			spin_unlock_irq(&device->resource->req_lock);
2670			if (err == -ENOENT) {
2671				put_ldev(device);
2672				return 0;
2673			}
2674			goto out_interrupted;
2675		}
2676	} else {
2677		update_peer_seq(peer_device, peer_seq);
2678		spin_lock_irq(&device->resource->req_lock);
2679	}
2680	/* TRIM and is processed synchronously,
2681	 * we wait for all pending requests, respectively wait for
2682	 * active_ee to become empty in drbd_submit_peer_request();
2683	 * better not add ourselves here. */
2684	if ((peer_req->flags & (EE_TRIM | EE_ZEROOUT)) == 0)
2685		list_add_tail(&peer_req->w.list, &device->active_ee);
2686	spin_unlock_irq(&device->resource->req_lock);
2687
2688	if (device->state.conn == C_SYNC_TARGET)
2689		wait_event(device->ee_wait, !overlapping_resync_write(device, peer_req));
2690
2691	if (device->state.pdsk < D_INCONSISTENT) {
2692		/* In case we have the only disk of the cluster, */
2693		drbd_set_out_of_sync(peer_device, peer_req->i.sector, peer_req->i.size);
2694		peer_req->flags &= ~EE_MAY_SET_IN_SYNC;
2695		drbd_al_begin_io(device, &peer_req->i);
2696		peer_req->flags |= EE_CALL_AL_COMPLETE_IO;
2697	}
2698
2699	err = drbd_submit_peer_request(peer_req);
2700	if (!err)
2701		return 0;
2702
2703	/* don't care for the reason here */
2704	drbd_err(device, "submit failed, triggering re-connect\n");
2705	spin_lock_irq(&device->resource->req_lock);
2706	list_del(&peer_req->w.list);
2707	drbd_remove_epoch_entry_interval(device, peer_req);
2708	spin_unlock_irq(&device->resource->req_lock);
2709	if (peer_req->flags & EE_CALL_AL_COMPLETE_IO) {
2710		peer_req->flags &= ~EE_CALL_AL_COMPLETE_IO;
2711		drbd_al_complete_io(device, &peer_req->i);
2712	}
2713
2714out_interrupted:
2715	drbd_may_finish_epoch(connection, peer_req->epoch, EV_PUT | EV_CLEANUP);
2716	put_ldev(device);
2717	drbd_free_peer_req(device, peer_req);
2718	return err;
2719}
2720
2721/* We may throttle resync, if the lower device seems to be busy,
2722 * and current sync rate is above c_min_rate.
2723 *
2724 * To decide whether or not the lower device is busy, we use a scheme similar
2725 * to MD RAID is_mddev_idle(): if the partition stats reveal "significant"
2726 * (more than 64 sectors) of activity we cannot account for with our own resync
2727 * activity, it obviously is "busy".
2728 *
2729 * The current sync rate used here uses only the most recent two step marks,
2730 * to have a short time average so we can react faster.
2731 */
2732bool drbd_rs_should_slow_down(struct drbd_peer_device *peer_device, sector_t sector,
2733		bool throttle_if_app_is_waiting)
2734{
2735	struct drbd_device *device = peer_device->device;
 
2736	struct lc_element *tmp;
2737	bool throttle = drbd_rs_c_min_rate_throttle(device);
 
2738
2739	if (!throttle || throttle_if_app_is_waiting)
2740		return throttle;
 
2741
2742	spin_lock_irq(&device->al_lock);
2743	tmp = lc_find(device->resync, BM_SECT_TO_EXT(sector));
2744	if (tmp) {
2745		struct bm_extent *bm_ext = lc_entry(tmp, struct bm_extent, lce);
2746		if (test_bit(BME_PRIORITY, &bm_ext->flags))
2747			throttle = false;
2748		/* Do not slow down if app IO is already waiting for this extent,
2749		 * and our progress is necessary for application IO to complete. */
 
2750	}
2751	spin_unlock_irq(&device->al_lock);
2752
2753	return throttle;
2754}
2755
2756bool drbd_rs_c_min_rate_throttle(struct drbd_device *device)
2757{
2758	struct gendisk *disk = device->ldev->backing_bdev->bd_disk;
2759	unsigned long db, dt, dbdt;
2760	unsigned int c_min_rate;
2761	int curr_events;
2762
2763	rcu_read_lock();
2764	c_min_rate = rcu_dereference(device->ldev->disk_conf)->c_min_rate;
2765	rcu_read_unlock();
2766
2767	/* feature disabled? */
2768	if (c_min_rate == 0)
2769		return false;
2770
2771	curr_events = (int)part_stat_read_accum(disk->part0, sectors) -
2772			atomic_read(&device->rs_sect_ev);
2773
2774	if (atomic_read(&device->ap_actlog_cnt)
2775	    || curr_events - device->rs_last_events > 64) {
2776		unsigned long rs_left;
2777		int i;
2778
2779		device->rs_last_events = curr_events;
2780
2781		/* sync speed average over the last 2*DRBD_SYNC_MARK_STEP,
2782		 * approx. */
2783		i = (device->rs_last_mark + DRBD_SYNC_MARKS-1) % DRBD_SYNC_MARKS;
2784
2785		if (device->state.conn == C_VERIFY_S || device->state.conn == C_VERIFY_T)
2786			rs_left = device->ov_left;
2787		else
2788			rs_left = drbd_bm_total_weight(device) - device->rs_failed;
2789
2790		dt = ((long)jiffies - (long)device->rs_mark_time[i]) / HZ;
2791		if (!dt)
2792			dt++;
2793		db = device->rs_mark_left[i] - rs_left;
2794		dbdt = Bit2KB(db/dt);
2795
2796		if (dbdt > c_min_rate)
2797			return true;
2798	}
2799	return false;
2800}
2801
2802static int receive_DataRequest(struct drbd_connection *connection, struct packet_info *pi)
 
2803{
2804	struct drbd_peer_device *peer_device;
2805	struct drbd_device *device;
2806	sector_t sector;
2807	sector_t capacity;
2808	struct drbd_peer_request *peer_req;
2809	struct digest_info *di = NULL;
2810	int size, verb;
2811	struct p_block_req *p =	pi->data;
2812
2813	peer_device = conn_peer_device(connection, pi->vnr);
2814	if (!peer_device)
2815		return -EIO;
2816	device = peer_device->device;
2817	capacity = get_capacity(device->vdisk);
2818
2819	sector = be64_to_cpu(p->sector);
2820	size   = be32_to_cpu(p->blksize);
2821
2822	if (size <= 0 || !IS_ALIGNED(size, 512) || size > DRBD_MAX_BIO_SIZE) {
2823		drbd_err(device, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2824				(unsigned long long)sector, size);
2825		return -EINVAL;
2826	}
2827	if (sector + (size>>9) > capacity) {
2828		drbd_err(device, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2829				(unsigned long long)sector, size);
2830		return -EINVAL;
2831	}
2832
2833	if (!get_ldev_if_state(device, D_UP_TO_DATE)) {
2834		verb = 1;
2835		switch (pi->cmd) {
2836		case P_DATA_REQUEST:
2837			drbd_send_ack_rp(peer_device, P_NEG_DREPLY, p);
2838			break;
2839		case P_RS_THIN_REQ:
2840		case P_RS_DATA_REQUEST:
2841		case P_CSUM_RS_REQUEST:
2842		case P_OV_REQUEST:
2843			drbd_send_ack_rp(peer_device, P_NEG_RS_DREPLY , p);
2844			break;
2845		case P_OV_REPLY:
2846			verb = 0;
2847			dec_rs_pending(peer_device);
2848			drbd_send_ack_ex(peer_device, P_OV_RESULT, sector, size, ID_IN_SYNC);
2849			break;
2850		default:
2851			BUG();
 
2852		}
2853		if (verb && drbd_ratelimit())
2854			drbd_err(device, "Can not satisfy peer's read request, "
2855			    "no local data.\n");
2856
2857		/* drain possibly payload */
2858		return drbd_drain_block(peer_device, pi->size);
2859	}
2860
2861	/* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
2862	 * "criss-cross" setup, that might cause write-out on some other DRBD,
2863	 * which in turn might block on the other node at this very place.  */
2864	peer_req = drbd_alloc_peer_req(peer_device, p->block_id, sector, size,
2865			size, GFP_NOIO);
2866	if (!peer_req) {
2867		put_ldev(device);
2868		return -ENOMEM;
2869	}
2870	peer_req->opf = REQ_OP_READ;
2871
2872	switch (pi->cmd) {
2873	case P_DATA_REQUEST:
2874		peer_req->w.cb = w_e_end_data_req;
 
2875		/* application IO, don't drbd_rs_begin_io */
2876		peer_req->flags |= EE_APPLICATION;
2877		goto submit;
2878
2879	case P_RS_THIN_REQ:
2880		/* If at some point in the future we have a smart way to
2881		   find out if this data block is completely deallocated,
2882		   then we would do something smarter here than reading
2883		   the block... */
2884		peer_req->flags |= EE_RS_THIN_REQ;
2885		fallthrough;
2886	case P_RS_DATA_REQUEST:
2887		peer_req->w.cb = w_e_end_rsdata_req;
 
2888		/* used in the sector offset progress display */
2889		device->bm_resync_fo = BM_SECT_TO_BIT(sector);
2890		break;
2891
2892	case P_OV_REPLY:
2893	case P_CSUM_RS_REQUEST:
2894		di = kmalloc(sizeof(*di) + pi->size, GFP_NOIO);
 
2895		if (!di)
2896			goto out_free_e;
2897
2898		di->digest_size = pi->size;
2899		di->digest = (((char *)di)+sizeof(struct digest_info));
2900
2901		peer_req->digest = di;
2902		peer_req->flags |= EE_HAS_DIGEST;
2903
2904		if (drbd_recv_all(peer_device->connection, di->digest, pi->size))
2905			goto out_free_e;
2906
2907		if (pi->cmd == P_CSUM_RS_REQUEST) {
2908			D_ASSERT(device, peer_device->connection->agreed_pro_version >= 89);
2909			peer_req->w.cb = w_e_end_csum_rs_req;
2910			/* used in the sector offset progress display */
2911			device->bm_resync_fo = BM_SECT_TO_BIT(sector);
2912			/* remember to report stats in drbd_resync_finished */
2913			device->use_csums = true;
2914		} else if (pi->cmd == P_OV_REPLY) {
2915			/* track progress, we may need to throttle */
2916			atomic_add(size >> 9, &device->rs_sect_in);
2917			peer_req->w.cb = w_e_end_ov_reply;
2918			dec_rs_pending(peer_device);
2919			/* drbd_rs_begin_io done when we sent this request,
2920			 * but accounting still needs to be done. */
2921			goto submit_for_resync;
2922		}
2923		break;
2924
2925	case P_OV_REQUEST:
2926		if (device->ov_start_sector == ~(sector_t)0 &&
2927		    peer_device->connection->agreed_pro_version >= 90) {
2928			unsigned long now = jiffies;
2929			int i;
2930			device->ov_start_sector = sector;
2931			device->ov_position = sector;
2932			device->ov_left = drbd_bm_bits(device) - BM_SECT_TO_BIT(sector);
2933			device->rs_total = device->ov_left;
2934			for (i = 0; i < DRBD_SYNC_MARKS; i++) {
2935				device->rs_mark_left[i] = device->ov_left;
2936				device->rs_mark_time[i] = now;
2937			}
2938			drbd_info(device, "Online Verify start sector: %llu\n",
2939					(unsigned long long)sector);
2940		}
2941		peer_req->w.cb = w_e_end_ov_req;
 
2942		break;
2943
2944	default:
2945		BUG();
 
 
 
2946	}
2947
2948	/* Throttle, drbd_rs_begin_io and submit should become asynchronous
2949	 * wrt the receiver, but it is not as straightforward as it may seem.
2950	 * Various places in the resync start and stop logic assume resync
2951	 * requests are processed in order, requeuing this on the worker thread
2952	 * introduces a bunch of new code for synchronization between threads.
2953	 *
2954	 * Unlimited throttling before drbd_rs_begin_io may stall the resync
2955	 * "forever", throttling after drbd_rs_begin_io will lock that extent
2956	 * for application writes for the same time.  For now, just throttle
2957	 * here, where the rest of the code expects the receiver to sleep for
2958	 * a while, anyways.
2959	 */
2960
2961	/* Throttle before drbd_rs_begin_io, as that locks out application IO;
2962	 * this defers syncer requests for some time, before letting at least
2963	 * on request through.  The resync controller on the receiving side
2964	 * will adapt to the incoming rate accordingly.
2965	 *
2966	 * We cannot throttle here if remote is Primary/SyncTarget:
2967	 * we would also throttle its application reads.
2968	 * In that case, throttling is done on the SyncTarget only.
2969	 */
2970
2971	/* Even though this may be a resync request, we do add to "read_ee";
2972	 * "sync_ee" is only used for resync WRITEs.
2973	 * Add to list early, so debugfs can find this request
2974	 * even if we have to sleep below. */
2975	spin_lock_irq(&device->resource->req_lock);
2976	list_add_tail(&peer_req->w.list, &device->read_ee);
2977	spin_unlock_irq(&device->resource->req_lock);
2978
2979	update_receiver_timing_details(connection, drbd_rs_should_slow_down);
2980	if (device->state.peer != R_PRIMARY
2981	&& drbd_rs_should_slow_down(peer_device, sector, false))
2982		schedule_timeout_uninterruptible(HZ/10);
2983	update_receiver_timing_details(connection, drbd_rs_begin_io);
2984	if (drbd_rs_begin_io(device, sector))
2985		goto out_free_e;
2986
2987submit_for_resync:
2988	atomic_add(size >> 9, &device->rs_sect_ev);
2989
2990submit:
2991	update_receiver_timing_details(connection, drbd_submit_peer_request);
2992	inc_unacked(device);
2993	if (drbd_submit_peer_request(peer_req) == 0)
2994		return 0;
 
 
 
2995
2996	/* don't care for the reason here */
2997	drbd_err(device, "submit failed, triggering re-connect\n");
 
 
 
 
2998
2999out_free_e:
3000	spin_lock_irq(&device->resource->req_lock);
3001	list_del(&peer_req->w.list);
3002	spin_unlock_irq(&device->resource->req_lock);
3003	/* no drbd_rs_complete_io(), we are dropping the connection anyways */
3004
3005	put_ldev(device);
3006	drbd_free_peer_req(device, peer_req);
3007	return -EIO;
3008}
3009
3010/*
3011 * drbd_asb_recover_0p  -  Recover after split-brain with no remaining primaries
3012 */
3013static int drbd_asb_recover_0p(struct drbd_peer_device *peer_device) __must_hold(local)
3014{
3015	struct drbd_device *device = peer_device->device;
3016	int self, peer, rv = -100;
3017	unsigned long ch_self, ch_peer;
3018	enum drbd_after_sb_p after_sb_0p;
3019
3020	self = device->ldev->md.uuid[UI_BITMAP] & 1;
3021	peer = device->p_uuid[UI_BITMAP] & 1;
3022
3023	ch_peer = device->p_uuid[UI_SIZE];
3024	ch_self = device->comm_bm_set;
3025
3026	rcu_read_lock();
3027	after_sb_0p = rcu_dereference(peer_device->connection->net_conf)->after_sb_0p;
3028	rcu_read_unlock();
3029	switch (after_sb_0p) {
3030	case ASB_CONSENSUS:
3031	case ASB_DISCARD_SECONDARY:
3032	case ASB_CALL_HELPER:
3033	case ASB_VIOLENTLY:
3034		drbd_err(device, "Configuration error.\n");
3035		break;
3036	case ASB_DISCONNECT:
3037		break;
3038	case ASB_DISCARD_YOUNGER_PRI:
3039		if (self == 0 && peer == 1) {
3040			rv = -1;
3041			break;
3042		}
3043		if (self == 1 && peer == 0) {
3044			rv =  1;
3045			break;
3046		}
3047		fallthrough;	/* to one of the other strategies */
3048	case ASB_DISCARD_OLDER_PRI:
3049		if (self == 0 && peer == 1) {
3050			rv = 1;
3051			break;
3052		}
3053		if (self == 1 && peer == 0) {
3054			rv = -1;
3055			break;
3056		}
3057		/* Else fall through to one of the other strategies... */
3058		drbd_warn(device, "Discard younger/older primary did not find a decision\n"
3059		     "Using discard-least-changes instead\n");
3060		fallthrough;
3061	case ASB_DISCARD_ZERO_CHG:
3062		if (ch_peer == 0 && ch_self == 0) {
3063			rv = test_bit(RESOLVE_CONFLICTS, &peer_device->connection->flags)
3064				? -1 : 1;
3065			break;
3066		} else {
3067			if (ch_peer == 0) { rv =  1; break; }
3068			if (ch_self == 0) { rv = -1; break; }
3069		}
3070		if (after_sb_0p == ASB_DISCARD_ZERO_CHG)
3071			break;
3072		fallthrough;
3073	case ASB_DISCARD_LEAST_CHG:
3074		if	(ch_self < ch_peer)
3075			rv = -1;
3076		else if (ch_self > ch_peer)
3077			rv =  1;
3078		else /* ( ch_self == ch_peer ) */
3079		     /* Well, then use something else. */
3080			rv = test_bit(RESOLVE_CONFLICTS, &peer_device->connection->flags)
3081				? -1 : 1;
3082		break;
3083	case ASB_DISCARD_LOCAL:
3084		rv = -1;
3085		break;
3086	case ASB_DISCARD_REMOTE:
3087		rv =  1;
3088	}
3089
3090	return rv;
3091}
3092
3093/*
3094 * drbd_asb_recover_1p  -  Recover after split-brain with one remaining primary
3095 */
3096static int drbd_asb_recover_1p(struct drbd_peer_device *peer_device) __must_hold(local)
3097{
3098	struct drbd_device *device = peer_device->device;
3099	int hg, rv = -100;
3100	enum drbd_after_sb_p after_sb_1p;
3101
3102	rcu_read_lock();
3103	after_sb_1p = rcu_dereference(peer_device->connection->net_conf)->after_sb_1p;
3104	rcu_read_unlock();
3105	switch (after_sb_1p) {
3106	case ASB_DISCARD_YOUNGER_PRI:
3107	case ASB_DISCARD_OLDER_PRI:
3108	case ASB_DISCARD_LEAST_CHG:
3109	case ASB_DISCARD_LOCAL:
3110	case ASB_DISCARD_REMOTE:
3111	case ASB_DISCARD_ZERO_CHG:
3112		drbd_err(device, "Configuration error.\n");
3113		break;
3114	case ASB_DISCONNECT:
3115		break;
3116	case ASB_CONSENSUS:
3117		hg = drbd_asb_recover_0p(peer_device);
3118		if (hg == -1 && device->state.role == R_SECONDARY)
3119			rv = hg;
3120		if (hg == 1  && device->state.role == R_PRIMARY)
3121			rv = hg;
3122		break;
3123	case ASB_VIOLENTLY:
3124		rv = drbd_asb_recover_0p(peer_device);
3125		break;
3126	case ASB_DISCARD_SECONDARY:
3127		return device->state.role == R_PRIMARY ? 1 : -1;
3128	case ASB_CALL_HELPER:
3129		hg = drbd_asb_recover_0p(peer_device);
3130		if (hg == -1 && device->state.role == R_PRIMARY) {
3131			enum drbd_state_rv rv2;
3132
 
