drbd: spelling fix: too small
[linux-block.git] / drivers / block / drbd / drbd_nl.c
CommitLineData
b411b363
PR
1/*
2 drbd_nl.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23
24 */
25
b411b363
PR
26#include <linux/module.h>
27#include <linux/drbd.h>
28#include <linux/in.h>
29#include <linux/fs.h>
30#include <linux/file.h>
31#include <linux/slab.h>
b411b363
PR
32#include <linux/blkpg.h>
33#include <linux/cpumask.h>
34#include "drbd_int.h"
265be2d0 35#include "drbd_req.h"
b411b363
PR
36#include "drbd_wrappers.h"
37#include <asm/unaligned.h>
b411b363 38#include <linux/drbd_limits.h>
87f7be4c 39#include <linux/kthread.h>
b411b363 40
3b98c0c2
LE
41#include <net/genetlink.h>
42
43/* .doit */
44// int drbd_adm_create_resource(struct sk_buff *skb, struct genl_info *info);
45// int drbd_adm_delete_resource(struct sk_buff *skb, struct genl_info *info);
46
47int drbd_adm_add_minor(struct sk_buff *skb, struct genl_info *info);
48int drbd_adm_delete_minor(struct sk_buff *skb, struct genl_info *info);
49
50int drbd_adm_create_connection(struct sk_buff *skb, struct genl_info *info);
51int drbd_adm_delete_connection(struct sk_buff *skb, struct genl_info *info);
85f75dd7 52int drbd_adm_down(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
53
54int drbd_adm_set_role(struct sk_buff *skb, struct genl_info *info);
55int drbd_adm_attach(struct sk_buff *skb, struct genl_info *info);
f399002e 56int drbd_adm_disk_opts(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
57int drbd_adm_detach(struct sk_buff *skb, struct genl_info *info);
58int drbd_adm_connect(struct sk_buff *skb, struct genl_info *info);
f399002e 59int drbd_adm_net_opts(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
60int drbd_adm_resize(struct sk_buff *skb, struct genl_info *info);
61int drbd_adm_start_ov(struct sk_buff *skb, struct genl_info *info);
62int drbd_adm_new_c_uuid(struct sk_buff *skb, struct genl_info *info);
63int drbd_adm_disconnect(struct sk_buff *skb, struct genl_info *info);
64int drbd_adm_invalidate(struct sk_buff *skb, struct genl_info *info);
65int drbd_adm_invalidate_peer(struct sk_buff *skb, struct genl_info *info);
66int drbd_adm_pause_sync(struct sk_buff *skb, struct genl_info *info);
67int drbd_adm_resume_sync(struct sk_buff *skb, struct genl_info *info);
68int drbd_adm_suspend_io(struct sk_buff *skb, struct genl_info *info);
69int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info);
70int drbd_adm_outdate(struct sk_buff *skb, struct genl_info *info);
f399002e 71int drbd_adm_resource_opts(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
72int drbd_adm_get_status(struct sk_buff *skb, struct genl_info *info);
73int drbd_adm_get_timeout_type(struct sk_buff *skb, struct genl_info *info);
74/* .dumpit */
75int drbd_adm_get_status_all(struct sk_buff *skb, struct netlink_callback *cb);
76
77#include <linux/drbd_genl_api.h>
78#include <linux/genl_magic_func.h>
79
80/* used blkdev_get_by_path, to claim our meta data device(s) */
b411b363
PR
81static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
82
3b98c0c2
LE
83/* Configuration is strictly serialized, because generic netlink message
84 * processing is strictly serialized by the genl_lock().
85 * Which means we can use one static global drbd_config_context struct.
86 */
87static struct drbd_config_context {
88 /* assigned from drbd_genlmsghdr */
89 unsigned int minor;
90 /* assigned from request attributes, if present */
91 unsigned int volume;
92#define VOLUME_UNSPECIFIED (-1U)
93 /* pointer into the request skb,
94 * limited lifetime! */
95 char *conn_name;
96
97 /* reply buffer */
98 struct sk_buff *reply_skb;
99 /* pointer into reply buffer */
100 struct drbd_genlmsghdr *reply_dh;
101 /* resolved from attributes, if possible */
102 struct drbd_conf *mdev;
103 struct drbd_tconn *tconn;
104} adm_ctx;
105
106static void drbd_adm_send_reply(struct sk_buff *skb, struct genl_info *info)
107{
108 genlmsg_end(skb, genlmsg_data(nlmsg_data(nlmsg_hdr(skb))));
109 if (genlmsg_reply(skb, info))
110 printk(KERN_ERR "drbd: error sending genl reply\n");
b411b363 111}
3b98c0c2
LE
112
113/* Used on a fresh "drbd_adm_prepare"d reply_skb, this cannot fail: The only
114 * reason it could fail was no space in skb, and there are 4k available. */
8432b314 115int drbd_msg_put_info(const char *info)
3b98c0c2
LE
116{
117 struct sk_buff *skb = adm_ctx.reply_skb;
118 struct nlattr *nla;
119 int err = -EMSGSIZE;
120
121 if (!info || !info[0])
122 return 0;
123
124 nla = nla_nest_start(skb, DRBD_NLA_CFG_REPLY);
125 if (!nla)
126 return err;
127
128 err = nla_put_string(skb, T_info_text, info);
129 if (err) {
130 nla_nest_cancel(skb, nla);
131 return err;
132 } else
133 nla_nest_end(skb, nla);
134 return 0;
b411b363
PR
135}
136
3b98c0c2
LE
137/* This would be a good candidate for a "pre_doit" hook,
138 * and per-family private info->pointers.
139 * But we need to stay compatible with older kernels.
140 * If it returns successfully, adm_ctx members are valid.
141 */
142#define DRBD_ADM_NEED_MINOR 1
143#define DRBD_ADM_NEED_CONN 2
144static int drbd_adm_prepare(struct sk_buff *skb, struct genl_info *info,
145 unsigned flags)
146{
147 struct drbd_genlmsghdr *d_in = info->userhdr;
148 const u8 cmd = info->genlhdr->cmd;
149 int err;
150
151 memset(&adm_ctx, 0, sizeof(adm_ctx));
152
153 /* genl_rcv_msg only checks for CAP_NET_ADMIN on "GENL_ADMIN_PERM" :( */
154 if (cmd != DRBD_ADM_GET_STATUS
155 && security_netlink_recv(skb, CAP_SYS_ADMIN))
156 return -EPERM;
157
158 adm_ctx.reply_skb = genlmsg_new(NLMSG_GOODSIZE, GFP_KERNEL);
1e2a2551
AG
159 if (!adm_ctx.reply_skb) {
160 err = -ENOMEM;
3b98c0c2 161 goto fail;
1e2a2551 162 }
3b98c0c2
LE
163
164 adm_ctx.reply_dh = genlmsg_put_reply(adm_ctx.reply_skb,
165 info, &drbd_genl_family, 0, cmd);
166 /* put of a few bytes into a fresh skb of >= 4k will always succeed.
167 * but anyways */
1e2a2551
AG
168 if (!adm_ctx.reply_dh) {
169 err = -ENOMEM;
3b98c0c2 170 goto fail;
1e2a2551 171 }
3b98c0c2
LE
172
173 adm_ctx.reply_dh->minor = d_in->minor;
174 adm_ctx.reply_dh->ret_code = NO_ERROR;
175
176 if (info->attrs[DRBD_NLA_CFG_CONTEXT]) {
177 struct nlattr *nla;
178 /* parse and validate only */
f399002e 179 err = drbd_cfg_context_from_attrs(NULL, info);
3b98c0c2
LE
180 if (err)
181 goto fail;
182
183 /* It was present, and valid,
184 * copy it over to the reply skb. */
185 err = nla_put_nohdr(adm_ctx.reply_skb,
186 info->attrs[DRBD_NLA_CFG_CONTEXT]->nla_len,
187 info->attrs[DRBD_NLA_CFG_CONTEXT]);
188 if (err)
189 goto fail;
190
191 /* and assign stuff to the global adm_ctx */
192 nla = nested_attr_tb[__nla_type(T_ctx_volume)];
193 adm_ctx.volume = nla ? nla_get_u32(nla) : VOLUME_UNSPECIFIED;
194 nla = nested_attr_tb[__nla_type(T_ctx_conn_name)];
195 if (nla)
196 adm_ctx.conn_name = nla_data(nla);
197 } else
198 adm_ctx.volume = VOLUME_UNSPECIFIED;
199
200 adm_ctx.minor = d_in->minor;
201 adm_ctx.mdev = minor_to_mdev(d_in->minor);
0ace9dfa 202 adm_ctx.tconn = conn_get_by_name(adm_ctx.conn_name);
3b98c0c2
LE
203
204 if (!adm_ctx.mdev && (flags & DRBD_ADM_NEED_MINOR)) {
205 drbd_msg_put_info("unknown minor");
206 return ERR_MINOR_INVALID;
207 }
208 if (!adm_ctx.tconn && (flags & DRBD_ADM_NEED_CONN)) {
209 drbd_msg_put_info("unknown connection");
210 return ERR_INVALID_REQUEST;
211 }
212
213 /* some more paranoia, if the request was over-determined */
527f4b24
LE
214 if (adm_ctx.mdev && adm_ctx.tconn &&
215 adm_ctx.mdev->tconn != adm_ctx.tconn) {
216 pr_warning("request: minor=%u, conn=%s; but that minor belongs to connection %s\n",
217 adm_ctx.minor, adm_ctx.conn_name, adm_ctx.mdev->tconn->name);
218 drbd_msg_put_info("minor exists in different connection");
219 return ERR_INVALID_REQUEST;
220 }
3b98c0c2
LE
221 if (adm_ctx.mdev &&
222 adm_ctx.volume != VOLUME_UNSPECIFIED &&
223 adm_ctx.volume != adm_ctx.mdev->vnr) {
224 pr_warning("request: minor=%u, volume=%u; but that minor is volume %u in %s\n",
225 adm_ctx.minor, adm_ctx.volume,
226 adm_ctx.mdev->vnr, adm_ctx.mdev->tconn->name);
527f4b24 227 drbd_msg_put_info("minor exists as different volume");
3b98c0c2
LE
228 return ERR_INVALID_REQUEST;
229 }
0ace9dfa 230
3b98c0c2
LE
231 return NO_ERROR;
232
233fail:
234 nlmsg_free(adm_ctx.reply_skb);
235 adm_ctx.reply_skb = NULL;
1e2a2551 236 return err;
3b98c0c2
LE
237}
238
239static int drbd_adm_finish(struct genl_info *info, int retcode)
240{
241 struct nlattr *nla;
242 const char *conn_name = NULL;
243
0ace9dfa
PR
244 if (adm_ctx.tconn) {
245 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
246 adm_ctx.tconn = NULL;
247 }
248
3b98c0c2
LE
249 if (!adm_ctx.reply_skb)
250 return -ENOMEM;
251
252 adm_ctx.reply_dh->ret_code = retcode;
253
254 nla = info->attrs[DRBD_NLA_CFG_CONTEXT];
255 if (nla) {
256 nla = nla_find_nested(nla, __nla_type(T_ctx_conn_name));
257 if (nla)
258 conn_name = nla_data(nla);
259 }
260
261 drbd_adm_send_reply(adm_ctx.reply_skb, info);
262 return 0;
263}
b411b363 264
6b75dced 265static void setup_khelper_env(struct drbd_tconn *tconn, char **envp)
b411b363 266{
6b75dced 267 char *afs;
44ed167d 268 struct net_conf *nc;
b411b363 269
44ed167d
PR
270 rcu_read_lock();
271 nc = rcu_dereference(tconn->net_conf);
272 if (nc) {
273 switch (((struct sockaddr *)nc->peer_addr)->sa_family) {
b411b363
PR
274 case AF_INET6:
275 afs = "ipv6";
6b75dced 276 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI6",
44ed167d 277 &((struct sockaddr_in6 *)nc->peer_addr)->sin6_addr);
b411b363
PR
278 break;
279 case AF_INET:
280 afs = "ipv4";
6b75dced 281 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI4",
44ed167d 282 &((struct sockaddr_in *)nc->peer_addr)->sin_addr);
b411b363
PR
283 break;
284 default:
285 afs = "ssocks";
6b75dced 286 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI4",
44ed167d 287 &((struct sockaddr_in *)nc->peer_addr)->sin_addr);
b411b363 288 }
6b75dced 289 snprintf(envp[3], 20, "DRBD_PEER_AF=%s", afs);
b411b363 290 }
44ed167d 291 rcu_read_unlock();
6b75dced
PR
292}
293
294int drbd_khelper(struct drbd_conf *mdev, char *cmd)
295{
296 char *envp[] = { "HOME=/",
297 "TERM=linux",
298 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
299 (char[20]) { }, /* address family */
300 (char[60]) { }, /* address */
301 NULL };
302 char mb[12];
303 char *argv[] = {usermode_helper, cmd, mb, NULL };
304 struct sib_info sib;
305 int ret;
306
307 snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
308 setup_khelper_env(mdev->tconn, envp);
b411b363 309
1090c056
LE
310 /* The helper may take some time.