3133			 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
3134			  * we might be here in C_WF_REPORT_PARAMS which is transient.
3135			  * we do not need to wait for the after state change work either. */
3136			rv2 = drbd_change_state(device, CS_VERBOSE, NS(role, R_SECONDARY));
3137			if (rv2 != SS_SUCCESS) {
3138				drbd_khelper(device, "pri-lost-after-sb");
3139			} else {
3140				drbd_warn(device, "Successfully gave up primary role.\n");
3141				rv = hg;
3142			}
3143		} else
3144			rv = hg;
3145	}
3146
3147	return rv;
3148}
3149
3150/*
3151 * drbd_asb_recover_2p  -  Recover after split-brain with two remaining primaries
3152 */
3153static int drbd_asb_recover_2p(struct drbd_peer_device *peer_device) __must_hold(local)
3154{
3155	struct drbd_device *device = peer_device->device;
3156	int hg, rv = -100;
3157	enum drbd_after_sb_p after_sb_2p;
3158
3159	rcu_read_lock();
3160	after_sb_2p = rcu_dereference(peer_device->connection->net_conf)->after_sb_2p;
3161	rcu_read_unlock();
3162	switch (after_sb_2p) {
3163	case ASB_DISCARD_YOUNGER_PRI:
3164	case ASB_DISCARD_OLDER_PRI:
3165	case ASB_DISCARD_LEAST_CHG:
3166	case ASB_DISCARD_LOCAL:
3167	case ASB_DISCARD_REMOTE:
3168	case ASB_CONSENSUS:
3169	case ASB_DISCARD_SECONDARY:
3170	case ASB_DISCARD_ZERO_CHG:
3171		drbd_err(device, "Configuration error.\n");
3172		break;
3173	case ASB_VIOLENTLY:
3174		rv = drbd_asb_recover_0p(peer_device);
3175		break;
3176	case ASB_DISCONNECT:
3177		break;
3178	case ASB_CALL_HELPER:
3179		hg = drbd_asb_recover_0p(peer_device);
3180		if (hg == -1) {
3181			enum drbd_state_rv rv2;
3182
3183			 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
3184			  * we might be here in C_WF_REPORT_PARAMS which is transient.
3185			  * we do not need to wait for the after state change work either. */
3186			rv2 = drbd_change_state(device, CS_VERBOSE, NS(role, R_SECONDARY));
3187			if (rv2 != SS_SUCCESS) {
3188				drbd_khelper(device, "pri-lost-after-sb");
3189			} else {
3190				drbd_warn(device, "Successfully gave up primary role.\n");
3191				rv = hg;
3192			}
3193		} else
3194			rv = hg;
3195	}
3196
3197	return rv;
3198}
3199
3200static void drbd_uuid_dump(struct drbd_device *device, char *text, u64 *uuid,
3201			   u64 bits, u64 flags)
3202{
3203	if (!uuid) {
3204		drbd_info(device, "%s uuid info vanished while I was looking!\n", text);
3205		return;
3206	}
3207	drbd_info(device, "%s %016llX:%016llX:%016llX:%016llX bits:%llu flags:%llX\n",
3208	     text,
3209	     (unsigned long long)uuid[UI_CURRENT],
3210	     (unsigned long long)uuid[UI_BITMAP],
3211	     (unsigned long long)uuid[UI_HISTORY_START],
3212	     (unsigned long long)uuid[UI_HISTORY_END],
3213	     (unsigned long long)bits,
3214	     (unsigned long long)flags);
3215}
3216
3217/*
3218  100	after split brain try auto recover
3219    2	C_SYNC_SOURCE set BitMap
3220    1	C_SYNC_SOURCE use BitMap
3221    0	no Sync
3222   -1	C_SYNC_TARGET use BitMap
3223   -2	C_SYNC_TARGET set BitMap
3224 -100	after split brain, disconnect
3225-1000	unrelated data
3226-1091   requires proto 91
3227-1096   requires proto 96
3228 */
3229
3230static int drbd_uuid_compare(struct drbd_peer_device *const peer_device,
3231		enum drbd_role const peer_role, int *rule_nr) __must_hold(local)
3232{
3233	struct drbd_connection *const connection = peer_device->connection;
3234	struct drbd_device *device = peer_device->device;
3235	u64 self, peer;
3236	int i, j;
3237
3238	self = device->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
3239	peer = device->p_uuid[UI_CURRENT] & ~((u64)1);
3240
3241	*rule_nr = 10;
3242	if (self == UUID_JUST_CREATED && peer == UUID_JUST_CREATED)
3243		return 0;
3244
3245	*rule_nr = 20;
3246	if ((self == UUID_JUST_CREATED || self == (u64)0) &&
3247	     peer != UUID_JUST_CREATED)
3248		return -2;
3249
3250	*rule_nr = 30;
3251	if (self != UUID_JUST_CREATED &&
3252	    (peer == UUID_JUST_CREATED || peer == (u64)0))
3253		return 2;
3254
3255	if (self == peer) {
3256		int rct, dc; /* roles at crash time */
3257
3258		if (device->p_uuid[UI_BITMAP] == (u64)0 && device->ldev->md.uuid[UI_BITMAP] != (u64)0) {
3259
3260			if (connection->agreed_pro_version < 91)
3261				return -1091;
3262
3263			if ((device->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (device->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
3264			    (device->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (device->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
3265				drbd_info(device, "was SyncSource, missed the resync finished event, corrected myself:\n");
3266				drbd_uuid_move_history(device);
3267				device->ldev->md.uuid[UI_HISTORY_START] = device->ldev->md.uuid[UI_BITMAP];
3268				device->ldev->md.uuid[UI_BITMAP] = 0;
3269
3270				drbd_uuid_dump(device, "self", device->ldev->md.uuid,
3271					       device->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(device) : 0, 0);
3272				*rule_nr = 34;
3273			} else {
3274				drbd_info(device, "was SyncSource (peer failed to write sync_uuid)\n");
3275				*rule_nr = 36;
3276			}
3277
3278			return 1;
3279		}
3280
3281		if (device->ldev->md.uuid[UI_BITMAP] == (u64)0 && device->p_uuid[UI_BITMAP] != (u64)0) {
3282
3283			if (connection->agreed_pro_version < 91)
3284				return -1091;
3285
3286			if ((device->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (device->p_uuid[UI_BITMAP] & ~((u64)1)) &&
3287			    (device->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) == (device->p_uuid[UI_HISTORY_START] & ~((u64)1))) {
3288				drbd_info(device, "was SyncTarget, peer missed the resync finished event, corrected peer:\n");
3289
3290				device->p_uuid[UI_HISTORY_START + 1] = device->p_uuid[UI_HISTORY_START];
3291				device->p_uuid[UI_HISTORY_START] = device->p_uuid[UI_BITMAP];
3292				device->p_uuid[UI_BITMAP] = 0UL;
3293
3294				drbd_uuid_dump(device, "peer", device->p_uuid, device->p_uuid[UI_SIZE], device->p_uuid[UI_FLAGS]);
3295				*rule_nr = 35;
3296			} else {
3297				drbd_info(device, "was SyncTarget (failed to write sync_uuid)\n");
3298				*rule_nr = 37;
3299			}
3300
3301			return -1;
3302		}
3303
3304		/* Common power [off|failure] */
3305		rct = (test_bit(CRASHED_PRIMARY, &device->flags) ? 1 : 0) +
3306			(device->p_uuid[UI_FLAGS] & 2);
3307		/* lowest bit is set when we were primary,
3308		 * next bit (weight 2) is set when peer was primary */
3309		*rule_nr = 40;
3310
3311		/* Neither has the "crashed primary" flag set,
3312		 * only a replication link hickup. */
3313		if (rct == 0)
3314			return 0;
3315
3316		/* Current UUID equal and no bitmap uuid; does not necessarily
3317		 * mean this was a "simultaneous hard crash", maybe IO was
3318		 * frozen, so no UUID-bump happened.
3319		 * This is a protocol change, overload DRBD_FF_WSAME as flag
3320		 * for "new-enough" peer DRBD version. */
3321		if (device->state.role == R_PRIMARY || peer_role == R_PRIMARY) {
3322			*rule_nr = 41;
3323			if (!(connection->agreed_features & DRBD_FF_WSAME)) {
3324				drbd_warn(peer_device, "Equivalent unrotated UUIDs, but current primary present.\n");
3325				return -(0x10000 | PRO_VERSION_MAX | (DRBD_FF_WSAME << 8));
3326			}
3327			if (device->state.role == R_PRIMARY && peer_role == R_PRIMARY) {
3328				/* At least one has the "crashed primary" bit set,
3329				 * both are primary now, but neither has rotated its UUIDs?
3330				 * "Can not happen." */
3331				drbd_err(peer_device, "Equivalent unrotated UUIDs, but both are primary. Can not resolve this.\n");
3332				return -100;
3333			}
3334			if (device->state.role == R_PRIMARY)
3335				return 1;
3336			return -1;
3337		}
3338
3339		/* Both are secondary.
3340		 * Really looks like recovery from simultaneous hard crash.
3341		 * Check which had been primary before, and arbitrate. */
3342		switch (rct) {
3343		case 0: /* !self_pri && !peer_pri */ return 0; /* already handled */
3344		case 1: /*  self_pri && !peer_pri */ return 1;
3345		case 2: /* !self_pri &&  peer_pri */ return -1;
3346		case 3: /*  self_pri &&  peer_pri */
3347			dc = test_bit(RESOLVE_CONFLICTS, &connection->flags);
3348			return dc ? -1 : 1;
3349		}
3350	}
3351
3352	*rule_nr = 50;
3353	peer = device->p_uuid[UI_BITMAP] & ~((u64)1);
3354	if (self == peer)
3355		return -1;
3356
3357	*rule_nr = 51;
3358	peer = device->p_uuid[UI_HISTORY_START] & ~((u64)1);
3359	if (self == peer) {
3360		if (connection->agreed_pro_version < 96 ?
3361		    (device->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) ==
3362		    (device->p_uuid[UI_HISTORY_START + 1] & ~((u64)1)) :
3363		    peer + UUID_NEW_BM_OFFSET == (device->p_uuid[UI_BITMAP] & ~((u64)1))) {
3364			/* The last P_SYNC_UUID did not get though. Undo the last start of
3365			   resync as sync source modifications of the peer's UUIDs. */
3366
3367			if (connection->agreed_pro_version < 91)
3368				return -1091;
3369
3370			device->p_uuid[UI_BITMAP] = device->p_uuid[UI_HISTORY_START];
3371			device->p_uuid[UI_HISTORY_START] = device->p_uuid[UI_HISTORY_START + 1];
3372
3373			drbd_info(device, "Lost last syncUUID packet, corrected:\n");
3374			drbd_uuid_dump(device, "peer", device->p_uuid, device->p_uuid[UI_SIZE], device->p_uuid[UI_FLAGS]);
3375
3376			return -1;
3377		}
3378	}
3379
3380	*rule_nr = 60;
3381	self = device->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
3382	for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
3383		peer = device->p_uuid[i] & ~((u64)1);
3384		if (self == peer)
3385			return -2;
3386	}
3387
3388	*rule_nr = 70;
3389	self = device->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
3390	peer = device->p_uuid[UI_CURRENT] & ~((u64)1);
3391	if (self == peer)
3392		return 1;
3393
3394	*rule_nr = 71;
3395	self = device->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1);
3396	if (self == peer) {
3397		if (connection->agreed_pro_version < 96 ?
3398		    (device->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) ==
3399		    (device->p_uuid[UI_HISTORY_START] & ~((u64)1)) :
3400		    self + UUID_NEW_BM_OFFSET == (device->ldev->md.uuid[UI_BITMAP] & ~((u64)1))) {
3401			/* The last P_SYNC_UUID did not get though. Undo the last start of
3402			   resync as sync source modifications of our UUIDs. */
3403
3404			if (connection->agreed_pro_version < 91)
3405				return -1091;
3406
3407			__drbd_uuid_set(device, UI_BITMAP, device->ldev->md.uuid[UI_HISTORY_START]);
3408			__drbd_uuid_set(device, UI_HISTORY_START, device->ldev->md.uuid[UI_HISTORY_START + 1]);
3409
3410			drbd_info(device, "Last syncUUID did not get through, corrected:\n");
3411			drbd_uuid_dump(device, "self", device->ldev->md.uuid,
3412				       device->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(device) : 0, 0);
3413
3414			return 1;
3415		}
3416	}
3417
3418
3419	*rule_nr = 80;
3420	peer = device->p_uuid[UI_CURRENT] & ~((u64)1);
3421	for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
3422		self = device->ldev->md.uuid[i] & ~((u64)1);
3423		if (self == peer)
3424			return 2;
3425	}
3426
3427	*rule_nr = 90;
3428	self = device->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
3429	peer = device->p_uuid[UI_BITMAP] & ~((u64)1);
3430	if (self == peer && self != ((u64)0))
3431		return 100;
3432
3433	*rule_nr = 100;
3434	for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
3435		self = device->ldev->md.uuid[i] & ~((u64)1);
3436		for (j = UI_HISTORY_START; j <= UI_HISTORY_END; j++) {
3437			peer = device->p_uuid[j] & ~((u64)1);
3438			if (self == peer)
3439				return -100;
3440		}
3441	}
3442
3443	return -1000;
3444}
3445
3446/* drbd_sync_handshake() returns the new conn state on success, or
3447   CONN_MASK (-1) on failure.
3448 */
3449static enum drbd_conns drbd_sync_handshake(struct drbd_peer_device *peer_device,
3450					   enum drbd_role peer_role,
3451					   enum drbd_disk_state peer_disk) __must_hold(local)
3452{
3453	struct drbd_device *device = peer_device->device;
3454	enum drbd_conns rv = C_MASK;
3455	enum drbd_disk_state mydisk;
3456	struct net_conf *nc;
3457	int hg, rule_nr, rr_conflict, tentative, always_asbp;
3458
3459	mydisk = device->state.disk;
3460	if (mydisk == D_NEGOTIATING)
3461		mydisk = device->new_state_tmp.disk;
3462
3463	drbd_info(device, "drbd_sync_handshake:\n");
3464
3465	spin_lock_irq(&device->ldev->md.uuid_lock);
3466	drbd_uuid_dump(device, "self", device->ldev->md.uuid, device->comm_bm_set, 0);
3467	drbd_uuid_dump(device, "peer", device->p_uuid,
3468		       device->p_uuid[UI_SIZE], device->p_uuid[UI_FLAGS]);
3469
3470	hg = drbd_uuid_compare(peer_device, peer_role, &rule_nr);
3471	spin_unlock_irq(&device->ldev->md.uuid_lock);
3472
3473	drbd_info(device, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
3474
3475	if (hg == -1000) {
3476		drbd_alert(device, "Unrelated data, aborting!\n");
3477		return C_MASK;
3478	}
3479	if (hg < -0x10000) {
3480		int proto, fflags;
3481		hg = -hg;
3482		proto = hg & 0xff;
3483		fflags = (hg >> 8) & 0xff;
3484		drbd_alert(device, "To resolve this both sides have to support at least protocol %d and feature flags 0x%x\n",
3485					proto, fflags);
3486		return C_MASK;
3487	}
3488	if (hg < -1000) {
3489		drbd_alert(device, "To resolve this both sides have to support at least protocol %d\n", -hg - 1000);
3490		return C_MASK;
3491	}
3492
3493	if    ((mydisk == D_INCONSISTENT && peer_disk > D_INCONSISTENT) ||
3494	    (peer_disk == D_INCONSISTENT && mydisk    > D_INCONSISTENT)) {
3495		int f = (hg == -100) || abs(hg) == 2;
3496		hg = mydisk > D_INCONSISTENT ? 1 : -1;
3497		if (f)
3498			hg = hg*2;
3499		drbd_info(device, "Becoming sync %s due to disk states.\n",
3500		     hg > 0 ? "source" : "target");
3501	}
3502
3503	if (abs(hg) == 100)
3504		drbd_khelper(device, "initial-split-brain");
3505
3506	rcu_read_lock();
3507	nc = rcu_dereference(peer_device->connection->net_conf);
3508	always_asbp = nc->always_asbp;
3509	rr_conflict = nc->rr_conflict;
3510	tentative = nc->tentative;
3511	rcu_read_unlock();
3512
3513	if (hg == 100 || (hg == -100 && always_asbp)) {
3514		int pcount = (device->state.role == R_PRIMARY)
3515			   + (peer_role == R_PRIMARY);
3516		int forced = (hg == -100);
3517
3518		switch (pcount) {
3519		case 0:
3520			hg = drbd_asb_recover_0p(peer_device);
3521			break;
3522		case 1:
3523			hg = drbd_asb_recover_1p(peer_device);
3524			break;
3525		case 2:
3526			hg = drbd_asb_recover_2p(peer_device);
3527			break;
3528		}
3529		if (abs(hg) < 100) {
3530			drbd_warn(device, "Split-Brain detected, %d primaries, "
3531			     "automatically solved. Sync from %s node\n",
3532			     pcount, (hg < 0) ? "peer" : "this");
3533			if (forced) {
3534				drbd_warn(device, "Doing a full sync, since"
3535				     " UUIDs where ambiguous.\n");
3536				hg = hg*2;
3537			}
3538		}
3539	}
3540
3541	if (hg == -100) {
3542		if (test_bit(DISCARD_MY_DATA, &device->flags) && !(device->p_uuid[UI_FLAGS]&1))
3543			hg = -1;
3544		if (!test_bit(DISCARD_MY_DATA, &device->flags) && (device->p_uuid[UI_FLAGS]&1))
3545			hg = 1;
3546
3547		if (abs(hg) < 100)
3548			drbd_warn(device, "Split-Brain detected, manually solved. "
3549			     "Sync from %s node\n",
3550			     (hg < 0) ? "peer" : "this");
3551	}
3552
3553	if (hg == -100) {
3554		/* FIXME this log message is not correct if we end up here
3555		 * after an attempted attach on a diskless node.
3556		 * We just refuse to attach -- well, we drop the "connection"
3557		 * to that disk, in a way... */
3558		drbd_alert(device, "Split-Brain detected but unresolved, dropping connection!\n");
3559		drbd_khelper(device, "split-brain");
3560		return C_MASK;
3561	}
3562
3563	if (hg > 0 && mydisk <= D_INCONSISTENT) {
3564		drbd_err(device, "I shall become SyncSource, but I am inconsistent!\n");
3565		return C_MASK;
3566	}
3567
3568	if (hg < 0 && /* by intention we do not use mydisk here. */
3569	    device->state.role == R_PRIMARY && device->state.disk >= D_CONSISTENT) {
3570		switch (rr_conflict) {
3571		case ASB_CALL_HELPER:
3572			drbd_khelper(device, "pri-lost");
3573			fallthrough;
3574		case ASB_DISCONNECT:
3575			drbd_err(device, "I shall become SyncTarget, but I am primary!\n");
3576			return C_MASK;
3577		case ASB_VIOLENTLY:
3578			drbd_warn(device, "Becoming SyncTarget, violating the stable-data"
3579			     "assumption\n");
3580		}
3581	}
3582
3583	if (tentative || test_bit(CONN_DRY_RUN, &peer_device->connection->flags)) {
3584		if (hg == 0)
3585			drbd_info(device, "dry-run connect: No resync, would become Connected immediately.\n");
3586		else
3587			drbd_info(device, "dry-run connect: Would become %s, doing a %s resync.",
3588				 drbd_conn_str(hg > 0 ? C_SYNC_SOURCE : C_SYNC_TARGET),
3589				 abs(hg) >= 2 ? "full" : "bit-map based");
3590		return C_MASK;
3591	}
3592
3593	if (abs(hg) >= 2) {
3594		drbd_info(device, "Writing the whole bitmap, full sync required after drbd_sync_handshake.\n");
3595		if (drbd_bitmap_io(device, &drbd_bmio_set_n_write, "set_n_write from sync_handshake",
3596					BM_LOCKED_SET_ALLOWED, NULL))
3597			return C_MASK;
3598	}
3599
3600	if (hg > 0) { /* become sync source. */
3601		rv = C_WF_BITMAP_S;
3602	} else if (hg < 0) { /* become sync target */
3603		rv = C_WF_BITMAP_T;
3604	} else {
3605		rv = C_CONNECTED;
3606		if (drbd_bm_total_weight(device)) {
3607			drbd_info(device, "No resync, but %lu bits in bitmap!\n",
3608			     drbd_bm_total_weight(device));
3609		}
3610	}
3611
3612	return rv;
3613}
3614
3615static enum drbd_after_sb_p convert_after_sb(enum drbd_after_sb_p peer)
 
3616{
3617	/* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
3618	if (peer == ASB_DISCARD_REMOTE)
3619		return ASB_DISCARD_LOCAL;
 
3620
3621	/* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
3622	if (peer == ASB_DISCARD_LOCAL)
3623		return ASB_DISCARD_REMOTE;
 
3624
3625	/* everything else is valid if they are equal on both sides. */
3626	return peer;
 
 
 
 
3627}
3628
3629static int receive_protocol(struct drbd_connection *connection, struct packet_info *pi)
3630{
3631	struct p_protocol *p = pi->data;
3632	enum drbd_after_sb_p p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
3633	int p_proto, p_discard_my_data, p_two_primaries, cf;
3634	struct net_conf *nc, *old_net_conf, *new_net_conf = NULL;
3635	char integrity_alg[SHARED_SECRET_MAX] = "";
3636	struct crypto_shash *peer_integrity_tfm = NULL;
3637	void *int_dig_in = NULL, *int_dig_vv = NULL;
3638
3639	p_proto		= be32_to_cpu(p->protocol);
3640	p_after_sb_0p	= be32_to_cpu(p->after_sb_0p);
3641	p_after_sb_1p	= be32_to_cpu(p->after_sb_1p);
3642	p_after_sb_2p	= be32_to_cpu(p->after_sb_2p);
3643	p_two_primaries = be32_to_cpu(p->two_primaries);
3644	cf		= be32_to_cpu(p->conn_flags);
3645	p_discard_my_data = cf & CF_DISCARD_MY_DATA;
3646
3647	if (connection->agreed_pro_version >= 87) {
3648		int err;
3649
3650		if (pi->size > sizeof(integrity_alg))
3651			return -EIO;
3652		err = drbd_recv_all(connection, integrity_alg, pi->size);
3653		if (err)
3654			return err;
3655		integrity_alg[SHARED_SECRET_MAX - 1] = 0;
3656	}
3657
3658	if (pi->cmd != P_PROTOCOL_UPDATE) {
3659		clear_bit(CONN_DRY_RUN, &connection->flags);
 
 
3660
3661		if (cf & CF_DRY_RUN)
3662			set_bit(CONN_DRY_RUN, &connection->flags);
 
 
3663
3664		rcu_read_lock();
3665		nc = rcu_dereference(connection->net_conf);
 
 
3666
3667		if (p_proto != nc->wire_protocol) {
3668			drbd_err(connection, "incompatible %s settings\n", "protocol");
3669			goto disconnect_rcu_unlock;
3670		}
3671
3672		if (convert_after_sb(p_after_sb_0p) != nc->after_sb_0p) {
3673			drbd_err(connection, "incompatible %s settings\n", "after-sb-0pri");
3674			goto disconnect_rcu_unlock;
3675		}
3676
3677		if (convert_after_sb(p_after_sb_1p) != nc->after_sb_1p) {
3678			drbd_err(connection, "incompatible %s settings\n", "after-sb-1pri");
3679			goto disconnect_rcu_unlock;
3680		}
3681
3682		if (convert_after_sb(p_after_sb_2p) != nc->after_sb_2p) {
3683			drbd_err(connection, "incompatible %s settings\n", "after-sb-2pri");
3684			goto disconnect_rcu_unlock;
3685		}
3686
3687		if (p_discard_my_data && nc->discard_my_data) {
3688			drbd_err(connection, "incompatible %s settings\n", "discard-my-data");
3689			goto disconnect_rcu_unlock;
3690		}
3691
3692		if (p_two_primaries != nc->two_primaries) {
3693			drbd_err(connection, "incompatible %s settings\n", "allow-two-primaries");
3694			goto disconnect_rcu_unlock;
3695		}
3696
3697		if (strcmp(integrity_alg, nc->integrity_alg)) {
3698			drbd_err(connection, "incompatible %s settings\n", "data-integrity-alg");
3699			goto disconnect_rcu_unlock;
3700		}
3701
3702		rcu_read_unlock();
3703	}
3704
3705	if (integrity_alg[0]) {
3706		int hash_size;
3707
3708		/*
3709		 * We can only change the peer data integrity algorithm
3710		 * here.  Changing our own data integrity algorithm
3711		 * requires that we send a P_PROTOCOL_UPDATE packet at
3712		 * the same time; otherwise, the peer has no way to
3713		 * tell between which packets the algorithm should
3714		 * change.
3715		 */
3716
3717		peer_integrity_tfm = crypto_alloc_shash(integrity_alg, 0, 0);
3718		if (IS_ERR(peer_integrity_tfm)) {
3719			peer_integrity_tfm = NULL;
3720			drbd_err(connection, "peer data-integrity-alg %s not supported\n",
3721				 integrity_alg);
3722			goto disconnect;
3723		}
3724
3725		hash_size = crypto_shash_digestsize(peer_integrity_tfm);
3726		int_dig_in = kmalloc(hash_size, GFP_KERNEL);
3727		int_dig_vv = kmalloc(hash_size, GFP_KERNEL);
3728		if (!(int_dig_in && int_dig_vv)) {
3729			drbd_err(connection, "Allocation of buffers for data integrity checking failed\n");
3730			goto disconnect;
3731		}
 
 
3732	}
3733
3734	new_net_conf = kmalloc(sizeof(struct net_conf), GFP_KERNEL);
3735	if (!new_net_conf)
3736		goto disconnect;
3737
3738	mutex_lock(&connection->data.mutex);
3739	mutex_lock(&connection->resource->conf_update);
3740	old_net_conf = connection->net_conf;
3741	*new_net_conf = *old_net_conf;
3742
3743	new_net_conf->wire_protocol = p_proto;
3744	new_net_conf->after_sb_0p = convert_after_sb(p_after_sb_0p);
3745	new_net_conf->after_sb_1p = convert_after_sb(p_after_sb_1p);
3746	new_net_conf->after_sb_2p = convert_after_sb(p_after_sb_2p);
3747	new_net_conf->two_primaries = p_two_primaries;
3748
3749	rcu_assign_pointer(connection->net_conf, new_net_conf);
3750	mutex_unlock(&connection->resource->conf_update);
3751	mutex_unlock(&connection->data.mutex);
3752
3753	crypto_free_shash(connection->peer_integrity_tfm);
3754	kfree(connection->int_dig_in);
3755	kfree(connection->int_dig_vv);
3756	connection->peer_integrity_tfm = peer_integrity_tfm;
3757	connection->int_dig_in = int_dig_in;
3758	connection->int_dig_vv = int_dig_vv;
3759
3760	if (strcmp(old_net_conf->integrity_alg, integrity_alg))
3761		drbd_info(connection, "peer data-integrity-alg: %s\n",
3762			  integrity_alg[0] ? integrity_alg : "(none)");
3763
3764	kvfree_rcu_mightsleep(old_net_conf);
3765	return 0;
3766
3767disconnect_rcu_unlock:
3768	rcu_read_unlock();
3769disconnect:
3770	crypto_free_shash(peer_integrity_tfm);
3771	kfree(int_dig_in);
3772	kfree(int_dig_vv);
3773	conn_request_state(connection, NS(conn, C_DISCONNECTING), CS_HARD);
3774	return -EIO;
3775}
3776
3777/* helper function
3778 * input: alg name, feature name
3779 * return: NULL (alg name was "")
3780 *         ERR_PTR(error) if something goes wrong
3781 *         or the crypto hash ptr, if it worked out ok. */
3782static struct crypto_shash *drbd_crypto_alloc_digest_safe(
3783		const struct drbd_device *device,
3784		const char *alg, const char *name)
3785{
3786	struct crypto_shash *tfm;
3787
3788	if (!alg[0])
3789		return NULL;
3790
3791	tfm = crypto_alloc_shash(alg, 0, 0);
3792	if (IS_ERR(tfm)) {
3793		drbd_err(device, "Can not allocate \"%s\" as %s (reason: %ld)\n",
3794			alg, name, PTR_ERR(tfm));
3795		return tfm;
3796	}
 
 
 
 
 
3797	return tfm;
3798}
3799
3800static int ignore_remaining_packet(struct drbd_connection *connection, struct packet_info *pi)
3801{
3802	void *buffer = connection->data.rbuf;
3803	int size = pi->size;
3804
3805	while (size) {
3806		int s = min_t(int, size, DRBD_SOCKET_BUFFER_SIZE);
3807		s = drbd_recv(connection, buffer, s);
3808		if (s <= 0) {
3809			if (s < 0)
3810				return s;
3811			break;
3812		}
3813		size -= s;
3814	}
3815	if (size)
3816		return -EIO;
3817	return 0;
3818}
3819
3820/*
3821 * config_unknown_volume  -  device configuration command for unknown volume
3822 *
3823 * When a device is added to an existing connection, the node on which the
3824 * device is added first will send configuration commands to its peer but the
3825 * peer will not know about the device yet.  It will warn and ignore these
3826 * commands.  Once the device is added on the second node, the second node will
3827 * send the same device configuration commands, but in the other direction.
3828 *
3829 * (We can also end up here if drbd is misconfigured.)
3830 */
3831static int config_unknown_volume(struct drbd_connection *connection, struct packet_info *pi)
3832{
3833	drbd_warn(connection, "%s packet received for volume %u, which is not configured locally\n",
3834		  cmdname(pi->cmd), pi->vnr);
3835	return ignore_remaining_packet(connection, pi);
3836}
3837
3838static int receive_SyncParam(struct drbd_connection *connection, struct packet_info *pi)
3839{
3840	struct drbd_peer_device *peer_device;
3841	struct drbd_device *device;
3842	struct p_rs_param_95 *p;
3843	unsigned int header_size, data_size, exp_max_sz;
3844	struct crypto_shash *verify_tfm = NULL;
3845	struct crypto_shash *csums_tfm = NULL;
3846	struct net_conf *old_net_conf, *new_net_conf = NULL;
3847	struct disk_conf *old_disk_conf = NULL, *new_disk_conf = NULL;
3848	const int apv = connection->agreed_pro_version;
3849	struct fifo_buffer *old_plan = NULL, *new_plan = NULL;
3850	unsigned int fifo_size = 0;
3851	int err;
3852
3853	peer_device = conn_peer_device(connection, pi->vnr);
3854	if (!peer_device)
3855		return config_unknown_volume(connection, pi);
3856	device = peer_device->device;
3857
3858	exp_max_sz  = apv <= 87 ? sizeof(struct p_rs_param)
3859		    : apv == 88 ? sizeof(struct p_rs_param)
3860					+ SHARED_SECRET_MAX
3861		    : apv <= 94 ? sizeof(struct p_rs_param_89)
3862		    : /* apv >= 95 */ sizeof(struct p_rs_param_95);
3863
3864	if (pi->size > exp_max_sz) {
3865		drbd_err(device, "SyncParam packet too long: received %u, expected <= %u bytes\n",
3866		    pi->size, exp_max_sz);
3867		return -EIO;
3868	}
3869
3870	if (apv <= 88) {
3871		header_size = sizeof(struct p_rs_param);
3872		data_size = pi->size - header_size;
3873	} else if (apv <= 94) {
3874		header_size = sizeof(struct p_rs_param_89);
3875		data_size = pi->size - header_size;
3876		D_ASSERT(device, data_size == 0);
3877	} else {
3878		header_size = sizeof(struct p_rs_param_95);
3879		data_size = pi->size - header_size;
3880		D_ASSERT(device, data_size == 0);
3881	}
3882
3883	/* initialize verify_alg and csums_alg */
3884	p = pi->data;
3885	BUILD_BUG_ON(sizeof(p->algs) != 2 * SHARED_SECRET_MAX);
3886	memset(&p->algs, 0, sizeof(p->algs));
3887
3888	err = drbd_recv_all(peer_device->connection, p, header_size);
3889	if (err)
3890		return err;
3891
3892	mutex_lock(&connection->resource->conf_update);
3893	old_net_conf = peer_device->connection->net_conf;
3894	if (get_ldev(device)) {
3895		new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
3896		if (!new_disk_conf) {
3897			put_ldev(device);
3898			mutex_unlock(&connection->resource->conf_update);
3899			drbd_err(device, "Allocation of new disk_conf failed\n");
3900			return -ENOMEM;
3901		}
3902
3903		old_disk_conf = device->ldev->disk_conf;
3904		*new_disk_conf = *old_disk_conf;
3905
3906		new_disk_conf->resync_rate = be32_to_cpu(p->resync_rate);
3907	}
3908
3909	if (apv >= 88) {
3910		if (apv == 88) {
3911			if (data_size > SHARED_SECRET_MAX || data_size == 0) {
3912				drbd_err(device, "verify-alg of wrong size, "
3913					"peer wants %u, accepting only up to %u byte\n",
3914					data_size, SHARED_SECRET_MAX);
3915				goto reconnect;
3916			}
3917
3918			err = drbd_recv_all(peer_device->connection, p->verify_alg, data_size);
3919			if (err)
3920				goto reconnect;
3921			/* we expect NUL terminated string */
3922			/* but just in case someone tries to be evil */
3923			D_ASSERT(device, p->verify_alg[data_size-1] == 0);
3924			p->verify_alg[data_size-1] = 0;
3925
3926		} else /* apv >= 89 */ {
3927			/* we still expect NUL terminated strings */
3928			/* but just in case someone tries to be evil */
3929			D_ASSERT(device, p->verify_alg[SHARED_SECRET_MAX-1] == 0);
3930			D_ASSERT(device, p->csums_alg[SHARED_SECRET_MAX-1] == 0);
3931			p->verify_alg[SHARED_SECRET_MAX-1] = 0;
3932			p->csums_alg[SHARED_SECRET_MAX-1] = 0;
3933		}
3934
3935		if (strcmp(old_net_conf->verify_alg, p->verify_alg)) {
3936			if (device->state.conn == C_WF_REPORT_PARAMS) {
3937				drbd_err(device, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
3938				    old_net_conf->verify_alg, p->verify_alg);
3939				goto disconnect;
3940			}
3941			verify_tfm = drbd_crypto_alloc_digest_safe(device,
3942					p->verify_alg, "verify-alg");
3943			if (IS_ERR(verify_tfm)) {
3944				verify_tfm = NULL;
3945				goto disconnect;
3946			}
3947		}
3948
3949		if (apv >= 89 && strcmp(old_net_conf->csums_alg, p->csums_alg)) {
3950			if (device->state.conn == C_WF_REPORT_PARAMS) {
3951				drbd_err(device, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
3952				    old_net_conf->csums_alg, p->csums_alg);
3953				goto disconnect;
3954			}
3955			csums_tfm = drbd_crypto_alloc_digest_safe(device,
3956					p->csums_alg, "csums-alg");
3957			if (IS_ERR(csums_tfm)) {
3958				csums_tfm = NULL;
3959				goto disconnect;
3960			}
3961		}
3962
3963		if (apv > 94 && new_disk_conf) {
3964			new_disk_conf->c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
3965			new_disk_conf->c_delay_target = be32_to_cpu(p->c_delay_target);
3966			new_disk_conf->c_fill_target = be32_to_cpu(p->c_fill_target);
3967			new_disk_conf->c_max_rate = be32_to_cpu(p->c_max_rate);
3968
3969			fifo_size = (new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ;
3970			if (fifo_size != device->rs_plan_s->size) {
3971				new_plan = fifo_alloc(fifo_size);
3972				if (!new_plan) {
3973					drbd_err(device, "kmalloc of fifo_buffer failed");
3974					put_ldev(device);
3975					goto disconnect;
3976				}
3977			}
3978		}
3979
3980		if (verify_tfm || csums_tfm) {
3981			new_net_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
3982			if (!new_net_conf)
3983				goto disconnect;
3984
3985			*new_net_conf = *old_net_conf;
3986
3987			if (verify_tfm) {
3988				strcpy(new_net_conf->verify_alg, p->verify_alg);
3989				new_net_conf->verify_alg_len = strlen(p->verify_alg) + 1;
3990				crypto_free_shash(peer_device->connection->verify_tfm);
3991				peer_device->connection->verify_tfm = verify_tfm;
3992				drbd_info(device, "using verify-alg: \"%s\"\n", p->verify_alg);
3993			}
3994			if (csums_tfm) {
3995				strcpy(new_net_conf->csums_alg, p->csums_alg);
3996				new_net_conf->csums_alg_len = strlen(p->csums_alg) + 1;
3997				crypto_free_shash(peer_device->connection->csums_tfm);
3998				peer_device->connection->csums_tfm = csums_tfm;
3999				drbd_info(device, "using csums-alg: \"%s\"\n", p->csums_alg);
4000			}
4001			rcu_assign_pointer(connection->net_conf, new_net_conf);
4002		}
 