311 * write out any unsynced meta data changes now */
312 drbd_md_sync(mdev);
313
b411b363 314 dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
3b98c0c2
LE
315 sib.sib_reason = SIB_HELPER_PRE;
316 sib.helper_name = cmd;
317 drbd_bcast_event(mdev, &sib);
b411b363
PR
318 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
319 if (ret)
320 dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
321 usermode_helper, cmd, mb,
322 (ret >> 8) & 0xff, ret);
323 else
324 dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
325 usermode_helper, cmd, mb,
326 (ret >> 8) & 0xff, ret);
3b98c0c2
LE
327 sib.sib_reason = SIB_HELPER_POST;
328 sib.helper_exit_code = ret;
329 drbd_bcast_event(mdev, &sib);
b411b363
PR
330
331 if (ret < 0) /* Ignore any ERRNOs we got. */
332 ret = 0;
333
334 return ret;
335}
336
6b75dced
PR
337static void conn_md_sync(struct drbd_tconn *tconn)
338{
339 struct drbd_conf *mdev;
e90285e0 340 int vnr;
6b75dced 341
c141ebda
PR
342 rcu_read_lock();
343 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
344 kref_get(&mdev->kref);
345 rcu_read_unlock();
6b75dced 346 drbd_md_sync(mdev);
c141ebda
PR
347 kref_put(&mdev->kref, &drbd_minor_destroy);
348 rcu_read_lock();
349 }
350 rcu_read_unlock();
6b75dced
PR
351}
352
353int conn_khelper(struct drbd_tconn *tconn, char *cmd)
354{
355 char *envp[] = { "HOME=/",
356 "TERM=linux",
357 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
358 (char[20]) { }, /* address family */
359 (char[60]) { }, /* address */
360 NULL };
361 char *argv[] = {usermode_helper, cmd, tconn->name, NULL };
362 int ret;
363
364 setup_khelper_env(tconn, envp);
365 conn_md_sync(tconn);
366
367 conn_info(tconn, "helper command: %s %s %s\n", usermode_helper, cmd, tconn->name);
368 /* TODO: conn_bcast_event() ?? */
369
370 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
371 if (ret)
372 conn_warn(tconn, "helper command: %s %s %s exit code %u (0x%x)\n",
373 usermode_helper, cmd, tconn->name,
374 (ret >> 8) & 0xff, ret);
375 else
376 conn_info(tconn, "helper command: %s %s %s exit code %u (0x%x)\n",
377 usermode_helper, cmd, tconn->name,
378 (ret >> 8) & 0xff, ret);
379 /* TODO: conn_bcast_event() ?? */
380
381 if (ret < 0) /* Ignore any ERRNOs we got. */
382 ret = 0;
383
384 return ret;
385}
386
cb703454 387static enum drbd_fencing_p highest_fencing_policy(struct drbd_tconn *tconn)
b411b363 388{
cb703454
PR
389 enum drbd_fencing_p fp = FP_NOT_AVAIL;
390 struct drbd_conf *mdev;
391 int vnr;
392
695d08fa 393 rcu_read_lock();
cb703454
PR
394 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
395 if (get_ldev_if_state(mdev, D_CONSISTENT)) {
daeda1cc
PR
396 fp = max_t(enum drbd_fencing_p, fp,
397 rcu_dereference(mdev->ldev->disk_conf)->fencing);
cb703454
PR
398 put_ldev(mdev);
399 }
400 }
695d08fa 401 rcu_read_unlock();
cb703454
PR
402
403 return fp;
404}
405
406bool conn_try_outdate_peer(struct drbd_tconn *tconn)
407{
408 union drbd_state mask = { };
409 union drbd_state val = { };
410 enum drbd_fencing_p fp;
b411b363
PR
411 char *ex_to_string;
412 int r;
b411b363 413
cb703454
PR
414 if (tconn->cstate >= C_WF_REPORT_PARAMS) {
415 conn_err(tconn, "Expected cstate < C_WF_REPORT_PARAMS\n");
416 return false;
417 }
b411b363 418
cb703454
PR
419 fp = highest_fencing_policy(tconn);
420 switch (fp) {
421 case FP_NOT_AVAIL:
422 conn_warn(tconn, "Not fencing peer, I'm not even Consistent myself.\n");
fb22c402 423 goto out;
cb703454
PR
424 case FP_DONT_CARE:
425 return true;
426 default: ;
b411b363
PR
427 }
428
cb703454 429 r = conn_khelper(tconn, "fence-peer");
b411b363
PR
430
431 switch ((r>>8) & 0xff) {
432 case 3: /* peer is inconsistent */
433 ex_to_string = "peer is inconsistent or worse";
cb703454
PR
434 mask.pdsk = D_MASK;
435 val.pdsk = D_INCONSISTENT;
b411b363
PR
436 break;
437 case 4: /* peer got outdated, or was already outdated */
438 ex_to_string = "peer was fenced";
cb703454
PR
439 mask.pdsk = D_MASK;
440 val.pdsk = D_OUTDATED;
b411b363
PR
441 break;
442 case 5: /* peer was down */
cb703454 443 if (conn_highest_disk(tconn) == D_UP_TO_DATE) {
b411b363
PR
444 /* we will(have) create(d) a new UUID anyways... */
445 ex_to_string = "peer is unreachable, assumed to be dead";
cb703454
PR
446 mask.pdsk = D_MASK;
447 val.pdsk = D_OUTDATED;
b411b363
PR
448 } else {
449 ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
b411b363
PR
450 }
451 break;
452 case 6: /* Peer is primary, voluntarily outdate myself.
453 * This is useful when an unconnected R_SECONDARY is asked to
454 * become R_PRIMARY, but finds the other peer being active. */
455 ex_to_string = "peer is active";
cb703454
PR
456 conn_warn(tconn, "Peer is primary, outdating myself.\n");
457 mask.disk = D_MASK;
458 val.disk = D_OUTDATED;
b411b363
PR
459 break;
460 case 7:
461 if (fp != FP_STONITH)
cb703454 462 conn_err(tconn, "fence-peer() = 7 && fencing != Stonith !!!\n");
b411b363 463 ex_to_string = "peer was stonithed";
cb703454
PR
464 mask.pdsk = D_MASK;
465 val.pdsk = D_OUTDATED;
b411b363
PR
466 break;
467 default:
468 /* The script is broken ... */
cb703454
PR
469 conn_err(tconn, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
470 return false; /* Eventually leave IO frozen */
b411b363
PR
471 }
472
cb703454
PR
473 conn_info(tconn, "fence-peer helper returned %d (%s)\n",
474 (r>>8) & 0xff, ex_to_string);
fb22c402 475
cb703454 476 out:
fb22c402 477
cb703454
PR
478 /* Not using
479 conn_request_state(tconn, mask, val, CS_VERBOSE);
480 here, because we might were able to re-establish the connection in the
481 meantime. */
482 spin_lock_irq(&tconn->req_lock);
483 if (tconn->cstate < C_WF_REPORT_PARAMS)
484 _conn_request_state(tconn, mask, val, CS_VERBOSE);
485 spin_unlock_irq(&tconn->req_lock);
486
487 return conn_highest_pdsk(tconn) <= D_OUTDATED;
b411b363
PR
488}
489
87f7be4c
PR
490static int _try_outdate_peer_async(void *data)
491{
cb703454 492 struct drbd_tconn *tconn = (struct drbd_tconn *)data;
87f7be4c 493
cb703454 494 conn_try_outdate_peer(tconn);
87f7be4c 495
9dc9fbb3 496 kref_put(&tconn->kref, &conn_destroy);
87f7be4c
PR
497 return 0;
498}
499
cb703454 500void conn_try_outdate_peer_async(struct drbd_tconn *tconn)
87f7be4c
PR
501{
502 struct task_struct *opa;
503
9dc9fbb3 504 kref_get(&tconn->kref);
cb703454 505 opa = kthread_run(_try_outdate_peer_async, tconn, "drbd_async_h");
9dc9fbb3 506 if (IS_ERR(opa)) {
cb703454 507 conn_err(tconn, "out of mem, failed to invoke fence-peer helper\n");
9dc9fbb3
PR
508 kref_put(&tconn->kref, &conn_destroy);
509 }
87f7be4c 510}
b411b363 511
bf885f8a
AG
512enum drbd_state_rv
513drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
b411b363
PR
514{
515 const int max_tries = 4;
bf885f8a 516 enum drbd_state_rv rv = SS_UNKNOWN_ERROR;
44ed167d 517 struct net_conf *nc;
b411b363
PR
518 int try = 0;
519 int forced = 0;
520 union drbd_state mask, val;
b411b363
PR
521
522 if (new_role == R_PRIMARY)
0625ac19 523 request_ping(mdev->tconn); /* Detect a dead peer ASAP */
b411b363 524
8410da8f 525 mutex_lock(mdev->state_mutex);
b411b363
PR
526
527 mask.i = 0; mask.role = R_MASK;
528 val.i = 0; val.role = new_role;
529
530 while (try++ < max_tries) {
bf885f8a 531 rv = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
b411b363
PR
532
533 /* in case we first succeeded to outdate,
534 * but now suddenly could establish a connection */
bf885f8a 535 if (rv == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
b411b363
PR
536 val.pdsk = 0;
537 mask.pdsk = 0;
538 continue;
539 }
540
bf885f8a 541 if (rv == SS_NO_UP_TO_DATE_DISK && force &&
d10a33c6
PR
542 (mdev->state.disk < D_UP_TO_DATE &&
543 mdev->state.disk >= D_INCONSISTENT)) {
b411b363
PR
544 mask.disk = D_MASK;
545 val.disk = D_UP_TO_DATE;
546 forced = 1;
547 continue;
548 }
549
bf885f8a 550 if (rv == SS_NO_UP_TO_DATE_DISK &&
b411b363
PR
551 mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
552 D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
b411b363 553
cb703454 554 if (conn_try_outdate_peer(mdev->tconn)) {
b411b363
PR
555 val.disk = D_UP_TO_DATE;
556 mask.disk = D_MASK;
557 }
b411b363
PR
558 continue;
559 }
560
bf885f8a 561 if (rv == SS_NOTHING_TO_DO)
3b98c0c2 562 goto out;
bf885f8a 563 if (rv == SS_PRIMARY_NOP && mask.pdsk == 0) {
cb703454 564 if (!conn_try_outdate_peer(mdev->tconn) && force) {
b411b363 565 dev_warn(DEV, "Forced into split brain situation!\n");
cb703454
PR
566 mask.pdsk = D_MASK;
567 val.pdsk = D_OUTDATED;
b411b363 568
cb703454 569 }
b411b363
PR
570 continue;
571 }
bf885f8a 572 if (rv == SS_TWO_PRIMARIES) {
b411b363
PR
573 /* Maybe the peer is detected as dead very soon...