4003	}
4004
4005	if (new_disk_conf) {
4006		rcu_assign_pointer(device->ldev->disk_conf, new_disk_conf);
4007		put_ldev(device);
4008	}
4009
4010	if (new_plan) {
4011		old_plan = device->rs_plan_s;
4012		rcu_assign_pointer(device->rs_plan_s, new_plan);
4013	}
4014
4015	mutex_unlock(&connection->resource->conf_update);
4016	synchronize_rcu();
4017	if (new_net_conf)
4018		kfree(old_net_conf);
4019	kfree(old_disk_conf);
4020	kfree(old_plan);
4021
4022	return 0;
4023
4024reconnect:
4025	if (new_disk_conf) {
4026		put_ldev(device);
4027		kfree(new_disk_conf);
4028	}
4029	mutex_unlock(&connection->resource->conf_update);
4030	return -EIO;
4031
4032disconnect:
4033	kfree(new_plan);
4034	if (new_disk_conf) {
4035		put_ldev(device);
4036		kfree(new_disk_conf);
4037	}
4038	mutex_unlock(&connection->resource->conf_update);
4039	/* just for completeness: actually not needed,
4040	 * as this is not reached if csums_tfm was ok. */
4041	crypto_free_shash(csums_tfm);
4042	/* but free the verify_tfm again, if csums_tfm did not work out */
4043	crypto_free_shash(verify_tfm);
4044	conn_request_state(peer_device->connection, NS(conn, C_DISCONNECTING), CS_HARD);
4045	return -EIO;
4046}
4047
4048/* warn if the arguments differ by more than 12.5% */
4049static void warn_if_differ_considerably(struct drbd_device *device,
4050	const char *s, sector_t a, sector_t b)
4051{
4052	sector_t d;
4053	if (a == 0 || b == 0)
4054		return;
4055	d = (a > b) ? (a - b) : (b - a);
4056	if (d > (a>>3) || d > (b>>3))
4057		drbd_warn(device, "Considerable difference in %s: %llus vs. %llus\n", s,
4058		     (unsigned long long)a, (unsigned long long)b);
4059}
4060
4061static int receive_sizes(struct drbd_connection *connection, struct packet_info *pi)
4062{
4063	struct drbd_peer_device *peer_device;
4064	struct drbd_device *device;
4065	struct p_sizes *p = pi->data;
4066	struct o_qlim *o = (connection->agreed_features & DRBD_FF_WSAME) ? p->qlim : NULL;
4067	enum determine_dev_size dd = DS_UNCHANGED;
4068	sector_t p_size, p_usize, p_csize, my_usize;
4069	sector_t new_size, cur_size;
4070	int ldsc = 0; /* local disk size changed */
4071	enum dds_flags ddsf;
4072
4073	peer_device = conn_peer_device(connection, pi->vnr);
4074	if (!peer_device)
4075		return config_unknown_volume(connection, pi);
4076	device = peer_device->device;
4077	cur_size = get_capacity(device->vdisk);
4078
4079	p_size = be64_to_cpu(p->d_size);
4080	p_usize = be64_to_cpu(p->u_size);
4081	p_csize = be64_to_cpu(p->c_size);
 
 
 
 
 
4082
4083	/* just store the peer's disk size for now.
4084	 * we still need to figure out whether we accept that. */
4085	device->p_size = p_size;
4086
4087	if (get_ldev(device)) {
4088		rcu_read_lock();
4089		my_usize = rcu_dereference(device->ldev->disk_conf)->disk_size;
4090		rcu_read_unlock();
4091
4092		warn_if_differ_considerably(device, "lower level device sizes",
4093			   p_size, drbd_get_max_capacity(device->ldev));
4094		warn_if_differ_considerably(device, "user requested size",
4095					    p_usize, my_usize);
4096
4097		/* if this is the first connect, or an otherwise expected
4098		 * param exchange, choose the minimum */
4099		if (device->state.conn == C_WF_REPORT_PARAMS)
4100			p_usize = min_not_zero(my_usize, p_usize);
4101
4102		/* Never shrink a device with usable data during connect,
4103		 * or "attach" on the peer.
4104		 * But allow online shrinking if we are connected. */
4105		new_size = drbd_new_dev_size(device, device->ldev, p_usize, 0);
4106		if (new_size < cur_size &&
4107		    device->state.disk >= D_OUTDATED &&
4108		    (device->state.conn < C_CONNECTED || device->state.pdsk == D_DISKLESS)) {
4109			drbd_err(device, "The peer's disk size is too small! (%llu < %llu sectors)\n",
4110					(unsigned long long)new_size, (unsigned long long)cur_size);
4111			conn_request_state(peer_device->connection, NS(conn, C_DISCONNECTING), CS_HARD);
4112			put_ldev(device);
4113			return -EIO;
4114		}
4115
4116		if (my_usize != p_usize) {
4117			struct disk_conf *old_disk_conf, *new_disk_conf = NULL;
4118
4119			new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
4120			if (!new_disk_conf) {
4121				put_ldev(device);
4122				return -ENOMEM;
4123			}
4124
4125			mutex_lock(&connection->resource->conf_update);
4126			old_disk_conf = device->ldev->disk_conf;
4127			*new_disk_conf = *old_disk_conf;
4128			new_disk_conf->disk_size = p_usize;
4129
4130			rcu_assign_pointer(device->ldev->disk_conf, new_disk_conf);
4131			mutex_unlock(&connection->resource->conf_update);
4132			kvfree_rcu_mightsleep(old_disk_conf);
4133
4134			drbd_info(device, "Peer sets u_size to %lu sectors (old: %lu)\n",
4135				 (unsigned long)p_usize, (unsigned long)my_usize);
4136		}
4137
4138		put_ldev(device);
4139	}
4140
4141	device->peer_max_bio_size = be32_to_cpu(p->max_bio_size);
4142	/* Leave drbd_reconsider_queue_parameters() before drbd_determine_dev_size().
4143	   In case we cleared the QUEUE_FLAG_DISCARD from our queue in
4144	   drbd_reconsider_queue_parameters(), we can be sure that after
4145	   drbd_determine_dev_size() no REQ_DISCARDs are in the queue. */
4146
4147	ddsf = be16_to_cpu(p->dds_flags);
4148	if (get_ldev(device)) {
4149		drbd_reconsider_queue_parameters(device, device->ldev, o);
4150		dd = drbd_determine_dev_size(device, ddsf, NULL);
4151		put_ldev(device);
4152		if (dd == DS_ERROR)
4153			return -EIO;
4154		drbd_md_sync(device);
4155	} else {
4156		/*
4157		 * I am diskless, need to accept the peer's *current* size.
4158		 * I must NOT accept the peers backing disk size,
4159		 * it may have been larger than mine all along...
4160		 *
4161		 * At this point, the peer knows more about my disk, or at
4162		 * least about what we last agreed upon, than myself.
4163		 * So if his c_size is less than his d_size, the most likely
4164		 * reason is that *my* d_size was smaller last time we checked.
4165		 *
4166		 * However, if he sends a zero current size,
4167		 * take his (user-capped or) backing disk size anyways.
4168		 *
4169		 * Unless of course he does not have a disk himself.
4170		 * In which case we ignore this completely.
4171		 */
4172		sector_t new_size = p_csize ?: p_usize ?: p_size;
4173		drbd_reconsider_queue_parameters(device, NULL, o);
4174		if (new_size == 0) {
4175			/* Ignore, peer does not know nothing. */
4176		} else if (new_size == cur_size) {
4177			/* nothing to do */
4178		} else if (cur_size != 0 && p_size == 0) {
4179			drbd_warn(device, "Ignored diskless peer device size (peer:%llu != me:%llu sectors)!\n",
4180					(unsigned long long)new_size, (unsigned long long)cur_size);
4181		} else if (new_size < cur_size && device->state.role == R_PRIMARY) {
4182			drbd_err(device, "The peer's device size is too small! (%llu < %llu sectors); demote me first!\n",
4183					(unsigned long long)new_size, (unsigned long long)cur_size);
4184			conn_request_state(peer_device->connection, NS(conn, C_DISCONNECTING), CS_HARD);
4185			return -EIO;
4186		} else {
4187			/* I believe the peer, if
4188			 *  - I don't have a current size myself
4189			 *  - we agree on the size anyways
4190			 *  - I do have a current size, am Secondary,
4191			 *    and he has the only disk
4192			 *  - I do have a current size, am Primary,
4193			 *    and he has the only disk,
4194			 *    which is larger than my current size
4195			 */
4196			drbd_set_my_capacity(device, new_size);
4197		}
4198	}
4199
4200	if (get_ldev(device)) {
4201		if (device->ldev->known_size != drbd_get_capacity(device->ldev->backing_bdev)) {
4202			device->ldev->known_size = drbd_get_capacity(device->ldev->backing_bdev);
 
 
 
4203			ldsc = 1;
4204		}
4205
4206		put_ldev(device);
4207	}
4208
4209	if (device->state.conn > C_WF_REPORT_PARAMS) {
4210		if (be64_to_cpu(p->c_size) != get_capacity(device->vdisk) ||
4211		    ldsc) {
4212			/* we have different sizes, probably peer
4213			 * needs to know my new size... */
4214			drbd_send_sizes(peer_device, 0, ddsf);
4215		}
4216		if (test_and_clear_bit(RESIZE_PENDING, &device->flags) ||
4217		    (dd == DS_GREW && device->state.conn == C_CONNECTED)) {
4218			if (device->state.pdsk >= D_INCONSISTENT &&
4219			    device->state.disk >= D_INCONSISTENT) {
4220				if (ddsf & DDSF_NO_RESYNC)
4221					drbd_info(device, "Resync of new storage suppressed with --assume-clean\n");
4222				else
4223					resync_after_online_grow(device);
4224			} else
4225				set_bit(RESYNC_AFTER_NEG, &device->flags);
4226		}
4227	}
4228
4229	return 0;
4230}
4231
4232static int receive_uuids(struct drbd_connection *connection, struct packet_info *pi)
4233{
4234	struct drbd_peer_device *peer_device;
4235	struct drbd_device *device;
4236	struct p_uuids *p = pi->data;
4237	u64 *p_uuid;
4238	int i, updated_uuids = 0;
4239
4240	peer_device = conn_peer_device(connection, pi->vnr);
4241	if (!peer_device)
4242		return config_unknown_volume(connection, pi);
4243	device = peer_device->device;
4244
4245	p_uuid = kmalloc_array(UI_EXTENDED_SIZE, sizeof(*p_uuid), GFP_NOIO);
4246	if (!p_uuid)
4247		return false;
4248
4249	for (i = UI_CURRENT; i < UI_EXTENDED_SIZE; i++)
4250		p_uuid[i] = be64_to_cpu(p->uuid[i]);
4251
4252	kfree(device->p_uuid);
4253	device->p_uuid = p_uuid;
4254
4255	if ((device->state.conn < C_CONNECTED || device->state.pdsk == D_DISKLESS) &&
4256	    device->state.disk < D_INCONSISTENT &&
4257	    device->state.role == R_PRIMARY &&
4258	    (device->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) {
4259		drbd_err(device, "Can only connect to data with current UUID=%016llX\n",
4260		    (unsigned long long)device->ed_uuid);
4261		conn_request_state(peer_device->connection, NS(conn, C_DISCONNECTING), CS_HARD);
4262		return -EIO;
4263	}
4264
4265	if (get_ldev(device)) {
4266		int skip_initial_sync =
4267			device->state.conn == C_CONNECTED &&
4268			peer_device->connection->agreed_pro_version >= 90 &&
4269			device->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED &&
4270			(p_uuid[UI_FLAGS] & 8);
4271		if (skip_initial_sync) {
4272			drbd_info(device, "Accepted new current UUID, preparing to skip initial sync\n");
4273			drbd_bitmap_io(device, &drbd_bmio_clear_n_write,
4274					"clear_n_write from receive_uuids",
4275					BM_LOCKED_TEST_ALLOWED, NULL);
4276			_drbd_uuid_set(device, UI_CURRENT, p_uuid[UI_CURRENT]);
4277			_drbd_uuid_set(device, UI_BITMAP, 0);
4278			_drbd_set_state(_NS2(device, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
4279					CS_VERBOSE, NULL);
4280			drbd_md_sync(device);
4281			updated_uuids = 1;
4282		}
4283		put_ldev(device);
4284	} else if (device->state.disk < D_INCONSISTENT &&
4285		   device->state.role == R_PRIMARY) {
4286		/* I am a diskless primary, the peer just created a new current UUID
4287		   for me. */
4288		updated_uuids = drbd_set_ed_uuid(device, p_uuid[UI_CURRENT]);
4289	}
4290
4291	/* Before we test for the disk state, we should wait until an eventually
4292	   ongoing cluster wide state change is finished. That is important if
4293	   we are primary and are detaching from our disk. We need to see the
4294	   new disk state... */
4295	mutex_lock(device->state_mutex);
4296	mutex_unlock(device->state_mutex);
4297	if (device->state.conn >= C_CONNECTED && device->state.disk < D_INCONSISTENT)
4298		updated_uuids |= drbd_set_ed_uuid(device, p_uuid[UI_CURRENT]);
4299
4300	if (updated_uuids)
4301		drbd_print_uuids(device, "receiver updated UUIDs to");
4302
4303	return 0;
4304}
4305
4306/**
4307 * convert_state() - Converts the peer's view of the cluster state to our point of view
4308 * @ps:		The state as seen by the peer.
4309 */
4310static union drbd_state convert_state(union drbd_state ps)
4311{
4312	union drbd_state ms;
4313
4314	static enum drbd_conns c_tab[] = {
4315		[C_WF_REPORT_PARAMS] = C_WF_REPORT_PARAMS,
4316		[C_CONNECTED] = C_CONNECTED,
4317
4318		[C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
4319		[C_STARTING_SYNC_T] = C_STARTING_SYNC_S,
4320		[C_DISCONNECTING] = C_TEAR_DOWN, /* C_NETWORK_FAILURE, */
4321		[C_VERIFY_S]       = C_VERIFY_T,
4322		[C_MASK]   = C_MASK,
4323	};
4324
4325	ms.i = ps.i;
4326
4327	ms.conn = c_tab[ps.conn];
4328	ms.peer = ps.role;
4329	ms.role = ps.peer;
4330	ms.pdsk = ps.disk;
4331	ms.disk = ps.pdsk;
4332	ms.peer_isp = (ps.aftr_isp | ps.user_isp);
4333
4334	return ms;
4335}
4336
4337static int receive_req_state(struct drbd_connection *connection, struct packet_info *pi)
4338{
4339	struct drbd_peer_device *peer_device;
4340	struct drbd_device *device;
4341	struct p_req_state *p = pi->data;
4342	union drbd_state mask, val;
4343	enum drbd_state_rv rv;
4344
4345	peer_device = conn_peer_device(connection, pi->vnr);
4346	if (!peer_device)
4347		return -EIO;
4348	device = peer_device->device;
4349
4350	mask.i = be32_to_cpu(p->mask);
4351	val.i = be32_to_cpu(p->val);
4352
4353	if (test_bit(RESOLVE_CONFLICTS, &peer_device->connection->flags) &&
4354	    mutex_is_locked(device->state_mutex)) {
4355		drbd_send_sr_reply(peer_device, SS_CONCURRENT_ST_CHG);
4356		return 0;
4357	}
4358
4359	mask = convert_state(mask);
4360	val = convert_state(val);
4361
4362	rv = drbd_change_state(device, CS_VERBOSE, mask, val);
4363	drbd_send_sr_reply(peer_device, rv);
4364
4365	drbd_md_sync(device);
4366
4367	return 0;
4368}
4369
4370static int receive_req_conn_state(struct drbd_connection *connection, struct packet_info *pi)
4371{
4372	struct p_req_state *p = pi->data;
4373	union drbd_state mask, val;
4374	enum drbd_state_rv rv;
4375
4376	mask.i = be32_to_cpu(p->mask);
4377	val.i = be32_to_cpu(p->val);
4378
4379	if (test_bit(RESOLVE_CONFLICTS, &connection->flags) &&
4380	    mutex_is_locked(&connection->cstate_mutex)) {
4381		conn_send_sr_reply(connection, SS_CONCURRENT_ST_CHG);
4382		return 0;
4383	}
4384
4385	mask = convert_state(mask);
4386	val = convert_state(val);
4387
4388	rv = conn_request_state(connection, mask, val, CS_VERBOSE | CS_LOCAL_ONLY | CS_IGN_OUTD_FAIL);
4389	conn_send_sr_reply(connection, rv);
4390
4391	return 0;
4392}
4393
4394static int receive_state(struct drbd_connection *connection, struct packet_info *pi)
4395{
4396	struct drbd_peer_device *peer_device;
4397	struct drbd_device *device;
4398	struct p_state *p = pi->data;
4399	union drbd_state os, ns, peer_state;
4400	enum drbd_disk_state real_peer_disk;
4401	enum chg_state_flags cs_flags;
4402	int rv;
4403
4404	peer_device = conn_peer_device(connection, pi->vnr);
4405	if (!peer_device)
4406		return config_unknown_volume(connection, pi);
4407	device = peer_device->device;
4408
4409	peer_state.i = be32_to_cpu(p->state);
4410
4411	real_peer_disk = peer_state.disk;
4412	if (peer_state.disk == D_NEGOTIATING) {
4413		real_peer_disk = device->p_uuid[UI_FLAGS] & 4 ? D_INCONSISTENT : D_CONSISTENT;
4414		drbd_info(device, "real peer disk state = %s\n", drbd_disk_str(real_peer_disk));
4415	}
4416
4417	spin_lock_irq(&device->resource->req_lock);
4418 retry:
4419	os = ns = drbd_read_state(device);
4420	spin_unlock_irq(&device->resource->req_lock);
4421
4422	/* If some other part of the code (ack_receiver thread, timeout)
4423	 * already decided to close the connection again,
4424	 * we must not "re-establish" it here. */
4425	if (os.conn <= C_TEAR_DOWN)
4426		return -ECONNRESET;
4427
4428	/* If this is the "end of sync" confirmation, usually the peer disk
4429	 * transitions from D_INCONSISTENT to D_UP_TO_DATE. For empty (0 bits
4430	 * set) resync started in PausedSyncT, or if the timing of pause-/
4431	 * unpause-sync events has been "just right", the peer disk may
4432	 * transition from D_CONSISTENT to D_UP_TO_DATE as well.
4433	 */
4434	if ((os.pdsk == D_INCONSISTENT || os.pdsk == D_CONSISTENT) &&
4435	    real_peer_disk == D_UP_TO_DATE &&
4436	    os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
4437		/* If we are (becoming) SyncSource, but peer is still in sync
4438		 * preparation, ignore its uptodate-ness to avoid flapping, it
4439		 * will change to inconsistent once the peer reaches active
4440		 * syncing states.
4441		 * It may have changed syncer-paused flags, however, so we
4442		 * cannot ignore this completely. */
4443		if (peer_state.conn > C_CONNECTED &&
4444		    peer_state.conn < C_SYNC_SOURCE)
4445			real_peer_disk = D_INCONSISTENT;
4446
4447		/* if peer_state changes to connected at the same time,
4448		 * it explicitly notifies us that it finished resync.
4449		 * Maybe we should finish it up, too? */
4450		else if (os.conn >= C_SYNC_SOURCE &&
4451			 peer_state.conn == C_CONNECTED) {
4452			if (drbd_bm_total_weight(device) <= device->rs_failed)
4453				drbd_resync_finished(peer_device);
4454			return 0;
4455		}
4456	}
4457
4458	/* explicit verify finished notification, stop sector reached. */
4459	if (os.conn == C_VERIFY_T && os.disk == D_UP_TO_DATE &&
4460	    peer_state.conn == C_CONNECTED && real_peer_disk == D_UP_TO_DATE) {
4461		ov_out_of_sync_print(peer_device);
4462		drbd_resync_finished(peer_device);
4463		return 0;
4464	}
4465
4466	/* peer says his disk is inconsistent, while we think it is uptodate,
4467	 * and this happens while the peer still thinks we have a sync going on,
4468	 * but we think we are already done with the sync.
4469	 * We ignore this to avoid flapping pdsk.
4470	 * This should not happen, if the peer is a recent version of drbd. */
4471	if (os.pdsk == D_UP_TO_DATE && real_peer_disk == D_INCONSISTENT &&
4472	    os.conn == C_CONNECTED && peer_state.conn > C_SYNC_SOURCE)
4473		real_peer_disk = D_UP_TO_DATE;
4474
4475	if (ns.conn == C_WF_REPORT_PARAMS)
4476		ns.conn = C_CONNECTED;
4477
4478	if (peer_state.conn == C_AHEAD)
4479		ns.conn = C_BEHIND;
4480
4481	/* TODO:
4482	 * if (primary and diskless and peer uuid != effective uuid)
4483	 *     abort attach on peer;
4484	 *
4485	 * If this node does not have good data, was already connected, but
4486	 * the peer did a late attach only now, trying to "negotiate" with me,
4487	 * AND I am currently Primary, possibly frozen, with some specific
4488	 * "effective" uuid, this should never be reached, really, because
4489	 * we first send the uuids, then the current state.
4490	 *
4491	 * In this scenario, we already dropped the connection hard
4492	 * when we received the unsuitable uuids (receive_uuids().
4493	 *
4494	 * Should we want to change this, that is: not drop the connection in
4495	 * receive_uuids() already, then we would need to add a branch here
4496	 * that aborts the attach of "unsuitable uuids" on the peer in case
4497	 * this node is currently Diskless Primary.
4498	 */
4499
4500	if (device->p_uuid && peer_state.disk >= D_NEGOTIATING &&
4501	    get_ldev_if_state(device, D_NEGOTIATING)) {
4502		int cr; /* consider resync */
4503
4504		/* if we established a new connection */
4505		cr  = (os.conn < C_CONNECTED);
4506		/* if we had an established connection
4507		 * and one of the nodes newly attaches a disk */
4508		cr |= (os.conn == C_CONNECTED &&
4509		       (peer_state.disk == D_NEGOTIATING ||
4510			os.disk == D_NEGOTIATING));
4511		/* if we have both been inconsistent, and the peer has been
4512		 * forced to be UpToDate with --force */
4513		cr |= test_bit(CONSIDER_RESYNC, &device->flags);
4514		/* if we had been plain connected, and the admin requested to
4515		 * start a sync by "invalidate" or "invalidate-remote" */
4516		cr |= (os.conn == C_CONNECTED &&
4517				(peer_state.conn >= C_STARTING_SYNC_S &&
4518				 peer_state.conn <= C_WF_BITMAP_T));
4519
4520		if (cr)
4521			ns.conn = drbd_sync_handshake(peer_device, peer_state.role, real_peer_disk);
4522
4523		put_ldev(device);
4524		if (ns.conn == C_MASK) {
4525			ns.conn = C_CONNECTED;
4526			if (device->state.disk == D_NEGOTIATING) {
4527				drbd_force_state(device, NS(disk, D_FAILED));
4528			} else if (peer_state.disk == D_NEGOTIATING) {
4529				drbd_err(device, "Disk attach process on the peer node was aborted.\n");
4530				peer_state.disk = D_DISKLESS;
4531				real_peer_disk = D_DISKLESS;
4532			} else {
4533				if (test_and_clear_bit(CONN_DRY_RUN, &peer_device->connection->flags))
4534					return -EIO;
4535				D_ASSERT(device, os.conn == C_WF_REPORT_PARAMS);
4536				conn_request_state(peer_device->connection, NS(conn, C_DISCONNECTING), CS_HARD);
4537				return -EIO;
4538			}
4539		}
4540	}
4541
4542	spin_lock_irq(&device->resource->req_lock);
4543	if (os.i != drbd_read_state(device).i)
4544		goto retry;
4545	clear_bit(CONSIDER_RESYNC, &device->flags);
4546	ns.peer = peer_state.role;
4547	ns.pdsk = real_peer_disk;
4548	ns.peer_isp = (peer_state.aftr_isp | peer_state.user_isp);
4549	if ((ns.conn == C_CONNECTED || ns.conn == C_WF_BITMAP_S) && ns.disk == D_NEGOTIATING)
4550		ns.disk = device->new_state_tmp.disk;
4551	cs_flags = CS_VERBOSE + (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED ? 0 : CS_HARD);
4552	if (ns.pdsk == D_CONSISTENT && drbd_suspended(device) && ns.conn == C_CONNECTED && os.conn < C_CONNECTED &&
4553	    test_bit(NEW_CUR_UUID, &device->flags)) {
4554		/* Do not allow tl_restart(RESEND) for a rebooted peer. We can only allow this
4555		   for temporal network outages! */
4556		spin_unlock_irq(&device->resource->req_lock);
4557		drbd_err(device, "Aborting Connect, can not thaw IO with an only Consistent peer\n");
4558		tl_clear(peer_device->connection);
4559		drbd_uuid_new_current(device);
4560		clear_bit(NEW_CUR_UUID, &device->flags);
4561		conn_request_state(peer_device->connection, NS2(conn, C_PROTOCOL_ERROR, susp, 0), CS_HARD);
4562		return -EIO;
4563	}
4564	rv = _drbd_set_state(device, ns, cs_flags, NULL);
4565	ns = drbd_read_state(device);
4566	spin_unlock_irq(&device->resource->req_lock);
4567
4568	if (rv < SS_SUCCESS) {
4569		conn_request_state(peer_device->connection, NS(conn, C_DISCONNECTING), CS_HARD);
4570		return -EIO;
4571	}
4572
4573	if (os.conn > C_WF_REPORT_PARAMS) {
4574		if (ns.conn > C_CONNECTED && peer_state.conn <= C_CONNECTED &&
4575		    peer_state.disk != D_NEGOTIATING ) {
4576			/* we want resync, peer has not yet decided to sync... */
4577			/* Nowadays only used when forcing a node into primary role and
4578			   setting its disk to UpToDate with that */
4579			drbd_send_uuids(peer_device);
4580			drbd_send_current_state(peer_device);
4581		}
4582	}
4583
4584	clear_bit(DISCARD_MY_DATA, &device->flags);
4585
4586	drbd_md_sync(device); /* update connected indicator, la_size_sect, ... */
4587
4588	return 0;
4589}
4590
4591static int receive_sync_uuid(struct drbd_connection *connection, struct packet_info *pi)
4592{
4593	struct drbd_peer_device *peer_device;
4594	struct drbd_device *device;
4595	struct p_rs_uuid *p = pi->data;
4596
4597	peer_device = conn_peer_device(connection, pi->vnr);
4598	if (!peer_device)
4599		return -EIO;
4600	device = peer_device->device;
4601
4602	wait_event(device->misc_wait,
4603		   device->state.conn == C_WF_SYNC_UUID ||
4604		   device->state.conn == C_BEHIND ||
4605		   device->state.conn < C_CONNECTED ||
4606		   device->state.disk < D_NEGOTIATING);
4607
4608	/* D_ASSERT(device,  device->state.conn == C_WF_SYNC_UUID ); */
4609
4610	/* Here the _drbd_uuid_ functions are right, current should
4611	   _not_ be rotated into the history */
4612	if (get_ldev_if_state(device, D_NEGOTIATING)) {
4613		_drbd_uuid_set(device, UI_CURRENT, be64_to_cpu(p->uuid));
4614		_drbd_uuid_set(device, UI_BITMAP, 0UL);
4615
4616		drbd_print_uuids(device, "updated sync uuid");
4617		drbd_start_resync(device, C_SYNC_TARGET);
4618
4619		put_ldev(device);
4620	} else
4621		drbd_err(device, "Ignoring SyncUUID packet!\n");
4622
4623	return 0;
4624}
4625
4626/*
4627 * receive_bitmap_plain
4628 *
4629 * Return 0 when done, 1 when another iteration is needed, and a negative error
4630 * code upon failure.
4631 */
4632static int
4633receive_bitmap_plain(struct drbd_peer_device *peer_device, unsigned int size,
4634		     unsigned long *p, struct bm_xfer_ctx *c)
4635{
4636	unsigned int data_size = DRBD_SOCKET_BUFFER_SIZE -
4637				 drbd_header_size(peer_device->connection);
4638	unsigned int num_words = min_t(size_t, data_size / sizeof(*p),
4639				       c->bm_words - c->word_offset);
4640	unsigned int want = num_words * sizeof(*p);
4641	int err;
4642
4643	if (want != size) {
4644		drbd_err(peer_device, "%s:want (%u) != size (%u)\n", __func__, want, size);
4645		return -EIO;
4646	}
4647	if (want == 0)
4648		return 0;
4649	err = drbd_recv_all(peer_device->connection, p, want);
4650	if (err)
 
 
4651		return err;
 
4652
4653	drbd_bm_merge_lel(peer_device->device, c->word_offset, num_words, p);
4654
4655	c->word_offset += num_words;
4656	c->bit_offset = c->word_offset * BITS_PER_LONG;
4657	if (c->bit_offset > c->bm_bits)
4658		c->bit_offset = c->bm_bits;
4659
4660	return 1;
4661}
4662
4663static enum drbd_bitmap_code dcbp_get_code(struct p_compressed_bm *p)
4664{
4665	return (enum drbd_bitmap_code)(p->encoding & 0x0f);
4666}
4667
4668static int dcbp_get_start(struct p_compressed_bm *p)
4669{
4670	return (p->encoding & 0x80) != 0;
4671}
4672
4673static int dcbp_get_pad_bits(struct p_compressed_bm *p)
4674{
4675	return (p->encoding >> 4) & 0x7;
4676}
4677
4678/*
4679 * recv_bm_rle_bits
4680 *
4681 * Return 0 when done, 1 when another iteration is needed, and a negative error
4682 * code upon failure.
4683 */
4684static int
4685recv_bm_rle_bits(struct drbd_peer_device *peer_device,
4686		struct p_compressed_bm *p,
4687		 struct bm_xfer_ctx *c,
4688		 unsigned int len)
4689{
4690	struct bitstream bs;
4691	u64 look_ahead;
4692	u64 rl;
4693	u64 tmp;
4694	unsigned long s = c->bit_offset;
4695	unsigned long e;
4696	int toggle = dcbp_get_start(p);
 
4697	int have;
4698	int bits;
4699
4700	bitstream_init(&bs, p->code, len, dcbp_get_pad_bits(p));
4701
4702	bits = bitstream_get_bits(&bs, &look_ahead, 64);
4703	if (bits < 0)
4704		return -EIO;
4705
4706	for (have = bits; have > 0; s += rl, toggle = !toggle) {
4707		bits = vli_decode_bits(&rl, look_ahead);
4708		if (bits <= 0)
4709			return -EIO;
4710
4711		if (toggle) {
4712			e = s + rl -1;
4713			if (e >= c->bm_bits) {
4714				drbd_err(peer_device, "bitmap overflow (e:%lu) while decoding bm RLE packet\n", e);
4715				return -EIO;
4716			}
4717			_drbd_bm_set_bits(peer_device->device, s, e);
4718		}
4719
4720		if (have < bits) {
4721			drbd_err(peer_device, "bitmap decoding error: h:%d b:%d la:0x%08llx l:%u/%u\n",
4722				have, bits, look_ahead,
4723				(unsigned int)(bs.cur.b - p->code),
4724				(unsigned int)bs.buf_len);
4725			return -EIO;
4726		}
4727		/* if we consumed all 64 bits, assign 0; >> 64 is "undefined"; */
4728		if (likely(bits < 64))
4729			look_ahead >>= bits;
4730		else
4731			look_ahead = 0;
4732		have -= bits;
4733
4734		bits = bitstream_get_bits(&bs, &tmp, 64 - have);
4735		if (bits < 0)
4736			return -EIO;
4737		look_ahead |= tmp << have;
4738		have += bits;
4739	}
4740
4741	c->bit_offset = s;
4742	bm_xfer_ctx_bit_to_word_offset(c);
4743
4744	return (s != c->bm_bits);
4745}
4746
4747/*
4748 * decode_bitmap_c
4749 *
4750 * Return 0 when done, 1 when another iteration is needed, and a negative error
4751 * code upon failure.
4752 */
4753static int
4754decode_bitmap_c(struct drbd_peer_device *peer_device,
4755		struct p_compressed_bm *p,
4756		struct bm_xfer_ctx *c,
4757		unsigned int len)
4758{
4759	if (dcbp_get_code(p) == RLE_VLI_Bits)
4760		return recv_bm_rle_bits(peer_device, p, c, len - sizeof(*p));
4761
4762	/* other variants had been implemented for evaluation,
4763	 * but have been dropped as this one turned out to be "best"
4764	 * during all our tests. */
4765
4766	drbd_err(peer_device, "receive_bitmap_c: unknown encoding %u\n", p->encoding);
4767	conn_request_state(peer_device->connection, NS(conn, C_PROTOCOL_ERROR), CS_HARD);
4768	return -EIO;
4769}
4770
4771void INFO_bm_xfer_stats(struct drbd_peer_device *peer_device,
4772		const char *direction, struct bm_xfer_ctx *c)
4773{
4774	/* what would it take to transfer it "plaintext" */
4775	unsigned int header_size = drbd_header_size(peer_device->connection);
4776	unsigned int data_size = DRBD_SOCKET_BUFFER_SIZE - header_size;
4777	unsigned int plain =
4778		header_size * (DIV_ROUND_UP(c->bm_words, data_size) + 1) +
4779		c->bm_words * sizeof(unsigned long);
4780	unsigned int total = c->bytes[0] + c->bytes[1];
4781	unsigned int r;
4782
4783	/* total can not be zero. but just in case: */
4784	if (total == 0)
4785		return;
4786
4787	/* don't report if not compressed */
4788	if (total >= plain)
4789		return;
4790
4791	/* total < plain. check for overflow, still */
4792	r = (total > UINT_MAX/1000) ? (total / (plain/1000))
4793		                    : (1000 * total / plain);
4794
4795	if (r > 1000)
4796		r = 1000;
4797
4798	r = 1000 - r;
4799	drbd_info(peer_device, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), "
4800	     "total %u; compression: %u.%u%%\n",
4801			direction,
4802			c->bytes[1], c->packets[1],
4803			c->bytes[0], c->packets[0],
4804			total, r/10, r % 10);
4805}
4806
4807/* Since we are processing the bitfield from lower addresses to higher,
4808   it does not matter if the process it in 32 bit chunks or 64 bit
4809   chunks as long as it is little endian. (Understand it as byte stream,
4810   beginning with the lowest byte...) If we would use big endian
4811   we would need to process it from the highest address to the lowest,
4812   in order to be agnostic to the 32 vs 64 bits issue.
4813
4814   returns 0 on failure, 1 if we successfully received it. */
4815static int receive_bitmap(struct drbd_connection *connection, struct packet_info *pi)
4816{
4817	struct drbd_peer_device *peer_device;
4818	struct drbd_device *device;
4819	struct bm_xfer_ctx c;
 