574 retry at most once more in this case. */
44ed167d
PR
575 int timeo;
576 rcu_read_lock();
577 nc = rcu_dereference(mdev->tconn->net_conf);
578 timeo = nc ? (nc->ping_timeo + 1) * HZ / 10 : 1;
579 rcu_read_unlock();
580 schedule_timeout_interruptible(timeo);
b411b363
PR
581 if (try < max_tries)
582 try = max_tries - 1;
583 continue;
584 }
bf885f8a
AG
585 if (rv < SS_SUCCESS) {
586 rv = _drbd_request_state(mdev, mask, val,
b411b363 587 CS_VERBOSE + CS_WAIT_COMPLETE);
bf885f8a 588 if (rv < SS_SUCCESS)
3b98c0c2 589 goto out;
b411b363
PR
590 }
591 break;
592 }
593
bf885f8a 594 if (rv < SS_SUCCESS)
3b98c0c2 595 goto out;
b411b363
PR
596
597 if (forced)
598 dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
599
600 /* Wait until nothing is on the fly :) */
601 wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
602
603 if (new_role == R_SECONDARY) {
81e84650 604 set_disk_ro(mdev->vdisk, true);
b411b363
PR
605 if (get_ldev(mdev)) {
606 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
607 put_ldev(mdev);
608 }
609 } else {
a0095508 610 mutex_lock(&mdev->tconn->conf_update);
91fd4dad 611 nc = mdev->tconn->net_conf;
44ed167d 612 if (nc)
6139f60d 613 nc->discard_my_data = 0; /* without copy; single bit op is atomic */
a0095508 614 mutex_unlock(&mdev->tconn->conf_update);
91fd4dad 615
81e84650 616 set_disk_ro(mdev->vdisk, false);
b411b363
PR
617 if (get_ldev(mdev)) {
618 if (((mdev->state.conn < C_CONNECTED ||
619 mdev->state.pdsk <= D_FAILED)
620 && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
621 drbd_uuid_new_current(mdev);
622
623 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
624 put_ldev(mdev);
625 }
626 }
627
19f843aa
LE
628 /* writeout of activity log covered areas of the bitmap
629 * to stable storage done in after state change already */
b411b363
PR
630
631 if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
632 /* if this was forced, we should consider sync */
633 if (forced)
634 drbd_send_uuids(mdev);
635 drbd_send_state(mdev);
636 }
637
638 drbd_md_sync(mdev);
639
640 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
3b98c0c2 641out:
8410da8f 642 mutex_unlock(mdev->state_mutex);
bf885f8a 643 return rv;
b411b363
PR
644}
645
3b98c0c2 646static const char *from_attrs_err_to_txt(int err)
b411b363 647{
3b98c0c2
LE
648 return err == -ENOMSG ? "required attribute missing" :
649 err == -EOPNOTSUPP ? "unknown mandatory attribute" :
f399002e 650 err == -EEXIST ? "can not change invariant setting" :
3b98c0c2 651 "invalid attribute value";
b411b363
PR
652}
653
3b98c0c2 654int drbd_adm_set_role(struct sk_buff *skb, struct genl_info *info)
b411b363 655{
3b98c0c2
LE
656 struct set_role_parms parms;
657 int err;
658 enum drbd_ret_code retcode;
b411b363 659
3b98c0c2
LE
660 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
661 if (!adm_ctx.reply_skb)
662 return retcode;
663 if (retcode != NO_ERROR)
664 goto out;
665
666 memset(&parms, 0, sizeof(parms));
667 if (info->attrs[DRBD_NLA_SET_ROLE_PARMS]) {
f399002e 668 err = set_role_parms_from_attrs(&parms, info);
3b98c0c2
LE
669 if (err) {
670 retcode = ERR_MANDATORY_TAG;
671 drbd_msg_put_info(from_attrs_err_to_txt(err));
672 goto out;
673 }
674 }
675
676 if (info->genlhdr->cmd == DRBD_ADM_PRIMARY)
677 retcode = drbd_set_role(adm_ctx.mdev, R_PRIMARY, parms.assume_uptodate);
678 else
679 retcode = drbd_set_role(adm_ctx.mdev, R_SECONDARY, 0);
680out:
681 drbd_adm_finish(info, retcode);
b411b363
PR
682 return 0;
683}
684
685/* initializes the md.*_offset members, so we are able to find
686 * the on disk meta data */
687static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
688 struct drbd_backing_dev *bdev)
689{
690 sector_t md_size_sect = 0;
daeda1cc
PR
691 int meta_dev_idx;
692
693 rcu_read_lock();
694 meta_dev_idx = rcu_dereference(bdev->disk_conf)->meta_dev_idx;
695
696 switch (meta_dev_idx) {
b411b363
PR
697 default:
698 /* v07 style fixed size indexed meta data */
699 bdev->md.md_size_sect = MD_RESERVED_SECT;
700 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
701 bdev->md.al_offset = MD_AL_OFFSET;
702 bdev->md.bm_offset = MD_BM_OFFSET;
703 break;
704 case DRBD_MD_INDEX_FLEX_EXT:
705 /* just occupy the full device; unit: sectors */
706 bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
707 bdev->md.md_offset = 0;
708 bdev->md.al_offset = MD_AL_OFFSET;
709 bdev->md.bm_offset = MD_BM_OFFSET;
710 break;
711 case DRBD_MD_INDEX_INTERNAL:
712 case DRBD_MD_INDEX_FLEX_INT:
713 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
714 /* al size is still fixed */
7ad651b5 715 bdev->md.al_offset = -MD_AL_SECTORS;
b411b363
PR
716 /* we need (slightly less than) ~ this much bitmap sectors: */
717 md_size_sect = drbd_get_capacity(bdev->backing_bdev);
718 md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
719 md_size_sect = BM_SECT_TO_EXT(md_size_sect);
720 md_size_sect = ALIGN(md_size_sect, 8);
721
722 /* plus the "drbd meta data super block",
723 * and the activity log; */
724 md_size_sect += MD_BM_OFFSET;
725
726 bdev->md.md_size_sect = md_size_sect;
727 /* bitmap offset is adjusted by 'super' block size */
728 bdev->md.bm_offset = -md_size_sect + MD_AL_OFFSET;
729 break;
730 }
daeda1cc 731 rcu_read_unlock();
b411b363
PR
732}
733
4b0715f0 734/* input size is expected to be in KB */
b411b363
PR
735char *ppsize(char *buf, unsigned long long size)
736{
4b0715f0
LE
737 /* Needs 9 bytes at max including trailing NUL:
738 * -1ULL ==> "16384 EB" */
b411b363
PR
739 static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
740 int base = 0;
4b0715f0 741 while (size >= 10000 && base < sizeof(units)-1) {
b411b363
PR
742 /* shift + round */
743 size = (size >> 10) + !!(size & (1<<9));
744 base++;
745 }
4b0715f0 746 sprintf(buf, "%u %cB", (unsigned)size, units[base]);
b411b363
PR
747
748 return buf;
749}
750
751/* there is still a theoretical deadlock when called from receiver
752 * on an D_INCONSISTENT R_PRIMARY:
753 * remote READ does inc_ap_bio, receiver would need to receive answer
754 * packet from remote to dec_ap_bio again.
755 * receiver receive_sizes(), comes here,
756 * waits for ap_bio_cnt == 0. -> deadlock.
757 * but this cannot happen, actually, because:
758 * R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
759 * (not connected, or bad/no disk on peer):
760 * see drbd_fail_request_early, ap_bio_cnt is zero.
761 * R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
762 * peer may not initiate a resize.
763 */
3b98c0c2
LE
764/* Note these are not to be confused with
765 * drbd_adm_suspend_io/drbd_adm_resume_io,
766 * which are (sub) state changes triggered by admin (drbdsetup),
767 * and can be long lived.
768 * This changes an mdev->flag, is triggered by drbd internals,
769 * and should be short-lived. */
b411b363
PR
770void drbd_suspend_io(struct drbd_conf *mdev)
771{
772 set_bit(SUSPEND_IO, &mdev->flags);
2aebfabb 773 if (drbd_suspended(mdev))
265be2d0 774 return;
b411b363
PR
775 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
776}
777
778void drbd_resume_io(struct drbd_conf *mdev)
779{
780 clear_bit(SUSPEND_IO, &mdev->flags);
781 wake_up(&mdev->misc_wait);
782}
783
784/**
785 * drbd_determine_dev_size() - Sets the right device size obeying all constraints
786 * @mdev: DRBD device.
787 *
788 * Returns 0 on success, negative return values indicate errors.
789 * You should call drbd_md_sync() after calling this function.
790 */
24c4830c 791enum determine_dev_size drbd_determine_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local)
b411b363
PR
792{
793 sector_t prev_first_sect, prev_size; /* previous meta location */
ef5e44a6 794 sector_t la_size, u_size;
b411b363
PR
795 sector_t size;
796 char ppb[10];
797
798 int md_moved, la_size_changed;
799 enum determine_dev_size rv = unchanged;
800
801 /* race:
802 * application request passes inc_ap_bio,
803 * but then cannot get an AL-reference.
804 * this function later may wait on ap_bio_cnt == 0. -> deadlock.
805 *
806 * to avoid that:
807 * Suspend IO right here.
808 * still lock the act_log to not trigger ASSERTs there.
809 */
810 drbd_suspend_io(mdev);
811
812 /* no wait necessary anymore, actually we could assert that */
813 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
814
815 prev_first_sect = drbd_md_first_sector(mdev->ldev);
816 prev_size = mdev->ldev->md.md_size_sect;
817 la_size = mdev->ldev->md.la_size_sect;
818
819 /* TODO: should only be some assert here, not (re)init... */
820 drbd_md_set_sector_offsets(mdev, mdev->ldev);
821
daeda1cc
PR
822 rcu_read_lock();
823 u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
824 rcu_read_unlock();
ef5e44a6 825 size = drbd_new_dev_size(mdev, mdev->ldev, u_size, flags & DDSF_FORCED);
b411b363
PR
826
827 if (drbd_get_capacity(mdev->this_bdev) != size ||
828 drbd_bm_capacity(mdev) != size) {
829 int err;
02d9a94b 830 err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC));
b411b363
PR
831 if (unlikely(err)) {
832 /* currently there is only one error: ENOMEM! */
833 size = drbd_bm_capacity(mdev)>>1;
834 if (size == 0) {
835 dev_err(DEV, "OUT OF MEMORY! "
836 "Could not allocate bitmap!\n");
837 } else {
838 dev_err(DEV, "BM resizing failed. "
839 "Leaving size unchanged at size = %lu KB\n",
840 (unsigned long)size);
841 }
842 rv = dev_size_error;
843 }
844 /* racy, see comments above. */
845 drbd_set_my_capacity(mdev, size);
846 mdev->ldev->md.la_size_sect = size;
847 dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
848 (unsigned long long)size>>1);
849 }
850 if (rv == dev_size_error)
851 goto out;
852
853 la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
854
855 md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
856 || prev_size != mdev->ldev->md.md_size_sect;
857
858 if (la_size_changed || md_moved) {
24dccabb
AG
859 int err;
860
b411b363
PR
861 drbd_al_shrink(mdev); /* All extents inactive. */
862 dev_info(DEV, "Writing the whole bitmap, %s\n",
863 la_size_changed && md_moved ? "size changed and md moved" :
864 la_size_changed ? "size changed" : "md moved");
20ceb2b2
LE
865 /* next line implicitly does drbd_suspend_io()+drbd_resume_io() */
866 err = drbd_bitmap_io(mdev, &drbd_bm_write,
867 "size changed", BM_LOCKED_MASK);
24dccabb
AG
868 if (err) {
869 rv = dev_size_error;
870 goto out;
871 }
b411b363
PR
872 drbd_md_mark_dirty(mdev);
873 }
874
875 if (size > la_size)
876 rv = grew;
877 if (size < la_size)
878 rv = shrunk;
879out:
880 lc_unlock(mdev->act_log);
881 wake_up(&mdev->al_wait);
882 drbd_resume_io(mdev);
883
884 return rv;
885}
886
887sector_t
ef5e44a6
PR
888drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev,
889 sector_t u_size, int assume_peer_has_space)
b411b363
PR
890{
891 sector_t p_size = mdev->p_size; /* partner's disk size. */
892 sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
893 sector_t m_size; /* my size */
b411b363
PR
894 sector_t size = 0;
895
896 m_size = drbd_get_max_capacity(bdev);
897
a393db6f
PR
898 if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
899 dev_warn(DEV, "Resize while not connected was forced by the user!\n");
900 p_size = m_size;
901 }
902
b411b363
PR
903 if (p_size && m_size) {
904 size = min_t(sector_t, p_size, m_size);
905 } else {
906 if (la_size) {
907 size = la_size;
908 if (m_size && m_size < size)
909 size = m_size;
910 if (p_size && p_size < size)
911 size = p_size;
912 } else {
913 if (m_size)
914 size = m_size;
915 if (p_size)
916 size = p_size;
917 }
918 }
919
920 if (size == 0)
921 dev_err(DEV, "Both nodes diskless!\n");
922
923 if (u_size) {
924 if (u_size > size)
925 dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
926 (unsigned long)u_size>>1, (unsigned long)size>>1);
927 else
928 size = u_size;
929 }
930
931 return size;
932}
933
934/**
935 * drbd_check_al_size() - Ensures that the AL is of the right size
936 * @mdev: DRBD device.
937 *
938 * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
939 * failed, and 0 on success. You should call drbd_md_sync() after you called
940 * this function.