4820	int err;
 
 
4821
4822	peer_device = conn_peer_device(connection, pi->vnr);
4823	if (!peer_device)
4824		return -EIO;
4825	device = peer_device->device;
4826
4827	drbd_bm_lock(device, "receive bitmap", BM_LOCKED_SET_ALLOWED);
4828	/* you are supposed to send additional out-of-sync information
4829	 * if you actually set bits during this phase */
4830
 
 
 
 
 
 
 
 
4831	c = (struct bm_xfer_ctx) {
4832		.bm_bits = drbd_bm_bits(device),
4833		.bm_words = drbd_bm_words(device),
4834	};
4835
4836	for(;;) {
4837		if (pi->cmd == P_BITMAP)
4838			err = receive_bitmap_plain(peer_device, pi->size, pi->data, &c);
4839		else if (pi->cmd == P_COMPRESSED_BITMAP) {
4840			/* MAYBE: sanity check that we speak proto >= 90,
4841			 * and the feature is enabled! */
4842			struct p_compressed_bm *p = pi->data;
4843
4844			if (pi->size > DRBD_SOCKET_BUFFER_SIZE - drbd_header_size(connection)) {
4845				drbd_err(device, "ReportCBitmap packet too large\n");
4846				err = -EIO;
4847				goto out;
4848			}
4849			if (pi->size <= sizeof(*p)) {
4850				drbd_err(device, "ReportCBitmap packet too small (l:%u)\n", pi->size);
4851				err = -EIO;
 
 
 
 
4852				goto out;
4853			}
4854			err = drbd_recv_all(peer_device->connection, p, pi->size);
4855			if (err)
4856			       goto out;
4857			err = decode_bitmap_c(peer_device, p, &c, pi->size);
4858		} else {
4859			drbd_warn(device, "receive_bitmap: cmd neither ReportBitMap nor ReportCBitMap (is 0x%x)", pi->cmd);
4860			err = -EIO;
4861			goto out;
4862		}
4863
4864		c.packets[pi->cmd == P_BITMAP]++;
4865		c.bytes[pi->cmd == P_BITMAP] += drbd_header_size(connection) + pi->size;
4866
4867		if (err <= 0) {
4868			if (err < 0)
4869				goto out;
4870			break;
4871		}
4872		err = drbd_recv_header(peer_device->connection, pi);
4873		if (err)
4874			goto out;
4875	}
4876
4877	INFO_bm_xfer_stats(peer_device, "receive", &c);
4878
4879	if (device->state.conn == C_WF_BITMAP_T) {
4880		enum drbd_state_rv rv;
4881
4882		err = drbd_send_bitmap(device, peer_device);
4883		if (err)
4884			goto out;
4885		/* Omit CS_ORDERED with this state transition to avoid deadlocks. */
4886		rv = _drbd_request_state(device, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
4887		D_ASSERT(device, rv == SS_SUCCESS);
4888	} else if (device->state.conn != C_WF_BITMAP_S) {
4889		/* admin may have requested C_DISCONNECTING,
4890		 * other threads may have noticed network errors */
4891		drbd_info(device, "unexpected cstate (%s) in receive_bitmap\n",
4892		    drbd_conn_str(device->state.conn));
4893	}
4894	err = 0;
4895
 
4896 out:
4897	drbd_bm_unlock(device);
4898	if (!err && device->state.conn == C_WF_BITMAP_S)
4899		drbd_start_resync(device, C_SYNC_SOURCE);
4900	return err;
 
4901}
4902
4903static int receive_skip(struct drbd_connection *connection, struct packet_info *pi)
4904{
4905	drbd_warn(connection, "skipping unknown optional packet type %d, l: %d!\n",
4906		 pi->cmd, pi->size);
 
4907
4908	return ignore_remaining_packet(connection, pi);
 
 
 
 
 
 
 
 
 
 
4909}
4910
4911static int receive_UnplugRemote(struct drbd_connection *connection, struct packet_info *pi)
4912{
4913	/* Make sure we've acked all the TCP data associated
4914	 * with the data requests being unplugged */
4915	tcp_sock_set_quickack(connection->data.socket->sk, 2);
4916	return 0;
 
4917}
4918
4919static int receive_out_of_sync(struct drbd_connection *connection, struct packet_info *pi)
4920{
4921	struct drbd_peer_device *peer_device;
4922	struct drbd_device *device;
4923	struct p_block_desc *p = pi->data;
4924
4925	peer_device = conn_peer_device(connection, pi->vnr);
4926	if (!peer_device)
4927		return -EIO;
4928	device = peer_device->device;
4929
4930	switch (device->state.conn) {
4931	case C_WF_SYNC_UUID:
4932	case C_WF_BITMAP_T:
4933	case C_BEHIND:
4934			break;
4935	default:
4936		drbd_err(device, "ASSERT FAILED cstate = %s, expected: WFSyncUUID|WFBitMapT|Behind\n",
4937				drbd_conn_str(device->state.conn));
4938	}
4939
4940	drbd_set_out_of_sync(peer_device, be64_to_cpu(p->sector), be32_to_cpu(p->blksize));
4941
4942	return 0;
4943}
4944
4945static int receive_rs_deallocated(struct drbd_connection *connection, struct packet_info *pi)
4946{
4947	struct drbd_peer_device *peer_device;
4948	struct p_block_desc *p = pi->data;
4949	struct drbd_device *device;
4950	sector_t sector;
4951	int size, err = 0;
4952
4953	peer_device = conn_peer_device(connection, pi->vnr);
4954	if (!peer_device)
4955		return -EIO;
4956	device = peer_device->device;
4957
4958	sector = be64_to_cpu(p->sector);
4959	size = be32_to_cpu(p->blksize);
4960
4961	dec_rs_pending(peer_device);
4962
4963	if (get_ldev(device)) {
4964		struct drbd_peer_request *peer_req;
4965
4966		peer_req = drbd_alloc_peer_req(peer_device, ID_SYNCER, sector,
4967					       size, 0, GFP_NOIO);
4968		if (!peer_req) {
4969			put_ldev(device);
4970			return -ENOMEM;
4971		}
4972
4973		peer_req->w.cb = e_end_resync_block;
4974		peer_req->opf = REQ_OP_DISCARD;
4975		peer_req->submit_jif = jiffies;
4976		peer_req->flags |= EE_TRIM;
4977
4978		spin_lock_irq(&device->resource->req_lock);
4979		list_add_tail(&peer_req->w.list, &device->sync_ee);
4980		spin_unlock_irq(&device->resource->req_lock);
4981
4982		atomic_add(pi->size >> 9, &device->rs_sect_ev);
4983		err = drbd_submit_peer_request(peer_req);
4984
4985		if (err) {
4986			spin_lock_irq(&device->resource->req_lock);
4987			list_del(&peer_req->w.list);
4988			spin_unlock_irq(&device->resource->req_lock);
4989
4990			drbd_free_peer_req(device, peer_req);
4991			put_ldev(device);
4992			err = 0;
4993			goto fail;
4994		}
4995
4996		inc_unacked(device);
4997
4998		/* No put_ldev() here. Gets called in drbd_endio_write_sec_final(),
4999		   as well as drbd_rs_complete_io() */
5000	} else {
5001	fail:
5002		drbd_rs_complete_io(device, sector);
5003		drbd_send_ack_ex(peer_device, P_NEG_ACK, sector, size, ID_SYNCER);
5004	}
5005
5006	atomic_add(size >> 9, &device->rs_sect_in);
5007
5008	return err;
5009}
5010
5011struct data_cmd {
5012	int expect_payload;
5013	unsigned int pkt_size;
5014	int (*fn)(struct drbd_connection *, struct packet_info *);
5015};
5016
5017static struct data_cmd drbd_cmd_handler[] = {
5018	[P_DATA]	    = { 1, sizeof(struct p_data), receive_Data },
5019	[P_DATA_REPLY]	    = { 1, sizeof(struct p_data), receive_DataReply },
5020	[P_RS_DATA_REPLY]   = { 1, sizeof(struct p_data), receive_RSDataReply } ,
5021	[P_BARRIER]	    = { 0, sizeof(struct p_barrier), receive_Barrier } ,
5022	[P_BITMAP]	    = { 1, 0, receive_bitmap } ,
5023	[P_COMPRESSED_BITMAP] = { 1, 0, receive_bitmap } ,
5024	[P_UNPLUG_REMOTE]   = { 0, 0, receive_UnplugRemote },
5025	[P_DATA_REQUEST]    = { 0, sizeof(struct p_block_req), receive_DataRequest },
5026	[P_RS_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
5027	[P_SYNC_PARAM]	    = { 1, 0, receive_SyncParam },
5028	[P_SYNC_PARAM89]    = { 1, 0, receive_SyncParam },
5029	[P_PROTOCOL]        = { 1, sizeof(struct p_protocol), receive_protocol },
5030	[P_UUIDS]	    = { 0, sizeof(struct p_uuids), receive_uuids },
5031	[P_SIZES]	    = { 0, sizeof(struct p_sizes), receive_sizes },
5032	[P_STATE]	    = { 0, sizeof(struct p_state), receive_state },
5033	[P_STATE_CHG_REQ]   = { 0, sizeof(struct p_req_state), receive_req_state },
5034	[P_SYNC_UUID]       = { 0, sizeof(struct p_rs_uuid), receive_sync_uuid },
5035	[P_OV_REQUEST]      = { 0, sizeof(struct p_block_req), receive_DataRequest },
5036	[P_OV_REPLY]        = { 1, sizeof(struct p_block_req), receive_DataRequest },
5037	[P_CSUM_RS_REQUEST] = { 1, sizeof(struct p_block_req), receive_DataRequest },
5038	[P_RS_THIN_REQ]     = { 0, sizeof(struct p_block_req), receive_DataRequest },
5039	[P_DELAY_PROBE]     = { 0, sizeof(struct p_delay_probe93), receive_skip },
5040	[P_OUT_OF_SYNC]     = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
5041	[P_CONN_ST_CHG_REQ] = { 0, sizeof(struct p_req_state), receive_req_conn_state },
5042	[P_PROTOCOL_UPDATE] = { 1, sizeof(struct p_protocol), receive_protocol },
5043	[P_TRIM]	    = { 0, sizeof(struct p_trim), receive_Data },
5044	[P_ZEROES]	    = { 0, sizeof(struct p_trim), receive_Data },
5045	[P_RS_DEALLOCATED]  = { 0, sizeof(struct p_block_desc), receive_rs_deallocated },
5046};
5047
5048static void drbdd(struct drbd_connection *connection)
 
 
 
 
 
 
 
5049{
5050	struct packet_info pi;
 
 
5051	size_t shs; /* sub header size */
5052	int err;
5053
5054	while (get_t_state(&connection->receiver) == RUNNING) {
5055		struct data_cmd const *cmd;
5056
5057		drbd_thread_current_set_cpu(&connection->receiver);
5058		update_receiver_timing_details(connection, drbd_recv_header_maybe_unplug);
5059		if (drbd_recv_header_maybe_unplug(connection, &pi))
5060			goto err_out;
5061
5062		cmd = &drbd_cmd_handler[pi.cmd];
5063		if (unlikely(pi.cmd >= ARRAY_SIZE(drbd_cmd_handler) || !cmd->fn)) {
5064			drbd_err(connection, "Unexpected data packet %s (0x%04x)",
5065				 cmdname(pi.cmd), pi.cmd);
5066			goto err_out;
5067		}
5068
5069		shs = cmd->pkt_size;
5070		if (pi.cmd == P_SIZES && connection->agreed_features & DRBD_FF_WSAME)
5071			shs += sizeof(struct o_qlim);
5072		if (pi.size > shs && !cmd->expect_payload) {
5073			drbd_err(connection, "No payload expected %s l:%d\n",
5074				 cmdname(pi.cmd), pi.size);
5075			goto err_out;
5076		}
5077		if (pi.size < shs) {
5078			drbd_err(connection, "%s: unexpected packet size, expected:%d received:%d\n",
5079				 cmdname(pi.cmd), (int)shs, pi.size);
5080			goto err_out;
5081		}
5082
5083		if (shs) {
5084			update_receiver_timing_details(connection, drbd_recv_all_warn);
5085			err = drbd_recv_all_warn(connection, pi.data, shs);
5086			if (err)
 
5087				goto err_out;
5088			pi.size -= shs;
5089		}
5090
5091		update_receiver_timing_details(connection, cmd->fn);
5092		err = cmd->fn(connection, &pi);
5093		if (err) {
5094			drbd_err(connection, "error receiving %s, e: %d l: %d!\n",
5095				 cmdname(pi.cmd), err, pi.size);
5096			goto err_out;
5097		}
5098	}
5099	return;
5100
5101    err_out:
5102	conn_request_state(connection, NS(conn, C_PROTOCOL_ERROR), CS_HARD);
 
 
 
 
 
5103}
5104
5105static void conn_disconnect(struct drbd_connection *connection)
5106{
5107	struct drbd_peer_device *peer_device;
5108	enum drbd_conns oc;
5109	int vnr;
 
 
 
 
5110
5111	if (connection->cstate == C_STANDALONE)
5112		return;
 
5113
5114	/* We are about to start the cleanup after connection loss.
5115	 * Make sure drbd_make_request knows about that.
5116	 * Usually we should be in some network failure state already,
5117	 * but just in case we are not, we fix it up here.
5118	 */
5119	conn_request_state(connection, NS(conn, C_NETWORK_FAILURE), CS_HARD);
5120
5121	/* ack_receiver does not clean up anything. it must not interfere, either */
5122	drbd_thread_stop(&connection->ack_receiver);
5123	if (connection->ack_sender) {
5124		destroy_workqueue(connection->ack_sender);
5125		connection->ack_sender = NULL;
5126	}
5127	drbd_free_sock(connection);
5128
5129	rcu_read_lock();
5130	idr_for_each_entry(&connection->peer_devices, peer_device, vnr) {
5131		struct drbd_device *device = peer_device->device;
5132		kref_get(&device->kref);
5133		rcu_read_unlock();
5134		drbd_disconnected(peer_device);
5135		kref_put(&device->kref, drbd_destroy_device);
5136		rcu_read_lock();
5137	}
5138	rcu_read_unlock();
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
5139
5140	if (!list_empty(&connection->current_epoch->list))
5141		drbd_err(connection, "ASSERTION FAILED: connection->current_epoch->list not empty\n");
5142	/* ok, no more ee's on the fly, it is safe to reset the epoch_size */
5143	atomic_set(&connection->current_epoch->epoch_size, 0);
5144	connection->send.seen_any_write_yet = false;
5145
5146	drbd_info(connection, "Connection closed\n");
5147
5148	if (conn_highest_role(connection) == R_PRIMARY && conn_highest_pdsk(connection) >= D_UNKNOWN)
5149		conn_try_outdate_peer_async(connection);
5150
5151	spin_lock_irq(&connection->resource->req_lock);
5152	oc = connection->cstate;
5153	if (oc >= C_UNCONNECTED)
5154		_conn_request_state(connection, NS(conn, C_UNCONNECTED), CS_VERBOSE);
5155
5156	spin_unlock_irq(&connection->resource->req_lock);
5157
5158	if (oc == C_DISCONNECTING)
5159		conn_request_state(connection, NS(conn, C_STANDALONE), CS_VERBOSE | CS_HARD);
5160}
5161
5162static int drbd_disconnected(struct drbd_peer_device *peer_device)
5163{
5164	struct drbd_device *device = peer_device->device;
5165	unsigned int i;
5166
5167	/* wait for current activity to cease. */
5168	spin_lock_irq(&device->resource->req_lock);
5169	_drbd_wait_ee_list_empty(device, &device->active_ee);
5170	_drbd_wait_ee_list_empty(device, &device->sync_ee);
5171	_drbd_wait_ee_list_empty(device, &device->read_ee);
5172	spin_unlock_irq(&device->resource->req_lock);
5173
5174	/* We do not have data structures that would allow us to
5175	 * get the rs_pending_cnt down to 0 again.
5176	 *  * On C_SYNC_TARGET we do not have any data structures describing
5177	 *    the pending RSDataRequest's we have sent.
5178	 *  * On C_SYNC_SOURCE there is no data structure that tracks
5179	 *    the P_RS_DATA_REPLY blocks that we sent to the SyncTarget.
5180	 *  And no, it is not the sum of the reference counts in the
5181	 *  resync_LRU. The resync_LRU tracks the whole operation including
5182	 *  the disk-IO, while the rs_pending_cnt only tracks the blocks
5183	 *  on the fly. */
5184	drbd_rs_cancel_all(device);
5185	device->rs_total = 0;
5186	device->rs_failed = 0;
5187	atomic_set(&device->rs_pending_cnt, 0);
5188	wake_up(&device->misc_wait);
5189
5190	del_timer_sync(&device->resync_timer);
5191	resync_timer_fn(&device->resync_timer);
 
 
 
5192
5193	/* wait for all w_e_end_data_req, w_e_end_rsdata_req, w_send_barrier,
5194	 * w_make_resync_request etc. which may still be on the worker queue
5195	 * to be "canceled" */
5196	drbd_flush_workqueue(&peer_device->connection->sender_work);
 
 
 
 
5197
5198	drbd_finish_peer_reqs(device);
 
5199
5200	/* This second workqueue flush is necessary, since drbd_finish_peer_reqs()
5201	   might have issued a work again. The one before drbd_finish_peer_reqs() is
5202	   necessary to reclain net_ee in drbd_finish_peer_reqs(). */
5203	drbd_flush_workqueue(&peer_device->connection->sender_work);
 
 
 
 
 
 
 
 
5204
5205	/* need to do it again, drbd_finish_peer_reqs() may have populated it
5206	 * again via drbd_try_clear_on_disk_bm(). */
5207	drbd_rs_cancel_all(device);
5208
5209	kfree(device->p_uuid);
5210	device->p_uuid = NULL;
 
 
 
 
 
 
 
5211
5212	if (!drbd_suspended(device))
5213		tl_clear(peer_device->connection);
5214
5215	drbd_md_sync(device);
 
5216
5217	if (get_ldev(device)) {
5218		drbd_bitmap_io(device, &drbd_bm_write_copy_pages,
5219				"write from disconnected", BM_LOCKED_CHANGE_ALLOWED, NULL);
5220		put_ldev(device);
5221	}
5222
 
 
 
 
5223	/* tcp_close and release of sendpage pages can be deferred.  I don't
5224	 * want to use SO_LINGER, because apparently it can be deferred for
5225	 * more than 20 seconds (longest time I checked).
5226	 *
5227	 * Actually we don't care for exactly when the network stack does its
5228	 * put_page(), but release our reference on these pages right here.
5229	 */
5230	i = drbd_free_peer_reqs(device, &device->net_ee);
5231	if (i)
5232		drbd_info(device, "net_ee not empty, killed %u entries\n", i);
5233	i = atomic_read(&device->pp_in_use_by_net);
5234	if (i)
5235		drbd_info(device, "pp_in_use_by_net = %d, expected 0\n", i);
5236	i = atomic_read(&device->pp_in_use);
5237	if (i)
5238		drbd_info(device, "pp_in_use = %d, expected 0\n", i);
5239
5240	D_ASSERT(device, list_empty(&device->read_ee));
5241	D_ASSERT(device, list_empty(&device->active_ee));
5242	D_ASSERT(device, list_empty(&device->sync_ee));
5243	D_ASSERT(device, list_empty(&device->done_ee));
5244
5245	return 0;
 
 
5246}
5247
5248/*
5249 * We support PRO_VERSION_MIN to PRO_VERSION_MAX. The protocol version
5250 * we can agree on is stored in agreed_pro_version.
5251 *
5252 * feature flags and the reserved array should be enough room for future
5253 * enhancements of the handshake protocol, and possible plugins...
5254 *
5255 * for now, they are expected to be zero, but ignored.
5256 */
5257static int drbd_send_features(struct drbd_connection *connection)
5258{
5259	struct drbd_socket *sock;
5260	struct p_connection_features *p;
 
 
 
 
 
 
 
 
 
 
 
5261
5262	sock = &connection->data;
5263	p = conn_prepare_command(connection, sock);
5264	if (!p)
5265		return -EIO;
5266	memset(p, 0, sizeof(*p));
5267	p->protocol_min = cpu_to_be32(PRO_VERSION_MIN);
5268	p->protocol_max = cpu_to_be32(PRO_VERSION_MAX);
5269	p->feature_flags = cpu_to_be32(PRO_FEATURES);
5270	return conn_send_command(connection, sock, P_CONNECTION_FEATURES, sizeof(*p), NULL, 0);
 
 
5271}
5272
5273/*
5274 * return values:
5275 *   1 yes, we have a valid connection
5276 *   0 oops, did not work out, please try again
5277 *  -1 peer talks different language,
5278 *     no point in trying again, please go standalone.
5279 */
5280static int drbd_do_features(struct drbd_connection *connection)
5281{
5282	/* ASSERT current == connection->receiver ... */
5283	struct p_connection_features *p;
5284	const int expect = sizeof(struct p_connection_features);
5285	struct packet_info pi;
5286	int err;
 
5287
5288	err = drbd_send_features(connection);
5289	if (err)
5290		return 0;
5291
5292	err = drbd_recv_header(connection, &pi);
5293	if (err)
5294		return 0;
5295
5296	if (pi.cmd != P_CONNECTION_FEATURES) {
5297		drbd_err(connection, "expected ConnectionFeatures packet, received: %s (0x%04x)\n",
5298			 cmdname(pi.cmd), pi.cmd);
5299		return -1;
5300	}
5301
5302	if (pi.size != expect) {
5303		drbd_err(connection, "expected ConnectionFeatures length: %u, received: %u\n",
5304		     expect, pi.size);
5305		return -1;
5306	}
5307
5308	p = pi.data;
5309	err = drbd_recv_all_warn(connection, p, expect);
5310	if (err)
 
 
5311		return 0;
 
5312
5313	p->protocol_min = be32_to_cpu(p->protocol_min);
5314	p->protocol_max = be32_to_cpu(p->protocol_max);
5315	if (p->protocol_max == 0)
5316		p->protocol_max = p->protocol_min;
5317
5318	if (PRO_VERSION_MAX < p->protocol_min ||
5319	    PRO_VERSION_MIN > p->protocol_max)
5320		goto incompat;
5321
5322	connection->agreed_pro_version = min_t(int, PRO_VERSION_MAX, p->protocol_max);
5323	connection->agreed_features = PRO_FEATURES & be32_to_cpu(p->feature_flags);
5324
5325	drbd_info(connection, "Handshake successful: "
5326	     "Agreed network protocol version %d\n", connection->agreed_pro_version);
5327
5328	drbd_info(connection, "Feature flags enabled on protocol level: 0x%x%s%s%s%s.\n",
5329		  connection->agreed_features,
5330		  connection->agreed_features & DRBD_FF_TRIM ? " TRIM" : "",
5331		  connection->agreed_features & DRBD_FF_THIN_RESYNC ? " THIN_RESYNC" : "",
5332		  connection->agreed_features & DRBD_FF_WSAME ? " WRITE_SAME" : "",
5333		  connection->agreed_features & DRBD_FF_WZEROES ? " WRITE_ZEROES" :
5334		  connection->agreed_features ? "" : " none");
5335
5336	return 1;
5337
5338 incompat:
5339	drbd_err(connection, "incompatible DRBD dialects: "
5340	    "I support %d-%d, peer supports %d-%d\n",
5341	    PRO_VERSION_MIN, PRO_VERSION_MAX,
5342	    p->protocol_min, p->protocol_max);
5343	return -1;
5344}
5345
5346#if !defined(CONFIG_CRYPTO_HMAC) && !defined(CONFIG_CRYPTO_HMAC_MODULE)
5347static int drbd_do_auth(struct drbd_connection *connection)
5348{
5349	drbd_err(connection, "This kernel was build without CONFIG_CRYPTO_HMAC.\n");
5350	drbd_err(connection, "You need to disable 'cram-hmac-alg' in drbd.conf.\n");
5351	return -1;
5352}
5353#else
5354#define CHALLENGE_LEN 64
5355
5356/* Return value:
5357	1 - auth succeeded,
5358	0 - failed, try again (network error),
5359	-1 - auth failed, don't try again.
5360*/
5361
5362static int drbd_do_auth(struct drbd_connection *connection)
5363{
5364	struct drbd_socket *sock;
5365	char my_challenge[CHALLENGE_LEN];  /* 64 Bytes... */
 
5366	char *response = NULL;
5367	char *right_response = NULL;
5368	char *peers_ch = NULL;
5369	unsigned int key_len;
5370	char secret[SHARED_SECRET_MAX]; /* 64 byte */
5371	unsigned int resp_size;
5372	struct shash_desc *desc;
5373	struct packet_info pi;
5374	struct net_conf *nc;
5375	int err, rv;
5376
5377	/* FIXME: Put the challenge/response into the preallocated socket buffer.  */
5378
5379	rcu_read_lock();
5380	nc = rcu_dereference(connection->net_conf);
5381	key_len = strlen(nc->shared_secret);
5382	memcpy(secret, nc->shared_secret, key_len);
5383	rcu_read_unlock();
5384
5385	desc = kmalloc(sizeof(struct shash_desc) +
5386		       crypto_shash_descsize(connection->cram_hmac_tfm),
5387		       GFP_KERNEL);
5388	if (!desc) {
5389		rv = -1;
5390		goto fail;
5391	}
5392	desc->tfm = connection->cram_hmac_tfm;
5393
5394	rv = crypto_shash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len);
 
5395	if (rv) {
5396		drbd_err(connection, "crypto_shash_setkey() failed with %d\n", rv);
5397		rv = -1;
5398		goto fail;
5399	}
5400
5401	get_random_bytes(my_challenge, CHALLENGE_LEN);
5402
5403	sock = &connection->data;
5404	if (!conn_prepare_command(connection, sock)) {
5405		rv = 0;
5406		goto fail;
5407	}
5408	rv = !conn_send_command(connection, sock, P_AUTH_CHALLENGE, 0,
5409				my_challenge, CHALLENGE_LEN);
5410	if (!rv)
5411		goto fail;
5412
5413	err = drbd_recv_header(connection, &pi);
5414	if (err) {
 
5415		rv = 0;
5416		goto fail;
5417	}
5418
5419	if (pi.cmd != P_AUTH_CHALLENGE) {
5420		drbd_err(connection, "expected AuthChallenge packet, received: %s (0x%04x)\n",
5421			 cmdname(pi.cmd), pi.cmd);
5422		rv = -1;
5423		goto fail;
5424	}
5425
5426	if (pi.size > CHALLENGE_LEN * 2) {
5427		drbd_err(connection, "expected AuthChallenge payload too big.\n");
5428		rv = -1;
5429		goto fail;
5430	}
5431
5432	if (pi.size < CHALLENGE_LEN) {
5433		drbd_err(connection, "AuthChallenge payload too small.\n");
 
5434		rv = -1;
5435		goto fail;
5436	}
5437
5438	peers_ch = kmalloc(pi.size, GFP_NOIO);
5439	if (!peers_ch) {
5440		rv = -1;
5441		goto fail;
5442	}
5443
5444	err = drbd_recv_all_warn(connection, peers_ch, pi.size);
5445	if (err) {
 
5446		rv = 0;
5447		goto fail;
5448	}
5449
5450	if (!memcmp(my_challenge, peers_ch, CHALLENGE_LEN)) {
5451		drbd_err(connection, "Peer presented the same challenge!\n");
 
 
5452		rv = -1;
5453		goto fail;
5454	}
5455
5456	resp_size = crypto_shash_digestsize(connection->cram_hmac_tfm);
5457	response = kmalloc(resp_size, GFP_NOIO);
5458	if (!response) {
5459		rv = -1;
5460		goto fail;
5461	}
5462
5463	rv = crypto_shash_digest(desc, peers_ch, pi.size, response);
5464	if (rv) {
5465		drbd_err(connection, "crypto_hash_digest() failed with %d\n", rv);
5466		rv = -1;
5467		goto fail;
5468	}
5469
5470	if (!conn_prepare_command(connection, sock)) {
5471		rv = 0;
5472		goto fail;
5473	}
5474	rv = !conn_send_command(connection, sock, P_AUTH_RESPONSE, 0,
5475				response, resp_size);
5476	if (!rv)
5477		goto fail;
5478
5479	err = drbd_recv_header(connection, &pi);
5480	if (err) {
 
5481		rv = 0;
5482		goto fail;
5483	}
5484
5485	if (pi.cmd != P_AUTH_RESPONSE) {
5486		drbd_err(connection, "expected AuthResponse packet, received: %s (0x%04x)\n",
5487			 cmdname(pi.cmd), pi.cmd);
5488		rv = 0;
5489		goto fail;
5490	}
5491
5492	if (pi.size != resp_size) {
5493		drbd_err(connection, "expected AuthResponse payload of wrong size\n");
5494		rv = 0;
5495		goto fail;
5496	}
5497
5498	err = drbd_recv_all_warn(connection, response , resp_size);
5499	if (err) {
 
5500		rv = 0;
5501		goto fail;
5502	}
5503
5504	right_response = kmalloc(resp_size, GFP_NOIO);
5505	if (!right_response) {
 
5506		rv = -1;
5507		goto fail;
5508	}
5509
5510	rv = crypto_shash_digest(desc, my_challenge, CHALLENGE_LEN,
5511				 right_response);
 
5512	if (rv) {
5513		drbd_err(connection, "crypto_hash_digest() failed with %d\n", rv);
5514		rv = -1;
5515		goto fail;
5516	}
5517
5518	rv = !memcmp(response, right_response, resp_size);
5519
5520	if (rv)
5521		drbd_info(connection, "Peer authenticated using %d bytes HMAC\n",
5522		     resp_size);
5523	else
5524		rv = -1;
5525
5526 fail:
5527	kfree(peers_ch);
5528	kfree(response);
5529	kfree(right_response);
5530	if (desc) {
5531		shash_desc_zero(desc);
5532		kfree(desc);
5533	}
5534
5535	return rv;
5536}
5537#endif
5538
5539int drbd_receiver(struct drbd_thread *thi)
5540{
5541	struct drbd_connection *connection = thi->connection;
 
5542	int h;
5543
5544	drbd_info(connection, "receiver (re)started\n");
 
 
5545
5546	do {
5547		h = conn_connect(connection);
5548		if (h == 0) {
5549			conn_disconnect(connection);
5550			schedule_timeout_interruptible(HZ);
5551		}
5552		if (h == -1) {
5553			drbd_warn(connection, "Discarding network configuration.\n");
5554			conn_request_state(connection, NS(conn, C_DISCONNECTING), CS_HARD);
5555		}
5556	} while (h == 0);
5557
5558	if (h > 0) {
5559		blk_start_plug(&connection->receiver_plug);
5560		drbdd(connection);
5561		blk_finish_plug(&connection->receiver_plug);
 
5562	}
5563
5564	conn_disconnect(connection);
5565
5566	drbd_info(connection, "receiver terminated\n");
5567	return 0;
5568}
5569
5570/* ********* acknowledge sender ******** */
5571
5572static int got_conn_RqSReply(struct drbd_connection *connection, struct packet_info *pi)
5573{
5574	struct p_req_state_reply *p = pi->data;
5575	int retcode = be32_to_cpu(p->retcode);
5576
5577	if (retcode >= SS_SUCCESS) {
5578		set_bit(CONN_WD_ST_CHG_OKAY, &connection->flags);
5579	} else {
5580		set_bit(CONN_WD_ST_CHG_FAIL, &connection->flags);
5581		drbd_err(connection, "Requested state change failed by peer: %s (%d)\n",
5582			 drbd_set_st_err_str(retcode), retcode);
5583	}
5584	wake_up(&connection->ping_wait);
5585
5586	return 0;
5587}
5588
5589static int got_RqSReply(struct drbd_connection *connection, struct packet_info *pi)
5590{
5591	struct drbd_peer_device *peer_device;
5592	struct drbd_device *device;
5593	struct p_req_state_reply *p = pi->data;
5594	int retcode = be32_to_cpu(p->retcode);
5595
5596	peer_device = conn_peer_device(connection, pi->vnr);
5597	if (!peer_device)
5598		return -EIO;
5599	device = peer_device->device;
5600
5601	if (test_bit(CONN_WD_ST_CHG_REQ, &connection->flags)) {
5602		D_ASSERT(device, connection->agreed_pro_version < 100);
5603		return got_conn_RqSReply(connection, pi);
5604	}
5605
5606	if (retcode >= SS_SUCCESS) {
5607		set_bit(CL_ST_CHG_SUCCESS, &device->flags);
5608	} else {
5609		set_bit(CL_ST_CHG_FAIL, &device->flags);
5610		drbd_err(device, "Requested state change failed by peer: %s (%d)\n",
5611			drbd_set_st_err_str(retcode), retcode);
5612	}
5613	wake_up(&device->state_wait);
5614
5615	return 0;
5616}
5617
5618static int got_Ping(struct drbd_connection *connection, struct packet_info *pi)
5619{
5620	return drbd_send_ping_ack(connection);
5621
5622}
5623
5624static int got_PingAck(struct drbd_connection *connection, struct packet_info *pi)
5625{
5626	/* restore idle timeout */
5627	connection->meta.socket->sk->sk_rcvtimeo = connection->net_conf->ping_int*HZ;
5628	if (!test_and_set_bit(GOT_PING_ACK, &connection->flags))
5629		wake_up(&connection->ping_wait);
5630
5631	return 0;
5632}
5633
5634static int got_IsInSync(struct drbd_connection *connection, struct packet_info *pi)
5635{
5636	struct drbd_peer_device *peer_device;
5637	struct drbd_device *device;
5638	struct p_block_ack *p = pi->data;
5639	sector_t sector = be64_to_cpu(p->sector);
5640	int blksize = be32_to_cpu(p->blksize);
5641
5642	peer_device = conn_peer_device(connection, pi->vnr);
5643	if (!peer_device)
5644		return -EIO;
5645	device = peer_device->device;
5646
5647	D_ASSERT(device, peer_device->connection->agreed_pro_version >= 89);
5648
5649	update_peer_seq(peer_device, be32_to_cpu(p->seq_num));
5650
5651	if (get_ldev(device)) {
5652		drbd_rs_complete_io(device, sector);
5653		drbd_set_in_sync(peer_device, sector, blksize);
5654		/* rs_same_csums is supposed to count in units of BM_BLOCK_SIZE */
5655		device->rs_same_csum += (blksize >> BM_BLOCK_SHIFT);
5656		put_ldev(device);
5657	}
5658	dec_rs_pending(peer_device);
5659	atomic_add(blksize >> 9, &device->rs_sect_in);
 
 
 
 
 
 
 
 
 
 
 
 
5660
5661	return 0;
 
 
 
 
 
 
 
 
 
 
 