941 */
f399002e 942static int drbd_check_al_size(struct drbd_conf *mdev, struct disk_conf *dc)
b411b363
PR
943{
944 struct lru_cache *n, *t;
945 struct lc_element *e;
946 unsigned int in_use;
947 int i;
948
b411b363 949 if (mdev->act_log &&
f399002e 950 mdev->act_log->nr_elements == dc->al_extents)
b411b363
PR
951 return 0;
952
953 in_use = 0;
954 t = mdev->act_log;
7ad651b5 955 n = lc_create("act_log", drbd_al_ext_cache, AL_UPDATES_PER_TRANSACTION,
f399002e 956 dc->al_extents, sizeof(struct lc_element), 0);
b411b363
PR
957
958 if (n == NULL) {
959 dev_err(DEV, "Cannot allocate act_log lru!\n");
960 return -ENOMEM;
961 }
962 spin_lock_irq(&mdev->al_lock);
963 if (t) {
964 for (i = 0; i < t->nr_elements; i++) {
965 e = lc_element_by_index(t, i);
966 if (e->refcnt)
967 dev_err(DEV, "refcnt(%d)==%d\n",
968 e->lc_number, e->refcnt);
969 in_use += e->refcnt;
970 }
971 }
972 if (!in_use)
973 mdev->act_log = n;
974 spin_unlock_irq(&mdev->al_lock);
975 if (in_use) {
976 dev_err(DEV, "Activity log still in use!\n");
977 lc_destroy(n);
978 return -EBUSY;
979 } else {
980 if (t)
981 lc_destroy(t);
982 }
983 drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
984 return 0;
985}
986
99432fcc 987static void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_bio_size)
b411b363
PR
988{
989 struct request_queue * const q = mdev->rq_queue;
99432fcc
PR
990 int max_hw_sectors = max_bio_size >> 9;
991 int max_segments = 0;
992
993 if (get_ldev_if_state(mdev, D_ATTACHING)) {
994 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
995
996 max_hw_sectors = min(queue_max_hw_sectors(b), max_bio_size >> 9);
daeda1cc
PR
997 rcu_read_lock();
998 max_segments = rcu_dereference(mdev->ldev->disk_conf)->max_bio_bvecs;
999 rcu_read_unlock();
99432fcc
PR
1000 put_ldev(mdev);
1001 }
b411b363 1002
b411b363 1003 blk_queue_logical_block_size(q, 512);
1816a2b4
LE
1004 blk_queue_max_hw_sectors(q, max_hw_sectors);
1005 /* This is the workaround for "bio would need to, but cannot, be split" */
1006 blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
1007 blk_queue_segment_boundary(q, PAGE_CACHE_SIZE-1);
b411b363 1008
99432fcc
PR
1009 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1010 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
1011
1012 blk_queue_stack_limits(q, b);
1013
1014 if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
1015 dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
1016 q->backing_dev_info.ra_pages,
1017 b->backing_dev_info.ra_pages);
1018 q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
1019 }
1020 put_ldev(mdev);
1021 }
1022}
1023
1024void drbd_reconsider_max_bio_size(struct drbd_conf *mdev)
1025{
1026 int now, new, local, peer;
1027
1028 now = queue_max_hw_sectors(mdev->rq_queue) << 9;
1029 local = mdev->local_max_bio_size; /* Eventually last known value, from volatile memory */
1030 peer = mdev->peer_max_bio_size; /* Eventually last known value, from meta data */
b411b363 1031
99432fcc
PR
1032 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1033 local = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9;
1034 mdev->local_max_bio_size = local;
1035 put_ldev(mdev);
b411b363 1036 }
99432fcc
PR
1037
1038 /* We may ignore peer limits if the peer is modern enough.
1039 Because new from 8.3.8 onwards the peer can use multiple
1040 BIOs for a single peer_request */
1041 if (mdev->state.conn >= C_CONNECTED) {
31890f4a 1042 if (mdev->tconn->agreed_pro_version < 94)
99432fcc 1043 peer = mdev->peer_max_bio_size;
31890f4a 1044 else if (mdev->tconn->agreed_pro_version == 94)
99432fcc
PR
1045 peer = DRBD_MAX_SIZE_H80_PACKET;
1046 else /* drbd 8.3.8 onwards */
1047 peer = DRBD_MAX_BIO_SIZE;
1048 }
1049
1050 new = min_t(int, local, peer);
1051
1052 if (mdev->state.role == R_PRIMARY && new < now)
1053 dev_err(DEV, "ASSERT FAILED new < now; (%d < %d)\n", new, now);
1054
1055 if (new != now)
1056 dev_info(DEV, "max BIO size = %u\n", new);
1057
1058 drbd_setup_queue_param(mdev, new);
b411b363
PR
1059}
1060
a18e9d1e 1061/* Starts the worker thread */
0e29d163 1062static void conn_reconfig_start(struct drbd_tconn *tconn)
b411b363 1063{
0e29d163
PR
1064 drbd_thread_start(&tconn->worker);
1065 conn_flush_workqueue(tconn);
b411b363
PR
1066}
1067
a18e9d1e 1068/* if still unconfigured, stops worker again. */
0e29d163 1069static void conn_reconfig_done(struct drbd_tconn *tconn)
b411b363 1070{
992d6e91 1071 bool stop_threads;
0e29d163 1072 spin_lock_irq(&tconn->req_lock);
992d6e91 1073 stop_threads = conn_all_vols_unconf(tconn);
0e29d163 1074 spin_unlock_irq(&tconn->req_lock);
992d6e91
LE
1075 if (stop_threads) {
1076 /* asender is implicitly stopped by receiver
81fa2e67 1077 * in conn_disconnect() */
992d6e91
LE
1078 drbd_thread_stop(&tconn->receiver);
1079 drbd_thread_stop(&tconn->worker);
1080 }
b411b363
PR
1081}
1082
0778286a
PR
1083/* Make sure IO is suspended before calling this function(). */
1084static void drbd_suspend_al(struct drbd_conf *mdev)
1085{
1086 int s = 0;
1087
61610420 1088 if (!lc_try_lock(mdev->act_log)) {
0778286a
PR
1089 dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n");
1090 return;
1091 }
1092
61610420 1093 drbd_al_shrink(mdev);
87eeee41 1094 spin_lock_irq(&mdev->tconn->req_lock);
0778286a
PR
1095 if (mdev->state.conn < C_CONNECTED)
1096 s = !test_and_set_bit(AL_SUSPENDED, &mdev->flags);
87eeee41 1097 spin_unlock_irq(&mdev->tconn->req_lock);
61610420 1098 lc_unlock(mdev->act_log);
0778286a
PR
1099
1100 if (s)
1101 dev_info(DEV, "Suspended AL updates\n");
1102}
1103
5979e361
LE
1104
1105static bool should_set_defaults(struct genl_info *info)
1106{
1107 unsigned flags = ((struct drbd_genlmsghdr*)info->userhdr)->flags;
1108 return 0 != (flags & DRBD_GENL_F_SET_DEFAULTS);
1109}
1110
d589a21e
PR
1111static void enforce_disk_conf_limits(struct disk_conf *dc)
1112{
1113 if (dc->al_extents < DRBD_AL_EXTENTS_MIN)
1114 dc->al_extents = DRBD_AL_EXTENTS_MIN;
1115 if (dc->al_extents > DRBD_AL_EXTENTS_MAX)
1116 dc->al_extents = DRBD_AL_EXTENTS_MAX;
1117
1118 if (dc->c_plan_ahead > DRBD_C_PLAN_AHEAD_MAX)
1119 dc->c_plan_ahead = DRBD_C_PLAN_AHEAD_MAX;
1120}
1121
f399002e
LE
1122int drbd_adm_disk_opts(struct sk_buff *skb, struct genl_info *info)
1123{
1124 enum drbd_ret_code retcode;
1125 struct drbd_conf *mdev;
daeda1cc 1126 struct disk_conf *new_disk_conf, *old_disk_conf;
813472ce 1127 struct fifo_buffer *old_plan = NULL, *new_plan = NULL;
f399002e 1128 int err, fifo_size;
f399002e
LE
1129
1130 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1131 if (!adm_ctx.reply_skb)
1132 return retcode;
1133 if (retcode != NO_ERROR)
1134 goto out;
1135
1136 mdev = adm_ctx.mdev;
1137
1138 /* we also need a disk
1139 * to change the options on */
1140 if (!get_ldev(mdev)) {
1141 retcode = ERR_NO_DISK;
1142 goto out;
1143 }
1144
daeda1cc 1145 new_disk_conf = kmalloc(sizeof(struct disk_conf), GFP_KERNEL);
5ecc72c3 1146 if (!new_disk_conf) {
f399002e
LE
1147 retcode = ERR_NOMEM;
1148 goto fail;
1149 }
1150
daeda1cc
PR
1151 mutex_lock(&mdev->tconn->conf_update);
1152 old_disk_conf = mdev->ldev->disk_conf;
1153 *new_disk_conf = *old_disk_conf;
5979e361 1154 if (should_set_defaults(info))
b966b5dd 1155 set_disk_conf_defaults(new_disk_conf);
5979e361 1156
5ecc72c3 1157 err = disk_conf_from_attrs_for_change(new_disk_conf, info);
c75b9b10 1158 if (err && err != -ENOMSG) {
f399002e
LE
1159 retcode = ERR_MANDATORY_TAG;
1160 drbd_msg_put_info(from_attrs_err_to_txt(err));
1161 }
1162
5ecc72c3
LE
1163 if (!expect(new_disk_conf->resync_rate >= 1))
1164 new_disk_conf->resync_rate = 1;
f399002e 1165
d589a21e 1166 enforce_disk_conf_limits(new_disk_conf);
f399002e 1167
5ecc72c3 1168 fifo_size = (new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ;
9958c857 1169 if (fifo_size != mdev->rs_plan_s->size) {
813472ce
PR
1170 new_plan = fifo_alloc(fifo_size);
1171 if (!new_plan) {
f399002e
LE
1172 dev_err(DEV, "kmalloc of fifo_buffer failed");
1173 retcode = ERR_NOMEM;
daeda1cc 1174 goto fail_unlock;
f399002e
LE
1175 }
1176 }
1177
f399002e
LE
1178 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
1179 drbd_al_shrink(mdev);
5ecc72c3 1180 err = drbd_check_al_size(mdev, new_disk_conf);
f399002e
LE
1181 lc_unlock(mdev->act_log);
1182 wake_up(&mdev->al_wait);
1183
1184 if (err) {
1185 retcode = ERR_NOMEM;
daeda1cc 1186 goto fail_unlock;
f399002e
LE
1187 }
1188
dc97b708 1189 write_lock_irq(&global_state_lock);
95f8efd0 1190 retcode = drbd_resync_after_valid(mdev, new_disk_conf->resync_after);
dc97b708 1191 if (retcode == NO_ERROR) {
daeda1cc 1192 rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
95f8efd0 1193 drbd_resync_after_changed(mdev);
dc97b708
PR
1194 }
1195 write_unlock_irq(&global_state_lock);
f399002e 1196
daeda1cc
PR
1197 if (retcode != NO_ERROR)
1198 goto fail_unlock;
f399002e 1199
813472ce
PR
1200 if (new_plan) {
1201 old_plan = mdev->rs_plan_s;
1202 rcu_assign_pointer(mdev->rs_plan_s, new_plan);
9958c857 1203 }
9958c857 1204
c141ebda 1205 mutex_unlock(&mdev->tconn->conf_update);
daeda1cc 1206 drbd_md_sync(mdev);
f399002e
LE
1207
1208 if (mdev->state.conn >= C_CONNECTED)
1209 drbd_send_sync_param(mdev);
1210
daeda1cc
PR
1211 synchronize_rcu();
1212 kfree(old_disk_conf);
813472ce 1213 kfree(old_plan);
daeda1cc
PR
1214 goto success;
1215
1216fail_unlock:
1217 mutex_unlock(&mdev->tconn->conf_update);
f399002e 1218 fail:
5ecc72c3 1219 kfree(new_disk_conf);
813472ce 1220 kfree(new_plan);
daeda1cc
PR
1221success:
1222 put_ldev(mdev);
f399002e
LE
1223 out:
1224 drbd_adm_finish(info, retcode);
1225 return 0;
1226}
1227
3b98c0c2 1228int drbd_adm_attach(struct sk_buff *skb, struct genl_info *info)
b411b363 1229{
3b98c0c2
LE
1230 struct drbd_conf *mdev;
1231 int err;
116676ca 1232 enum drbd_ret_code retcode;
b411b363
PR
1233 enum determine_dev_size dd;
1234 sector_t max_possible_sectors;
1235 sector_t min_md_device_sectors;
1236 struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
daeda1cc 1237 struct disk_conf *new_disk_conf = NULL;
e525fd89 1238 struct block_device *bdev;
b411b363 1239 struct lru_cache *resync_lru = NULL;
9958c857 1240 struct fifo_buffer *new_plan = NULL;
b411b363 1241 union drbd_state ns, os;
f2024e7c 1242 enum drbd_state_rv rv;
44ed167d 1243 struct net_conf *nc;
b411b363 1244 int cp_discovered = 0;
b411b363 1245
3b98c0c2
LE
1246 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1247 if (!adm_ctx.reply_skb)
1248 return retcode;
1249 if (retcode != NO_ERROR)
40cbf085 1250 goto finish;
3b98c0c2
LE
1251
1252 mdev = adm_ctx.mdev;
0e29d163 1253 conn_reconfig_start(mdev->tconn);
b411b363
PR
1254
1255 /* if you want to reconfigure, please tear down first */
1256 if (mdev->state.disk > D_DISKLESS) {
1257 retcode = ERR_DISK_CONFIGURED;
1258 goto fail;
1259 }
82f59cc6
LE
1260 /* It may just now have detached because of IO error. Make sure
1261 * drbd_ldev_destroy is done already, we may end up here very fast,
1262 * e.g. if someone calls attach from the on-io-error handler,
1263 * to realize a "hot spare" feature (not that I'd recommend that) */
1264 wait_event(mdev->misc_wait, !atomic_read(&mdev->local_cnt));
b411b363 1265
3b98c0c2 1266 /* allocation not in the IO path, drbdsetup context */
b411b363
PR
1267 nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
1268 if (!nbc) {
1269 retcode = ERR_NOMEM;
1270 goto fail;
1271 }
daeda1cc
PR
1272 new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
1273 if (!new_disk_conf) {
1274 retcode = ERR_NOMEM;
1275 goto fail;
1276 }
1277 nbc->disk_conf = new_disk_conf;
b411b363 1278
daeda1cc
PR
1279 set_disk_conf_defaults(new_disk_conf);
1280 err = disk_conf_from_attrs(new_disk_conf, info);
3b98c0c2 1281 if (err) {
b411b363 1282 retcode = ERR_MANDATORY_TAG;
3b98c0c2 1283 drbd_msg_put_info(from_attrs_err_to_txt(err));
b411b363
PR
1284 goto fail;
1285 }
1286
d589a21e
PR
1287 enforce_disk_conf_limits(new_disk_conf);
1288
9958c857
PR
1289 new_plan = fifo_alloc((new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ);
1290 if (!new_plan) {
1291 retcode = ERR_NOMEM;
1292 goto fail;
1293 }
1294
daeda1cc 1295 if (new_disk_conf->meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
b411b363
PR
1296 retcode = ERR_MD_IDX_INVALID;
1297 goto fail;
1298 }
1299
44ed167d
PR
1300 rcu_read_lock();
1301 nc = rcu_dereference(mdev->tconn->net_conf);
1302 if (nc) {
daeda1cc 1303 if (new_disk_conf->fencing == FP_STONITH && nc->wire_protocol == DRBD_PROT_A) {
44ed167d 1304 rcu_read_unlock();
47ff2d0a
PR
1305 retcode = ERR_STONITH_AND_PROT_A;
1306 goto fail;
1307 }
1308 }
44ed167d 1309 rcu_read_unlock();
47ff2d0a 1310
daeda1cc 1311 bdev = blkdev_get_by_path(new_disk_conf->backing_dev,
d4d77629 1312 FMODE_READ | FMODE_WRITE | FMODE_EXCL, mdev);
e525fd89 1313 if (IS_ERR(bdev)) {
daeda1cc 1314 dev_err(DEV, "open(\"%s\") failed with %ld\n", new_disk_conf->backing_dev,
e525fd89 1315 PTR_ERR(bdev));
b411b363
PR
1316 retcode = ERR_OPEN_DISK;
1317 goto fail;
1318 }
e525fd89
TH
1319 nbc->backing_bdev = bdev;
1320
1321 /*
1322 * meta_dev_idx >= 0: external fixed size, possibly multiple
1323 * drbd sharing one meta device. TODO in that case, paranoia
1324 * check that [md_bdev, meta_dev_idx] is not yet used by some
1325 * other drbd minor! (if you use drbd.conf + drbdadm, that
1326 * should check it for you already; but if you don't, or
1327 * someone fooled it, we need to double check here)
1328 */
daeda1cc 1329 bdev = blkdev_get_by_path(new_disk_conf->meta_dev,
d4d77629 1330 FMODE_READ | FMODE_WRITE | FMODE_EXCL,
daeda1cc 1331 (new_disk_conf->meta_dev_idx < 0) ?
d4d77629 1332 (void *)mdev : (void *)drbd_m_holder);
e525fd89 1333 if (IS_ERR(bdev)) {
daeda1cc 1334 dev_err(DEV, "open(\"%s\") failed with %ld\n", new_disk_conf->meta_dev,
e525fd89 1335 PTR_ERR(bdev));
b411b363
PR
1336 retcode = ERR_OPEN_MD_DISK;
1337 goto fail;
1338 }
e525fd89 1339 nbc->md_bdev = bdev;
b411b363 1340
e525fd89 1341 if ((nbc->backing_bdev == nbc->md_bdev) !=
daeda1cc
PR
1342 (new_disk_conf->meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
1343 new_disk_conf->meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
e525fd89 1344 retcode = ERR_MD_IDX_INVALID;
b411b363
PR
1345 goto fail;
1346 }
1347
1348 resync_lru = lc_create("resync", drbd_bm_ext_cache,
46a15bc3 1349 1, 61, sizeof(struct bm_extent),
b411b363
PR
1350 offsetof(struct bm_extent, lce));
1351 if (!resync_lru) {
1352 retcode = ERR_NOMEM;
e525fd89 1353 goto fail;
b411b363
PR
1354 }
1355
1356 /* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
1357 drbd_md_set_sector_offsets(mdev, nbc);
1358
daeda1cc 1359 if (drbd_get_max_capacity(nbc) < new_disk_conf->disk_size) {
b411b363
PR
1360 dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
1361 (unsigned long long) drbd_get_max_capacity(nbc),
daeda1cc 1362 (unsigned long long) new_disk_conf->disk_size);
67b58bf7 1363 retcode = ERR_DISK_TOO_SMALL;
e525fd89 1364 goto fail;
b411b363
PR
1365 }
1366
daeda1cc 1367 if (new_disk_conf->meta_dev_idx < 0) {
b411b363
PR
1368 max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
1369 /* at least one MB, otherwise it does not make sense */
1370 min_md_device_sectors = (2<<10);
1371 } else {
1372 max_possible_sectors = DRBD_MAX_SECTORS;
daeda1cc 1373 min_md_device_sectors = MD_RESERVED_SECT * (new_disk_conf->meta_dev_idx + 1);
b411b363
PR
1374 }
1375
b411b363 1376 if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
67b58bf7 1377 retcode = ERR_MD_DISK_TOO_SMALL;
b411b363
PR
1378 dev_warn(DEV, "refusing attach: md-device too small, "
1379 "at least %llu sectors needed for this meta-disk type\n",
1380 (unsigned long long) min_md_device_sectors);
e525fd89 1381 goto fail;
b411b363
PR
1382 }
1383
1384 /* Make sure the new disk is big enough
1385 * (we may currently be R_PRIMARY with no local disk...) */
1386 if (drbd_get_max_capacity(nbc) <
1387 drbd_get_capacity(mdev->this_bdev)) {
67b58bf7 1388 retcode = ERR_DISK_TOO_SMALL;
e525fd89 1389 goto fail;
b411b363
PR
1390 }
1391
1392 nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
1393
1352994b
LE
1394 if (nbc->known_size > max_possible_sectors) {
1395 dev_warn(DEV, "==> truncating very big lower level device "
1396 "to currently maximum possible %llu sectors <==\n",
1397 (unsigned long long) max_possible_sectors);
daeda1cc 1398 if (new_disk_conf->meta_dev_idx >= 0)
1352994b
LE
1399 dev_warn(DEV, "==>> using internal or flexible "
1400 "meta data may help <<==\n");
1401 }
1402
b411b363
PR
1403 drbd_suspend_io(mdev);
1404 /* also wait for the last barrier ack. */
2aebfabb 1405 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || drbd_suspended(mdev));
b411b363 1406 /* and for any other previously queued work */
a21e9298 1407 drbd_flush_workqueue(mdev);
b411b363 1408
f2024e7c
AG
1409 rv = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
1410 retcode = rv; /* FIXME: Type mismatch. */
b411b363 1411 drbd_resume_io(mdev);
f2024e7c 1412 if (rv < SS_SUCCESS)
e525fd89 1413 goto fail;
b411b363
PR
1414
1415 if (!get_ldev_if_state(mdev, D_ATTACHING))
1416 goto force_diskless;
1417
1418 drbd_md_set_sector_offsets(mdev, nbc);
1419
1420 if (!mdev->bitmap) {
1421 if (drbd_bm_init(mdev)) {
1422 retcode = ERR_NOMEM;
1423 goto force_diskless_dec;
1424 }
1425 }
1426
1427 retcode = drbd_md_read(mdev, nbc);
1428 if (retcode != NO_ERROR)
1429 goto force_diskless_dec;
1430
1431 if (mdev->state.conn < C_CONNECTED &&
1432 mdev->state.role == R_PRIMARY &&
1433 (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
1434 dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
1435 (unsigned long long)mdev->ed_uuid);
1436 retcode = ERR_DATA_NOT_CURRENT;
1437 goto force_diskless_dec;
1438 }
1439
1440 /* Since we are diskless, fix the activity log first... */
daeda1cc 1441 if (drbd_check_al_size(mdev, new_disk_conf)) {
b411b363
PR
1442 retcode = ERR_NOMEM;
1443 goto force_diskless_dec;
1444 }
1445
1446 /* Prevent shrinking of consistent devices ! */
1447 if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
daeda1cc 1448 drbd_new_dev_size(mdev, nbc, nbc->disk_conf->disk_size, 0) < nbc->md.la_size_sect) {
b411b363 1449 dev_warn(DEV, "refusing to truncate a consistent device\n");
67b58bf7 1450 retcode = ERR_DISK_TOO_SMALL;
b411b363
PR
1451 goto force_diskless_dec;
1452 }
1453
1454 if (!drbd_al_read_log(mdev, nbc)) {
1455 retcode = ERR_IO_MD_DISK;
1456 goto force_diskless_dec;
1457 }
1458
b411b363
PR
1459 /* Reset the "barriers don't work" bits here, then force meta data to
1460 * be written, to ensure we determine if barriers are supported. */
e544046a 1461 if (new_disk_conf->md_flushes)
a8a4e51e 1462 clear_bit(MD_NO_FUA, &mdev->flags);
e544046a
AG
1463 else
1464 set_bit(MD_NO_FUA, &mdev->flags);
b411b363
PR
1465
1466 /* Point of no return reached.
1467 * Devices and memory are no longer released by error cleanup below.
1468 * now mdev takes over responsibility, and the state engine should
1469 * clean it up somewhere. */
1470 D_ASSERT(mdev->ldev == NULL);
1471 mdev->ldev = nbc;
1472 mdev->resync = resync_lru;
9958c857 1473 mdev->rs_plan_s = new_plan;
b411b363
PR
1474 nbc = NULL;
1475 resync_lru = NULL;
daeda1cc 1476 new_disk_conf = NULL;
9958c857 1477 new_plan = NULL;
b411b363 1478
2451fc3b
PR
1479 mdev->write_ordering = WO_bdev_flush;
1480 drbd_bump_write_ordering(mdev, WO_bdev_flush);
b411b363
PR
1481
1482 if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
1483 set_bit(CRASHED_PRIMARY, &mdev->flags);
1484 else
1485 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1486
894c6a94 1487 if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
da9fbc27 1488 !(mdev->state.role == R_PRIMARY && mdev->tconn->susp_nod)) {
b411b363
PR
1489 set_bit(CRASHED_PRIMARY, &mdev->flags);
1490 cp_discovered = 1;
1491 }
1492
1493 mdev->send_cnt = 0;
1494 mdev->recv_cnt = 0;
1495 mdev->read_cnt = 0;
1496 mdev->writ_cnt = 0;
1497
99432fcc 1498 drbd_reconsider_max_bio_size(mdev);
b411b363
PR
1499
1500 /* If I am currently not R_PRIMARY,
1501 * but meta data primary indicator is set,
1502 * I just now recover from a hard crash,
1503 * and have been R_PRIMARY before that crash.
1504 *
1505 * Now, if I had no connection before that crash
1506 * (have been degraded R_PRIMARY), chances are that
1507 * I won't find my peer now either.
1508 *
1509 * In that case, and _only_ in that case,
1510 * we use the degr-wfc-timeout instead of the default,
1511 * so we can automatically recover from a crash of a
1512 * degraded but active "cluster" after a certain timeout.
1513 */
1514 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
1515 if (mdev->state.role != R_PRIMARY &&
1516 drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1517 !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
1518 set_bit(USE_DEGR_WFC_T, &mdev->flags);
1519
24c4830c 1520 dd = drbd_determine_dev_size(mdev, 0);
b411b363
PR
1521 if (dd == dev_size_error) {
1522 retcode = ERR_NOMEM_BITMAP;
1523 goto force_diskless_dec;
1524 } else if (dd == grew)
1525 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
1526
1527 if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) {
1528 dev_info(DEV, "Assuming that all blocks are out of sync "
1529 "(aka FullSync)\n");
20ceb2b2
LE
1530 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write,
1531 "set_n_write from attaching", BM_LOCKED_MASK)) {
b411b363
PR
1532 retcode = ERR_IO_MD_DISK;
1533 goto force_diskless_dec;
1534 }
1535 } else {
20ceb2b2 1536 if (drbd_bitmap_io(mdev, &drbd_bm_read,
22ab6a30 1537 "read from attaching", BM_LOCKED_MASK)) {
b411b363
PR
1538 retcode = ERR_IO_MD_DISK;
1539 goto force_diskless_dec;
1540 }
1541 }
1542
1543 if (cp_discovered) {
1544 drbd_al_apply_to_bm(mdev);
20ceb2b2
LE
1545 if (drbd_bitmap_io(mdev, &drbd_bm_write,
1546 "crashed primary apply AL", BM_LOCKED_MASK)) {
19f843aa
LE
1547 retcode = ERR_IO_MD_DISK;
1548 goto force_diskless_dec;
1549 }
b411b363
PR
1550 }
1551
0778286a
PR
1552 if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev))
1553 drbd_suspend_al(mdev); /* IO is still suspended here... */
1554
87eeee41 1555 spin_lock_irq(&mdev->tconn->req_lock);
78bae59b
PR
1556 os = drbd_read_state(mdev);
1557 ns = os;
b411b363
PR
1558 /* If MDF_CONSISTENT is not set go into inconsistent state,
1559 otherwise investigate MDF_WasUpToDate...