 
5662}
5663
5664static int
5665validate_req_change_req_state(struct drbd_peer_device *peer_device, u64 id, sector_t sector,
5666			      struct rb_root *root, const char *func,
5667			      enum drbd_req_event what, bool missing_ok)
 
 
5668{
5669	struct drbd_device *device = peer_device->device;
5670	struct drbd_request *req;
5671	struct bio_and_error m;
5672
5673	spin_lock_irq(&device->resource->req_lock);
5674	req = find_request(device, root, id, sector, missing_ok, func);
5675	if (unlikely(!req)) {
5676		spin_unlock_irq(&device->resource->req_lock);
5677		return -EIO;
 
 
 
5678	}
5679	__req_mod(req, what, peer_device, &m);
5680	spin_unlock_irq(&device->resource->req_lock);
5681
5682	if (m.bio)
5683		complete_master_bio(device, &m);
5684	return 0;
5685}
5686
5687static int got_BlockAck(struct drbd_connection *connection, struct packet_info *pi)
5688{
5689	struct drbd_peer_device *peer_device;
5690	struct drbd_device *device;
5691	struct p_block_ack *p = pi->data;
5692	sector_t sector = be64_to_cpu(p->sector);
5693	int blksize = be32_to_cpu(p->blksize);
5694	enum drbd_req_event what;
5695
5696	peer_device = conn_peer_device(connection, pi->vnr);
5697	if (!peer_device)
5698		return -EIO;
5699	device = peer_device->device;
5700
5701	update_peer_seq(peer_device, be32_to_cpu(p->seq_num));
5702
5703	if (p->block_id == ID_SYNCER) {
5704		drbd_set_in_sync(peer_device, sector, blksize);
5705		dec_rs_pending(peer_device);
5706		return 0;
5707	}
5708	switch (pi->cmd) {
5709	case P_RS_WRITE_ACK:
5710		what = WRITE_ACKED_BY_PEER_AND_SIS;
 
5711		break;
5712	case P_WRITE_ACK:
5713		what = WRITE_ACKED_BY_PEER;
 
5714		break;
5715	case P_RECV_ACK:
5716		what = RECV_ACKED_BY_PEER;
 
5717		break;
5718	case P_SUPERSEDED:
5719		what = CONFLICT_RESOLVED;
5720		break;
5721	case P_RETRY_WRITE:
5722		what = POSTPONE_WRITE;
5723		break;
5724	default:
5725		BUG();
 
5726	}
5727
5728	return validate_req_change_req_state(peer_device, p->block_id, sector,
5729					     &device->write_requests, __func__,
5730					     what, false);
5731}
5732
5733static int got_NegAck(struct drbd_connection *connection, struct packet_info *pi)
5734{
5735	struct drbd_peer_device *peer_device;
5736	struct drbd_device *device;
5737	struct p_block_ack *p = pi->data;
5738	sector_t sector = be64_to_cpu(p->sector);
5739	int size = be32_to_cpu(p->blksize);
5740	int err;
 
5741
5742	peer_device = conn_peer_device(connection, pi->vnr);
5743	if (!peer_device)
5744		return -EIO;
5745	device = peer_device->device;
5746
5747	update_peer_seq(peer_device, be32_to_cpu(p->seq_num));
 
 
 
 
5748
5749	if (p->block_id == ID_SYNCER) {
5750		dec_rs_pending(peer_device);
5751		drbd_rs_failed_io(peer_device, sector, size);
5752		return 0;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
5753	}
 
 
5754
5755	err = validate_req_change_req_state(peer_device, p->block_id, sector,
5756					    &device->write_requests, __func__,
5757					    NEG_ACKED, true);
5758	if (err) {
5759		/* Protocol A has no P_WRITE_ACKs, but has P_NEG_ACKs.
5760		   The master bio might already be completed, therefore the
5761		   request is no longer in the collision hash. */
5762		/* In Protocol B we might already have got a P_RECV_ACK
5763		   but then get a P_NEG_ACK afterwards. */
5764		drbd_set_out_of_sync(peer_device, sector, size);
5765	}
5766	return 0;
5767}
5768
5769static int got_NegDReply(struct drbd_connection *connection, struct packet_info *pi)
5770{
5771	struct drbd_peer_device *peer_device;
5772	struct drbd_device *device;
5773	struct p_block_ack *p = pi->data;
5774	sector_t sector = be64_to_cpu(p->sector);
5775
5776	peer_device = conn_peer_device(connection, pi->vnr);
5777	if (!peer_device)
5778		return -EIO;
5779	device = peer_device->device;
5780
5781	update_peer_seq(peer_device, be32_to_cpu(p->seq_num));
5782
5783	drbd_err(device, "Got NegDReply; Sector %llus, len %u.\n",
5784	    (unsigned long long)sector, be32_to_cpu(p->blksize));
5785
5786	return validate_req_change_req_state(peer_device, p->block_id, sector,
5787					     &device->read_requests, __func__,
5788					     NEG_ACKED, false);
5789}
5790
5791static int got_NegRSDReply(struct drbd_connection *connection, struct packet_info *pi)
5792{
5793	struct drbd_peer_device *peer_device;
5794	struct drbd_device *device;
5795	sector_t sector;
5796	int size;
5797	struct p_block_ack *p = pi->data;
5798
5799	peer_device = conn_peer_device(connection, pi->vnr);
5800	if (!peer_device)
5801		return -EIO;
5802	device = peer_device->device;
5803
5804	sector = be64_to_cpu(p->sector);
5805	size = be32_to_cpu(p->blksize);
5806
5807	update_peer_seq(peer_device, be32_to_cpu(p->seq_num));
5808
5809	dec_rs_pending(peer_device);
5810
5811	if (get_ldev_if_state(device, D_FAILED)) {
5812		drbd_rs_complete_io(device, sector);
5813		switch (pi->cmd) {
5814		case P_NEG_RS_DREPLY:
5815			drbd_rs_failed_io(peer_device, sector, size);
5816			break;
5817		case P_RS_CANCEL:
5818			break;
5819		default:
5820			BUG();
 
 
5821		}
5822		put_ldev(device);
5823	}
5824
5825	return 0;
5826}
5827
5828static int got_BarrierAck(struct drbd_connection *connection, struct packet_info *pi)
5829{
5830	struct p_barrier_ack *p = pi->data;
5831	struct drbd_peer_device *peer_device;
5832	int vnr;
5833
5834	tl_release(connection, p->barrier, be32_to_cpu(p->set_size));
5835
5836	rcu_read_lock();
5837	idr_for_each_entry(&connection->peer_devices, peer_device, vnr) {
5838		struct drbd_device *device = peer_device->device;
5839
5840		if (device->state.conn == C_AHEAD &&
5841		    atomic_read(&device->ap_in_flight) == 0 &&
5842		    !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &device->flags)) {
5843			device->start_resync_timer.expires = jiffies + HZ;
5844			add_timer(&device->start_resync_timer);
5845		}
5846	}
5847	rcu_read_unlock();
5848
5849	return 0;
5850}
5851
5852static int got_OVResult(struct drbd_connection *connection, struct packet_info *pi)
5853{
5854	struct drbd_peer_device *peer_device;
5855	struct drbd_device *device;
5856	struct p_block_ack *p = pi->data;
5857	struct drbd_device_work *dw;
5858	sector_t sector;
5859	int size;
5860
5861	peer_device = conn_peer_device(connection, pi->vnr);
5862	if (!peer_device)
5863		return -EIO;
5864	device = peer_device->device;
5865
5866	sector = be64_to_cpu(p->sector);
5867	size = be32_to_cpu(p->blksize);
5868
5869	update_peer_seq(peer_device, be32_to_cpu(p->seq_num));
5870
5871	if (be64_to_cpu(p->block_id) == ID_OUT_OF_SYNC)
5872		drbd_ov_out_of_sync_found(peer_device, sector, size);
5873	else
5874		ov_out_of_sync_print(peer_device);
5875
5876	if (!get_ldev(device))
5877		return 0;
5878
5879	drbd_rs_complete_io(device, sector);
5880	dec_rs_pending(peer_device);
5881
5882	--device->ov_left;
5883
5884	/* let's advance progress step marks only for every other megabyte */
5885	if ((device->ov_left & 0x200) == 0x200)
5886		drbd_advance_rs_marks(peer_device, device->ov_left);
5887
5888	if (device->ov_left == 0) {
5889		dw = kmalloc(sizeof(*dw), GFP_NOIO);
5890		if (dw) {
5891			dw->w.cb = w_ov_finished;
5892			dw->device = device;
5893			drbd_queue_work(&peer_device->connection->sender_work, &dw->w);
5894		} else {
5895			drbd_err(device, "kmalloc(dw) failed.");
5896			ov_out_of_sync_print(peer_device);
5897			drbd_resync_finished(peer_device);
5898		}
5899	}
5900	put_ldev(device);
5901	return 0;
5902}
5903
5904static int got_skip(struct drbd_connection *connection, struct packet_info *pi)
5905{
5906	return 0;
5907}
5908
5909struct meta_sock_cmd {
5910	size_t pkt_size;
5911	int (*fn)(struct drbd_connection *connection, struct packet_info *);
5912};
5913
5914static void set_rcvtimeo(struct drbd_connection *connection, bool ping_timeout)
5915{
5916	long t;
5917	struct net_conf *nc;
5918
5919	rcu_read_lock();
5920	nc = rcu_dereference(connection->net_conf);
5921	t = ping_timeout ? nc->ping_timeo : nc->ping_int;
5922	rcu_read_unlock();
5923
5924	t *= HZ;
5925	if (ping_timeout)
5926		t /= 10;
5927
5928	connection->meta.socket->sk->sk_rcvtimeo = t;
5929}
5930
5931static void set_ping_timeout(struct drbd_connection *connection)
5932{
5933	set_rcvtimeo(connection, 1);
5934}
5935
5936static void set_idle_timeout(struct drbd_connection *connection)
5937{
5938	set_rcvtimeo(connection, 0);
5939}
5940
5941static struct meta_sock_cmd ack_receiver_tbl[] = {
5942	[P_PING]	    = { 0, got_Ping },
5943	[P_PING_ACK]	    = { 0, got_PingAck },
5944	[P_RECV_ACK]	    = { sizeof(struct p_block_ack), got_BlockAck },
5945	[P_WRITE_ACK]	    = { sizeof(struct p_block_ack), got_BlockAck },
5946	[P_RS_WRITE_ACK]    = { sizeof(struct p_block_ack), got_BlockAck },
5947	[P_SUPERSEDED]   = { sizeof(struct p_block_ack), got_BlockAck },
5948	[P_NEG_ACK]	    = { sizeof(struct p_block_ack), got_NegAck },
5949	[P_NEG_DREPLY]	    = { sizeof(struct p_block_ack), got_NegDReply },
5950	[P_NEG_RS_DREPLY]   = { sizeof(struct p_block_ack), got_NegRSDReply },
5951	[P_OV_RESULT]	    = { sizeof(struct p_block_ack), got_OVResult },
5952	[P_BARRIER_ACK]	    = { sizeof(struct p_barrier_ack), got_BarrierAck },
5953	[P_STATE_CHG_REPLY] = { sizeof(struct p_req_state_reply), got_RqSReply },
5954	[P_RS_IS_IN_SYNC]   = { sizeof(struct p_block_ack), got_IsInSync },
5955	[P_DELAY_PROBE]     = { sizeof(struct p_delay_probe93), got_skip },
5956	[P_RS_CANCEL]       = { sizeof(struct p_block_ack), got_NegRSDReply },
5957	[P_CONN_ST_CHG_REPLY]={ sizeof(struct p_req_state_reply), got_conn_RqSReply },
5958	[P_RETRY_WRITE]	    = { sizeof(struct p_block_ack), got_BlockAck },
5959};
 
 
 
5960
5961int drbd_ack_receiver(struct drbd_thread *thi)
5962{
5963	struct drbd_connection *connection = thi->connection;
5964	struct meta_sock_cmd *cmd = NULL;
5965	struct packet_info pi;
5966	unsigned long pre_recv_jif;
5967	int rv;
5968	void *buf    = connection->meta.rbuf;
5969	int received = 0;
5970	unsigned int header_size = drbd_header_size(connection);
5971	int expect   = header_size;
5972	bool ping_timeout_active = false;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
5973
5974	sched_set_fifo_low(current);
5975
5976	while (get_t_state(thi) == RUNNING) {
5977		drbd_thread_current_set_cpu(thi);
5978
5979		conn_reclaim_net_peer_reqs(connection);
5980
5981		if (test_and_clear_bit(SEND_PING, &connection->flags)) {
5982			if (drbd_send_ping(connection)) {
5983				drbd_err(connection, "drbd_send_ping has failed\n");
5984				goto reconnect;
5985			}
5986			set_ping_timeout(connection);
5987			ping_timeout_active = true;
5988		}
5989
5990		pre_recv_jif = jiffies;
5991		rv = drbd_recv_short(connection->meta.socket, buf, expect-received, 0);
5992
5993		/* Note:
5994		 * -EINTR	 (on meta) we got a signal
5995		 * -EAGAIN	 (on meta) rcvtimeo expired
5996		 * -ECONNRESET	 other side closed the connection
5997		 * -ERESTARTSYS  (on data) we got a signal
5998		 * rv <  0	 other than above: unexpected error!
5999		 * rv == expected: full header or command
6000		 * rv <  expected: "woken" by signal during receive
6001		 * rv == 0	 : "connection shut down by peer"
6002		 */
6003		if (likely(rv > 0)) {
6004			received += rv;
6005			buf	 += rv;
6006		} else if (rv == 0) {
6007			if (test_bit(DISCONNECT_SENT, &connection->flags)) {
6008				long t;
6009				rcu_read_lock();
6010				t = rcu_dereference(connection->net_conf)->ping_timeo * HZ/10;
6011				rcu_read_unlock();
6012
6013				t = wait_event_timeout(connection->ping_wait,
6014						       connection->cstate < C_WF_REPORT_PARAMS,
6015						       t);
6016				if (t)
6017					break;
6018			}
6019			drbd_err(connection, "meta connection shut down by peer.\n");
6020			goto reconnect;
6021		} else if (rv == -EAGAIN) {
6022			/* If the data socket received something meanwhile,
6023			 * that is good enough: peer is still alive. */
6024			if (time_after(connection->last_received, pre_recv_jif))
 
6025				continue;
6026			if (ping_timeout_active) {
6027				drbd_err(connection, "PingAck did not arrive in time.\n");
6028				goto reconnect;
6029			}
6030			set_bit(SEND_PING, &connection->flags);
6031			continue;
6032		} else if (rv == -EINTR) {
6033			/* maybe drbd_thread_stop(): the while condition will notice.
6034			 * maybe woken for send_ping: we'll send a ping above,
6035			 * and change the rcvtimeo */
6036			flush_signals(current);
6037			continue;
6038		} else {
6039			drbd_err(connection, "sock_recvmsg returned %d\n", rv);
6040			goto reconnect;
6041		}
6042
6043		if (received == expect && cmd == NULL) {
6044			if (decode_header(connection, connection->meta.rbuf, &pi))
 
 
 
 
6045				goto reconnect;
6046			cmd = &ack_receiver_tbl[pi.cmd];
6047			if (pi.cmd >= ARRAY_SIZE(ack_receiver_tbl) || !cmd->fn) {
6048				drbd_err(connection, "Unexpected meta packet %s (0x%04x)\n",
6049					 cmdname(pi.cmd), pi.cmd);
 
 
 
 
6050				goto disconnect;
6051			}
6052			expect = header_size + cmd->pkt_size;
6053			if (pi.size != expect - header_size) {
6054				drbd_err(connection, "Wrong packet size on meta (c: %d, l: %d)\n",
6055					pi.cmd, pi.size);
6056				goto reconnect;
6057			}
6058		}
6059		if (received == expect) {
6060			bool err;
6061
6062			err = cmd->fn(connection, &pi);
6063			if (err) {
6064				drbd_err(connection, "%ps failed\n", cmd->fn);
6065				goto reconnect;
6066			}
6067
6068			connection->last_received = jiffies;
6069
6070			if (cmd == &ack_receiver_tbl[P_PING_ACK]) {
6071				set_idle_timeout(connection);
6072				ping_timeout_active = false;
6073			}
6074
6075			buf	 = connection->meta.rbuf;
6076			received = 0;
6077			expect	 = header_size;
6078			cmd	 = NULL;
6079		}
6080	}
6081
6082	if (0) {
6083reconnect:
6084		conn_request_state(connection, NS(conn, C_NETWORK_FAILURE), CS_HARD);
6085		conn_md_sync(connection);
6086	}
6087	if (0) {
6088disconnect:
6089		conn_request_state(connection, NS(conn, C_DISCONNECTING), CS_HARD);
 
6090	}
 
6091
6092	drbd_info(connection, "ack_receiver terminated\n");
 
6093
6094	return 0;
6095}
6096
6097void drbd_send_acks_wf(struct work_struct *ws)
6098{
6099	struct drbd_peer_device *peer_device =
6100		container_of(ws, struct drbd_peer_device, send_acks_work);
6101	struct drbd_connection *connection = peer_device->connection;
6102	struct drbd_device *device = peer_device->device;
6103	struct net_conf *nc;
6104	int tcp_cork, err;
6105
6106	rcu_read_lock();
6107	nc = rcu_dereference(connection->net_conf);
6108	tcp_cork = nc->tcp_cork;
6109	rcu_read_unlock();
6110
6111	if (tcp_cork)
6112		tcp_sock_set_cork(connection->meta.socket->sk, true);
6113
6114	err = drbd_finish_peer_reqs(device);
6115	kref_put(&device->kref, drbd_destroy_device);
6116	/* get is in drbd_endio_write_sec_final(). That is necessary to keep the
6117	   struct work_struct send_acks_work alive, which is in the peer_device object */
6118
6119	if (err) {
6120		conn_request_state(connection, NS(conn, C_NETWORK_FAILURE), CS_HARD);
6121		return;
6122	}
6123
6124	if (tcp_cork)
6125		tcp_sock_set_cork(connection->meta.socket->sk, false);
6126
6127	return;
6128}