1560 If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
1561 otherwise into D_CONSISTENT state.
1562 */
1563 if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
1564 if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
1565 ns.disk = D_CONSISTENT;
1566 else
1567 ns.disk = D_OUTDATED;
1568 } else {
1569 ns.disk = D_INCONSISTENT;
1570 }
1571
1572 if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
1573 ns.pdsk = D_OUTDATED;
1574
daeda1cc
PR
1575 rcu_read_lock();
1576 if (ns.disk == D_CONSISTENT &&
1577 (ns.pdsk == D_OUTDATED || rcu_dereference(mdev->ldev->disk_conf)->fencing == FP_DONT_CARE))
b411b363 1578 ns.disk = D_UP_TO_DATE;
daeda1cc 1579 rcu_read_unlock();
b411b363
PR
1580
1581 /* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
1582 MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
1583 this point, because drbd_request_state() modifies these
1584 flags. */
1585
1586 /* In case we are C_CONNECTED postpone any decision on the new disk
1587 state after the negotiation phase. */
1588 if (mdev->state.conn == C_CONNECTED) {
1589 mdev->new_state_tmp.i = ns.i;
1590 ns.i = os.i;
1591 ns.disk = D_NEGOTIATING;
dc66c74d
PR
1592
1593 /* We expect to receive up-to-date UUIDs soon.
1594 To avoid a race in receive_state, free p_uuid while
1595 holding req_lock. I.e. atomic with the state change */
1596 kfree(mdev->p_uuid);
1597 mdev->p_uuid = NULL;
b411b363
PR
1598 }
1599
1600 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
87eeee41 1601 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1602
1603 if (rv < SS_SUCCESS)
1604 goto force_diskless_dec;
1605
1606 if (mdev->state.role == R_PRIMARY)
1607 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
1608 else
1609 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
1610
1611 drbd_md_mark_dirty(mdev);
1612 drbd_md_sync(mdev);
1613
1614 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1615 put_ldev(mdev);
0e29d163 1616 conn_reconfig_done(mdev->tconn);
3b98c0c2 1617 drbd_adm_finish(info, retcode);
b411b363
PR
1618 return 0;
1619
1620 force_diskless_dec:
1621 put_ldev(mdev);
1622 force_diskless:
82f59cc6 1623 drbd_force_state(mdev, NS(disk, D_FAILED));
b411b363 1624 drbd_md_sync(mdev);
b411b363 1625 fail:
40cbf085 1626 conn_reconfig_done(mdev->tconn);
b411b363 1627 if (nbc) {
e525fd89
TH
1628 if (nbc->backing_bdev)
1629 blkdev_put(nbc->backing_bdev,
1630 FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1631 if (nbc->md_bdev)
1632 blkdev_put(nbc->md_bdev,
1633 FMODE_READ | FMODE_WRITE | FMODE_EXCL);
b411b363
PR
1634 kfree(nbc);
1635 }
daeda1cc 1636 kfree(new_disk_conf);
b411b363 1637 lc_destroy(resync_lru);
9958c857 1638 kfree(new_plan);
b411b363 1639
40cbf085 1640 finish:
3b98c0c2 1641 drbd_adm_finish(info, retcode);
b411b363
PR
1642 return 0;
1643}
1644
85f75dd7
LE
1645static int adm_detach(struct drbd_conf *mdev)
1646{
19f83c76 1647 enum drbd_state_rv retcode;
009ba89d 1648 int ret;
85f75dd7 1649 drbd_suspend_io(mdev); /* so no-one is stuck in drbd_al_begin_io */
009ba89d
LE
1650 retcode = drbd_request_state(mdev, NS(disk, D_FAILED));
1651 /* D_FAILED will transition to DISKLESS. */
1652 ret = wait_event_interruptible(mdev->misc_wait,
1653 mdev->state.disk != D_FAILED);
85f75dd7 1654 drbd_resume_io(mdev);
009ba89d
LE
1655 if ((int)retcode == (int)SS_IS_DISKLESS)
1656 retcode = SS_NOTHING_TO_DO;
1657 if (ret)
1658 retcode = ERR_INTR;
85f75dd7
LE
1659 return retcode;
1660}
1661
82f59cc6
LE
1662/* Detaching the disk is a process in multiple stages. First we need to lock
1663 * out application IO, in-flight IO, IO stuck in drbd_al_begin_io.
1664 * Then we transition to D_DISKLESS, and wait for put_ldev() to return all
1665 * internal references as well.
1666 * Only then we have finally detached. */
3b98c0c2 1667int drbd_adm_detach(struct sk_buff *skb, struct genl_info *info)
b411b363 1668{
9a0d9d03 1669 enum drbd_ret_code retcode;
3b98c0c2
LE
1670
1671 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1672 if (!adm_ctx.reply_skb)
1673 return retcode;
1674 if (retcode != NO_ERROR)
1675 goto out;
1676
85f75dd7 1677 retcode = adm_detach(adm_ctx.mdev);
3b98c0c2
LE
1678out:
1679 drbd_adm_finish(info, retcode);
b411b363
PR
1680 return 0;
1681}
1682
f399002e
LE
1683static bool conn_resync_running(struct drbd_tconn *tconn)
1684{
1685 struct drbd_conf *mdev;
695d08fa 1686 bool rv = false;
f399002e
LE
1687 int vnr;
1688
695d08fa 1689 rcu_read_lock();
f399002e
LE
1690 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1691 if (mdev->state.conn == C_SYNC_SOURCE ||
1692 mdev->state.conn == C_SYNC_TARGET ||
1693 mdev->state.conn == C_PAUSED_SYNC_S ||
695d08fa
PR
1694 mdev->state.conn == C_PAUSED_SYNC_T) {
1695 rv = true;
1696 break;
1697 }
f399002e 1698 }
695d08fa
PR
1699 rcu_read_unlock();
1700
1701 return rv;
f399002e
LE
1702}
1703
1704static bool conn_ov_running(struct drbd_tconn *tconn)
1705{
1706 struct drbd_conf *mdev;
695d08fa 1707 bool rv = false;
f399002e
LE
1708 int vnr;
1709
695d08fa 1710 rcu_read_lock();
f399002e
LE
1711 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1712 if (mdev->state.conn == C_VERIFY_S ||
695d08fa
PR
1713 mdev->state.conn == C_VERIFY_T) {
1714 rv = true;
1715 break;
1716 }
f399002e 1717 }
695d08fa
PR
1718 rcu_read_unlock();
1719
1720 return rv;
f399002e
LE
1721}
1722
cd64397c 1723static enum drbd_ret_code
44ed167d 1724_check_net_options(struct drbd_tconn *tconn, struct net_conf *old_conf, struct net_conf *new_conf)
cd64397c
PR
1725{
1726 struct drbd_conf *mdev;
1727 int i;
1728
dcb20d1a
PR
1729 if (old_conf && tconn->cstate == C_WF_REPORT_PARAMS && tconn->agreed_pro_version < 100) {
1730 if (new_conf->wire_protocol != old_conf->wire_protocol)
1731 return ERR_NEED_APV_100;
1732
1733 if (new_conf->two_primaries != old_conf->two_primaries)
1734 return ERR_NEED_APV_100;
1735
1736 if (!new_conf->integrity_alg != !old_conf->integrity_alg)
1737 return ERR_NEED_APV_100;
1738
1739 if (strcmp(new_conf->integrity_alg, old_conf->integrity_alg))
1740 return ERR_NEED_APV_100;
1741 }
1742
1743 if (!new_conf->two_primaries &&
1744 conn_highest_role(tconn) == R_PRIMARY &&
1745 conn_highest_peer(tconn) == R_PRIMARY)
1746 return ERR_NEED_ALLOW_TWO_PRI;
b032b6fa 1747
cd64397c
PR
1748 if (new_conf->two_primaries &&
1749 (new_conf->wire_protocol != DRBD_PROT_C))
1750 return ERR_NOT_PROTO_C;
1751
cd64397c
PR
1752 idr_for_each_entry(&tconn->volumes, mdev, i) {
1753 if (get_ldev(mdev)) {
daeda1cc 1754 enum drbd_fencing_p fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
cd64397c 1755 put_ldev(mdev);
44ed167d 1756 if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH)
cd64397c 1757 return ERR_STONITH_AND_PROT_A;
cd64397c 1758 }
6139f60d 1759 if (mdev->state.role == R_PRIMARY && new_conf->discard_my_data)
cd64397c 1760 return ERR_DISCARD;
cd64397c 1761 }
cd64397c
PR
1762
1763 if (new_conf->on_congestion != OC_BLOCK && new_conf->wire_protocol != DRBD_PROT_A)
1764 return ERR_CONG_NOT_PROTO_A;
1765
1766 return NO_ERROR;
1767}
1768
44ed167d
PR
1769static enum drbd_ret_code
1770check_net_options(struct drbd_tconn *tconn, struct net_conf *new_conf)
1771{
1772 static enum drbd_ret_code rv;
1773 struct drbd_conf *mdev;
1774 int i;
1775
1776 rcu_read_lock();
1777 rv = _check_net_options(tconn, rcu_dereference(tconn->net_conf), new_conf);
1778 rcu_read_unlock();
1779
1780 /* tconn->volumes protected by genl_lock() here */
1781 idr_for_each_entry(&tconn->volumes, mdev, i) {
1782 if (!mdev->bitmap) {
1783 if(drbd_bm_init(mdev))
1784 return ERR_NOMEM;
1785 }
1786 }
1787
1788 return rv;
1789}
1790
0fd0ea06
PR
1791struct crypto {
1792 struct crypto_hash *verify_tfm;
1793 struct crypto_hash *csums_tfm;
1794 struct crypto_hash *cram_hmac_tfm;
8d412fc6 1795 struct crypto_hash *integrity_tfm;
0fd0ea06
PR
1796 void *int_dig_in;
1797 void *int_dig_vv;
1798};
1799
1800static int
4b6ad6d4 1801alloc_hash(struct crypto_hash **tfm, char *tfm_name, int err_alg)
0fd0ea06
PR
1802{
1803 if (!tfm_name[0])
1804 return NO_ERROR;
1805
1806 *tfm = crypto_alloc_hash(tfm_name, 0, CRYPTO_ALG_ASYNC);
1807 if (IS_ERR(*tfm)) {
1808 *tfm = NULL;
1809 return err_alg;
1810 }
1811
0fd0ea06
PR
1812 return NO_ERROR;
1813}
1814
1815static enum drbd_ret_code
1816alloc_crypto(struct crypto *crypto, struct net_conf *new_conf)
1817{
1818 char hmac_name[CRYPTO_MAX_ALG_NAME];
1819 enum drbd_ret_code rv;
1820 int hash_size;
1821
4b6ad6d4
AG
1822 rv = alloc_hash(&crypto->csums_tfm, new_conf->csums_alg,
1823 ERR_CSUMS_ALG);
0fd0ea06
PR
1824 if (rv != NO_ERROR)
1825 return rv;
4b6ad6d4
AG
1826 rv = alloc_hash(&crypto->verify_tfm, new_conf->verify_alg,
1827 ERR_VERIFY_ALG);
0fd0ea06
PR
1828 if (rv != NO_ERROR)
1829 return rv;
4b6ad6d4
AG
1830 rv = alloc_hash(&crypto->integrity_tfm, new_conf->integrity_alg,
1831 ERR_INTEGRITY_ALG);
0fd0ea06
PR
1832 if (rv != NO_ERROR)
1833 return rv;
0fd0ea06
PR
1834 if (new_conf->cram_hmac_alg[0] != 0) {
1835 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
1836 new_conf->cram_hmac_alg);
1837
4b6ad6d4
AG
1838 rv = alloc_hash(&crypto->cram_hmac_tfm, hmac_name,
1839 ERR_AUTH_ALG);
0fd0ea06 1840 }
8d412fc6
AG
1841 if (crypto->integrity_tfm) {
1842 hash_size = crypto_hash_digestsize(crypto->integrity_tfm);
0fd0ea06
PR
1843 crypto->int_dig_in = kmalloc(hash_size, GFP_KERNEL);
1844 if (!crypto->int_dig_in)
1845 return ERR_NOMEM;
1846 crypto->int_dig_vv = kmalloc(hash_size, GFP_KERNEL);
1847 if (!crypto->int_dig_vv)
1848 return ERR_NOMEM;
1849 }
1850
1851 return rv;
1852}
1853
1854static void free_crypto(struct crypto *crypto)
1855{
1856 kfree(crypto->int_dig_in);
1857 kfree(crypto->int_dig_vv);
1858 crypto_free_hash(crypto->cram_hmac_tfm);
8d412fc6 1859 crypto_free_hash(crypto->integrity_tfm);
0fd0ea06
PR
1860 crypto_free_hash(crypto->csums_tfm);
1861 crypto_free_hash(crypto->verify_tfm);
1862}
1863
f399002e
LE
1864int drbd_adm_net_opts(struct sk_buff *skb, struct genl_info *info)
1865{
1866 enum drbd_ret_code retcode;
1867 struct drbd_tconn *tconn;
44ed167d 1868 struct net_conf *old_conf, *new_conf = NULL;
f399002e
LE
1869 int err;
1870 int ovr; /* online verify running */
1871 int rsr; /* re-sync running */
0fd0ea06 1872 struct crypto crypto = { };
f399002e
LE
1873
1874 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
1875 if (!adm_ctx.reply_skb)
1876 return retcode;
1877 if (retcode != NO_ERROR)
1878 goto out;
1879
1880 tconn = adm_ctx.tconn;
1881
1882 new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
1883 if (!new_conf) {
1884 retcode = ERR_NOMEM;
1885 goto out;
1886 }
1887
44ed167d
PR
1888 conn_reconfig_start(tconn);
1889
88104ca4 1890 mutex_lock(&tconn->data.mutex);
a0095508 1891 mutex_lock(&tconn->conf_update);
91fd4dad 1892 old_conf = tconn->net_conf;
44ed167d
PR
1893
1894 if (!old_conf) {
f399002e
LE
1895 drbd_msg_put_info("net conf missing, try connect");
1896 retcode = ERR_INVALID_REQUEST;
91fd4dad 1897 goto fail;
f399002e
LE
1898 }
1899
44ed167d 1900 *new_conf = *old_conf;
5979e361 1901 if (should_set_defaults(info))
b966b5dd 1902 set_net_conf_defaults(new_conf);
f399002e 1903
f399002e 1904 err = net_conf_from_attrs_for_change(new_conf, info);
c75b9b10 1905 if (err && err != -ENOMSG) {
f399002e
LE
1906 retcode = ERR_MANDATORY_TAG;
1907 drbd_msg_put_info(from_attrs_err_to_txt(err));
1908 goto fail;
1909 }
1910
cd64397c
PR
1911 retcode = check_net_options(tconn, new_conf);
1912 if (retcode != NO_ERROR)
1913 goto fail;
1914
f399002e
LE
1915 /* re-sync running */
1916 rsr = conn_resync_running(tconn);
0fd0ea06 1917 if (rsr && strcmp(new_conf->csums_alg, old_conf->csums_alg)) {
f399002e 1918 retcode = ERR_CSUMS_RESYNC_RUNNING;
91fd4dad 1919 goto fail;
f399002e
LE
1920 }
1921
f399002e
LE
1922 /* online verify running */
1923 ovr = conn_ov_running(tconn);
0fd0ea06
PR
1924 if (ovr && strcmp(new_conf->verify_alg, old_conf->verify_alg)) {
1925 retcode = ERR_VERIFY_RUNNING;
1926 goto fail;
f399002e
LE
1927 }
1928
0fd0ea06
PR
1929 retcode = alloc_crypto(&crypto, new_conf);
1930 if (retcode != NO_ERROR)
1931 goto fail;
f399002e 1932
44ed167d 1933 rcu_assign_pointer(tconn->net_conf, new_conf);
f399002e
LE
1934
1935 if (!rsr) {
1936 crypto_free_hash(tconn->csums_tfm);
0fd0ea06
PR
1937 tconn->csums_tfm = crypto.csums_tfm;
1938 crypto.csums_tfm = NULL;
f399002e
LE
1939 }
1940 if (!ovr) {
1941 crypto_free_hash(tconn->verify_tfm);
0fd0ea06
PR
1942 tconn->verify_tfm = crypto.verify_tfm;
1943 crypto.verify_tfm = NULL;
f399002e
LE
1944 }
1945
0fd0ea06
PR
1946 kfree(tconn->int_dig_in);
1947 tconn->int_dig_in = crypto.int_dig_in;
1948 kfree(tconn->int_dig_vv);
1949 tconn->int_dig_vv = crypto.int_dig_vv;
8d412fc6
AG
1950 crypto_free_hash(tconn->integrity_tfm);
1951 tconn->integrity_tfm = crypto.integrity_tfm;
d659f2aa 1952 if (tconn->cstate >= C_WF_REPORT_PARAMS && tconn->agreed_pro_version >= 100)
88104ca4 1953 /* Do this without trying to take tconn->data.mutex again. */
d659f2aa 1954 __drbd_send_protocol(tconn, P_PROTOCOL_UPDATE);
0fd0ea06 1955
0fd0ea06
PR
1956 crypto_free_hash(tconn->cram_hmac_tfm);
1957 tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
1958
a0095508 1959 mutex_unlock(&tconn->conf_update);
88104ca4 1960 mutex_unlock(&tconn->data.mutex);
91fd4dad
PR
1961 synchronize_rcu();
1962 kfree(old_conf);
1963
f399002e
LE
1964 if (tconn->cstate >= C_WF_REPORT_PARAMS)
1965 drbd_send_sync_param(minor_to_mdev(conn_lowest_minor(tconn)));
1966
91fd4dad
PR
1967 goto done;
1968
f399002e 1969 fail:
a0095508 1970 mutex_unlock(&tconn->conf_update);
88104ca4 1971 mutex_unlock(&tconn->data.mutex);
0fd0ea06 1972 free_crypto(&crypto);
f399002e 1973 kfree(new_conf);
91fd4dad 1974 done:
f399002e
LE
1975 conn_reconfig_done(tconn);
1976 out:
1977 drbd_adm_finish(info, retcode);
1978 return 0;
1979}
1980
3b98c0c2 1981int drbd_adm_connect(struct sk_buff *skb, struct genl_info *info)
b411b363 1982{
3b98c0c2 1983 struct drbd_conf *mdev;
44ed167d 1984 struct net_conf *old_conf, *new_conf = NULL;
0fd0ea06 1985 struct crypto crypto = { };
80883197 1986 struct drbd_tconn *oconn;
3b98c0c2 1987 struct drbd_tconn *tconn;
b411b363 1988 struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr;
3b98c0c2
LE
1989 enum drbd_ret_code retcode;
1990 int i;
1991 int err;
b411b363 1992
3b98c0c2
LE
1993 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
1994 if (!adm_ctx.reply_skb)
1995 return retcode;
1996 if (retcode != NO_ERROR)
1997 goto out;
1998
1999 tconn = adm_ctx.tconn;
80883197 2000 conn_reconfig_start(tconn);
b411b363 2001
80883197 2002 if (tconn->cstate > C_STANDALONE) {
b411b363
PR
2003 retcode = ERR_NET_CONFIGURED;
2004 goto fail;
2005 }
2006
2007 /* allocation not in the IO path, cqueue thread context */
5979e361 2008 new_conf = kzalloc(sizeof(*new_conf), GFP_KERNEL);
b411b363
PR
2009 if (!new_conf) {
2010 retcode = ERR_NOMEM;
2011 goto fail;
2012 }
2013
b966b5dd 2014 set_net_conf_defaults(new_conf);
f399002e
LE
2015
2016 err = net_conf_from_attrs(new_conf, info);
3b98c0c2 2017 if (err) {
b411b363 2018 retcode = ERR_MANDATORY_TAG;
3b98c0c2 2019 drbd_msg_put_info(from_attrs_err_to_txt(err));
b411b363
PR
2020 goto fail;
2021 }
2022
cd64397c
PR
2023 retcode = check_net_options(tconn, new_conf);
2024 if (retcode != NO_ERROR)
422028b1 2025 goto fail;
422028b1 2026
b411b363
PR
2027 retcode = NO_ERROR;
2028
2029 new_my_addr = (struct sockaddr *)&new_conf->my_addr;
2030 new_peer_addr = (struct sockaddr *)&new_conf->peer_addr;
543cc10b 2031
c141ebda 2032 /* No need for _rcu here. All reconfiguration is
543cc10b
LE
2033 * strictly serialized on genl_lock(). We are protected against
2034 * concurrent reconfiguration/addition/deletion */
80883197 2035 list_for_each_entry(oconn, &drbd_tconns, all_tconn) {
44ed167d 2036 struct net_conf *nc;
80883197 2037 if (oconn == tconn)
b411b363 2038 continue;
44ed167d
PR
2039
2040 rcu_read_lock();
2041 nc = rcu_dereference(oconn->net_conf);
2042 if (nc) {
2043 taken_addr = (struct sockaddr *)&nc->my_addr;
2044 if (new_conf->my_addr_len == nc->my_addr_len &&
b411b363
PR
2045 !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len))
2046 retcode = ERR_LOCAL_ADDR;
2047
44ed167d
PR
2048 taken_addr = (struct sockaddr *)&nc->peer_addr;
2049 if (new_conf->peer_addr_len == nc->peer_addr_len &&
b411b363
PR
2050 !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len))
2051 retcode = ERR_PEER_ADDR;
b411b363 2052 }
44ed167d
PR
2053 rcu_read_unlock();
2054 if (retcode != NO_ERROR)
2055 goto fail;
b411b363
PR
2056 }
2057
0fd0ea06
PR
2058 retcode = alloc_crypto(&crypto, new_conf);
2059 if (retcode != NO_ERROR)
2060 goto fail;
b411b363 2061
b411b363
PR
2062 ((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
2063
80883197 2064 conn_flush_workqueue(tconn);
91fd4dad 2065
a0095508 2066 mutex_lock(&tconn->conf_update);
91fd4dad
PR
2067 old_conf = tconn->net_conf;
2068 if (old_conf) {
b411b363 2069 retcode = ERR_NET_CONFIGURED;
a0095508 2070 mutex_unlock(&tconn->conf_update);
b411b363
PR
2071 goto fail;
2072 }
44ed167d 2073 rcu_assign_pointer(tconn->net_conf, new_conf);
b411b363 2074
91fd4dad 2075 conn_free_crypto(tconn);
0fd0ea06
PR
2076 tconn->int_dig_in = crypto.int_dig_in;
2077 tconn->int_dig_vv = crypto.int_dig_vv;
2078 tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
8d412fc6 2079 tconn->integrity_tfm = crypto.integrity_tfm;
0fd0ea06
PR
2080 tconn->csums_tfm = crypto.csums_tfm;
2081 tconn->verify_tfm = crypto.verify_tfm;
b411b363 2082
a0095508 2083 mutex_unlock(&tconn->conf_update);
91fd4dad 2084
695d08fa 2085 rcu_read_lock();
80883197
PR
2086 idr_for_each_entry(&tconn->volumes, mdev, i) {
2087 mdev->send_cnt = 0;
2088 mdev->recv_cnt = 0;
80883197 2089 }
695d08fa 2090 rcu_read_unlock();
5ee743e9
LE
2091
2092 retcode = conn_request_state(tconn, NS(conn, C_UNCONNECTED), CS_VERBOSE);
2093
80883197 2094 conn_reconfig_done(tconn);
3b98c0c2 2095 drbd_adm_finish(info, retcode);
b411b363
PR
2096 return 0;
2097
2098fail:
0fd0ea06 2099 free_crypto(&crypto);
b411b363
PR
2100 kfree(new_conf);
2101
80883197 2102 conn_reconfig_done(tconn);
3b98c0c2
LE
2103out:
2104 drbd_adm_finish(info, retcode);
b411b363
PR
2105 return 0;
2106}
2107
85f75dd7
LE
2108static enum drbd_state_rv conn_try_disconnect(struct drbd_tconn *tconn, bool force)
2109{
2110 enum drbd_state_rv rv;
85f75dd7 2111
f3dfa40a
LE
2112 rv = conn_request_state(tconn, NS(conn, C_DISCONNECTING),
2113 force ? CS_HARD : 0);
85f75dd7
LE
2114
2115 switch (rv) {
2116 case SS_NOTHING_TO_DO:
f3dfa40a 2117 break;
85f75dd7
LE
2118 case SS_ALREADY_STANDALONE:
2119 return SS_SUCCESS;
2120 case SS_PRIMARY_NOP:
2121 /* Our state checking code wants to see the peer outdated. */
2122 rv = conn_request_state(tconn, NS2(conn, C_DISCONNECTING,
f3dfa40a 2123 pdsk, D_OUTDATED), CS_VERBOSE);
85f75dd7
LE
2124 break;
2125 case SS_CW_FAILED_BY_PEER:
2126 /* The peer probably wants to see us outdated. */
2127 rv = conn_request_state(tconn, NS2(conn, C_DISCONNECTING,
2128 disk, D_OUTDATED), 0);
2129 if (rv == SS_IS_DISKLESS || rv == SS_LOWER_THAN_OUTDATED) {
f3dfa40a
LE
2130 rv = conn_request_state(tconn, NS(conn, C_DISCONNECTING),
2131 CS_HARD);
85f75dd7
LE
2132 }
2133 break;
2134 default:;
2135 /* no special handling necessary */
2136 }
2137
f3dfa40a
LE
2138 if (rv >= SS_SUCCESS) {
2139 enum drbd_state_rv rv2;
2140 /* No one else can reconfigure the network while I am here.
2141 * The state handling only uses drbd_thread_stop_nowait(),
2142 * we want to really wait here until the receiver is no more.
2143 */
2144 drbd_thread_stop(&adm_ctx.tconn->receiver);
2145
2146 /* Race breaker. This additional state change request may be
2147 * necessary, if this was a forced disconnect during a receiver
2148 * restart. We may have "killed" the receiver thread just
2149 * after drbdd_init() returned. Typically, we should be
2150 * C_STANDALONE already, now, and this becomes a no-op.
2151 */
2152 rv2 = conn_request_state(tconn, NS(conn, C_STANDALONE),
2153 CS_VERBOSE | CS_HARD);
2154 if (rv2 < SS_SUCCESS)
2155 conn_err(tconn,
2156 "unexpected rv2=%d in conn_try_disconnect()\n",
2157 rv2);
2158 }
85f75dd7
LE
2159 return rv;
2160}
2161
3b98c0c2 2162int drbd_adm_disconnect(struct sk_buff *skb, struct genl_info *info)
b411b363 2163{
3b98c0c2
LE
2164 struct disconnect_parms parms;
2165 struct drbd_tconn *tconn;
85f75dd7 2166 enum drbd_state_rv rv;
3b98c0c2
LE
2167 enum drbd_ret_code retcode;
2168 int err;
2561b9c1 2169
3b98c0c2
LE
2170 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
2171 if (!adm_ctx.reply_skb)
2172 return retcode;
2173 if (retcode != NO_ERROR)
2561b9c1 2174 goto fail;
3b98c0c2
LE
2175
2176 tconn = adm_ctx.tconn;
2177 memset(&parms, 0, sizeof(parms));
2178 if (info->attrs[DRBD_NLA_DISCONNECT_PARMS]) {
f399002e 2179 err = disconnect_parms_from_attrs(&parms, info);
3b98c0c2
LE
2180 if (err) {
2181 retcode = ERR_MANDATORY_TAG;
2182 drbd_msg_put_info(from_attrs_err_to_txt(err));
2183 goto fail;
2184 }
2561b9c1
PR
2185 }
2186
85f75dd7
LE
2187 rv = conn_try_disconnect(tconn, parms.force_disconnect);
2188 if (rv < SS_SUCCESS)
f3dfa40a
LE
2189 retcode = rv; /* FIXME: Type mismatch. */
2190 else
2191 retcode = NO_ERROR;
b411b363 2192 fail:
3b98c0c2 2193 drbd_adm_finish(info, retcode);
b411b363
PR
2194 return 0;
2195}
2196
2197void resync_after_online_grow(struct drbd_conf *mdev)
2198{
2199 int iass; /* I am sync source */
2200
2201 dev_info(DEV, "Resync of new storage after online grow\n");
2202 if (mdev->state.role != mdev->state.peer)
2203 iass = (mdev->state.role == R_PRIMARY);
2204 else
25703f83 2205 iass = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363
PR
2206
2207 if (iass)
2208 drbd_start_resync(mdev, C_SYNC_SOURCE);
2209 else
2210 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
2211}
2212
3b98c0c2 2213int drbd_adm_resize(struct sk_buff *skb, struct genl_info *info)
b411b363 2214{
daeda1cc 2215 struct disk_conf *old_disk_conf, *new_disk_conf = NULL;
3b98c0c2
LE
2216 struct resize_parms rs;
2217 struct drbd_conf *mdev;
2218 enum drbd_ret_code retcode;
b411b363 2219 enum determine_dev_size dd;
6495d2c6 2220 enum dds_flags ddsf;
daeda1cc 2221 sector_t u_size;
3b98c0c2 2222 int err;
b411b363 2223
3b98c0c2
LE
2224 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2225 if (!adm_ctx.reply_skb)
2226 return retcode;
2227 if (retcode != NO_ERROR)
b411b363 2228 goto fail;
3b98c0c2
LE
2229
2230 memset(&rs, 0, sizeof(struct resize_parms));
2231 if (info->attrs[DRBD_NLA_RESIZE_PARMS]) {
f399002e 2232 err = resize_parms_from_attrs(&rs, info);
3b98c0c2
LE
2233 if (err) {
2234 retcode = ERR_MANDATORY_TAG;
2235 drbd_msg_put_info(from_attrs_err_to_txt(err));
2236 goto fail;
2237 }
b411b363
PR
2238 }
2239
3b98c0c2 2240 mdev = adm_ctx.mdev;
b411b363
PR
2241 if (mdev->state.conn > C_CONNECTED) {
2242 retcode = ERR_RESIZE_RESYNC;
2243 goto fail;
2244 }
2245
2246 if (mdev->state.role == R_SECONDARY &&
2247 mdev->state.peer == R_SECONDARY) {
2248 retcode = ERR_NO_PRIMARY;
2249 goto fail;
2250 }
2251
2252 if (!get_ldev(mdev)) {
2253 retcode = ERR_NO_DISK;
2254 goto fail;
2255 }
2256
31890f4a 2257 if (rs.no_resync && mdev->tconn->agreed_pro_version < 93) {
6495d2c6
PR
2258 retcode = ERR_NEED_APV_93;
2259 goto fail;
2260 }
2261
daeda1cc
PR
2262 rcu_read_lock();
2263 u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
2264 rcu_read_unlock();
2265 if (u_size != (sector_t)rs.resize_size) {
2266 new_disk_conf = kmalloc(sizeof(struct disk_conf), GFP_KERNEL);
2267 if (!new_disk_conf) {
2268 retcode = ERR_NOMEM;
2269 goto fail;
2270 }
2271 }
2272
087c2492 2273 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev))
b411b363 2274 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
b411b363 2275
daeda1cc
PR
2276 if (new_disk_conf) {
2277 mutex_lock(&mdev->tconn->conf_update);
2278 old_disk_conf = mdev->ldev->disk_conf;
2279 *new_disk_conf = *old_disk_conf;
2280 new_disk_conf->disk_size = (sector_t)rs.resize_size;
2281 rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
2282 mutex_unlock(&mdev->tconn->conf_update);
2283 synchronize_rcu();
2284 kfree(old_disk_conf);
2285 }
2286
6495d2c6 2287 ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0);
24c4830c 2288 dd = drbd_determine_dev_size(mdev, ddsf);
b411b363
PR
2289 drbd_md_sync(mdev);
2290 put_ldev(mdev);
2291 if (dd == dev_size_error) {
2292 retcode = ERR_NOMEM_BITMAP;
2293 goto fail;
2294 }
2295
087c2492 2296 if (mdev->state.conn == C_CONNECTED) {
b411b363
PR
2297 if (dd == grew)
2298 set_bit(RESIZE_PENDING, &mdev->flags);
2299
2300 drbd_send_uuids(mdev);
6495d2c6 2301 drbd_send_sizes(mdev, 1, ddsf);
b411b363
PR
2302 }
2303
2304 fail:
3b98c0c2 2305 drbd_adm_finish(info, retcode);
b411b363
PR
2306 return 0;
2307}
2308
b966b5dd
AG
2309void drbd_set_res_opts_defaults(struct res_opts *r)
2310{
2311 return set_res_opts_defaults(r);
2312}
2313
f399002e 2314int drbd_adm_resource_opts(struct sk_buff *skb, struct genl_info *info)
b411b363 2315{
3b98c0c2 2316 enum drbd_ret_code retcode;
b411b363 2317 cpumask_var_t new_cpu_mask;
f399002e 2318 struct drbd_tconn *tconn;
b57a1e27 2319 struct res_opts res_opts;
f399002e 2320 int err;
b411b363 2321
f399002e 2322 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
3b98c0c2
LE
2323 if (!adm_ctx.reply_skb)
2324 return retcode;
2325 if (retcode != NO_ERROR)
2326 goto fail;
f399002e 2327 tconn = adm_ctx.tconn;
3b98c0c2 2328
b411b363
PR
2329 if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) {
2330 retcode = ERR_NOMEM;
3b98c0c2 2331 drbd_msg_put_info("unable to allocate cpumask");
b411b363
PR
2332 goto fail;
2333 }
2334
b57a1e27 2335 res_opts = tconn->res_opts;
5979e361 2336 if (should_set_defaults(info))
b966b5dd 2337 set_res_opts_defaults(&res_opts);
b411b363 2338
b57a1e27 2339 err = res_opts_from_attrs(&res_opts, info);
c75b9b10 2340 if (err && err != -ENOMSG) {
b411b363 2341 retcode = ERR_MANDATORY_TAG;
3b98c0c2 2342 drbd_msg_put_info(from_attrs_err_to_txt(err));
b411b363
PR
2343 goto fail;
2344 }
2345
b411b363 2346 /* silently ignore cpu mask on UP kernel */
b57a1e27
LE
2347 if (nr_cpu_ids > 1 && res_opts.cpu_mask[0] != 0) {
2348 err = __bitmap_parse(res_opts.cpu_mask, 32, 0,
b411b363
PR
2349 cpumask_bits(new_cpu_mask), nr_cpu_ids);
2350 if (err) {
f399002e 2351 conn_warn(tconn, "__bitmap_parse() failed with %d\n", err);
b411b363
PR
2352 retcode = ERR_CPU_MASK_PARSE;
2353 goto fail;
2354 }
2355 }
2356
b411b363 2357
b57a1e27 2358 tconn->res_opts = res_opts;
b411b363 2359
f399002e
LE
2360 if (!cpumask_equal(tconn->cpu_mask, new_cpu_mask)) {
2361 cpumask_copy(tconn->cpu_mask, new_cpu_mask);
2362 drbd_calc_cpu_mask(tconn);
2363 tconn->receiver.reset_cpu_mask = 1;
2364 tconn->asender.reset_cpu_mask = 1;
2365 tconn->worker.reset_cpu_mask = 1;
b411b363
PR
2366 }
2367
b411b363
PR
2368fail:
2369 free_cpumask_var(new_cpu_mask);
3b98c0c2
LE
2370
2371 drbd_adm_finish(info, retcode);
b411b363
PR
2372 return 0;
2373}
2374
3b98c0c2 2375int drbd_adm_invalidate(struct sk_buff *skb, struct genl_info *info)
b411b363 2376{
3b98c0c2
LE
2377 struct drbd_conf *mdev;
2378 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
2379
2380 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2381 if (!adm_ctx.reply_skb)
2382 return retcode;
2383 if (retcode != NO_ERROR)
2384 goto out;
2385
2386 mdev = adm_ctx.mdev;
b411b363 2387
194bfb32
LE
2388 /* If there is still bitmap IO pending, probably because of a previous
2389 * resync just being finished, wait for it before requesting a new resync. */
2390 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
2391
b411b363
PR
2392 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
2393
2394 if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
2395 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
2396
2397 while (retcode == SS_NEED_CONNECTION) {
87eeee41 2398 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
2399 if (mdev->state.conn < C_CONNECTED)
2400 retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
87eeee41 2401 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
2402
2403 if (retcode != SS_NEED_CONNECTION)
2404 break;
2405
2406 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
2407 }
2408
3b98c0c2
LE
2409out:
2410 drbd_adm_finish(info, retcode);
b411b363
PR
2411 return 0;
2412}
2413
0778286a
PR
2414static int drbd_bmio_set_susp_al(struct drbd_conf *mdev)
2415{
2416 int rv;
2417
2418 rv = drbd_bmio_set_n_write(mdev);
2419 drbd_suspend_al(mdev);
2420 return rv;
2421}
2422
3b98c0c2
LE
2423static int drbd_adm_simple_request_state(struct sk_buff *skb, struct genl_info *info,
2424 union drbd_state mask, union drbd_state val)
b411b363 2425{
3b98c0c2 2426 enum drbd_ret_code retcode;
194bfb32 2427
3b98c0c2
LE
2428 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2429 if (!adm_ctx.reply_skb)
2430 return retcode;
2431 if (retcode != NO_ERROR)
2432 goto out;
b411b363 2433
3b98c0c2
LE
2434 retcode = drbd_request_state(adm_ctx.mdev, mask, val);
2435out:
2436 drbd_adm_finish(info, retcode);
b411b363
PR
2437 return 0;
2438}
2439
3b98c0c2 2440int drbd_adm_invalidate_peer(struct sk_buff *skb, struct genl_info *info)
b411b363 2441{
3b98c0c2
LE
2442 return drbd_adm_simple_request_state(skb, info, NS(conn, C_STARTING_SYNC_S));
2443}
b411b363 2444
3b98c0c2
LE
2445int drbd_adm_pause_sync(struct sk_buff *skb, struct genl_info *info)
2446{
2447 enum drbd_ret_code retcode;
2448
2449 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2450 if (!adm_ctx.reply_skb)
2451 return retcode;
2452 if (retcode != NO_ERROR)
2453 goto out;
b411b363 2454
3b98c0c2
LE
2455 if (drbd_request_state(adm_ctx.mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
2456 retcode = ERR_PAUSE_IS_SET;
2457out:
2458 drbd_adm_finish(info, retcode);
b411b363
PR
2459 return 0;
2460}
2461
3b98c0c2 2462int drbd_adm_resume_sync(struct sk_buff *skb, struct genl_info *info)
b411b363 2463{
da9fbc27 2464 union drbd_dev_state s;
3b98c0c2
LE
2465 enum drbd_ret_code retcode;
2466
2467 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2468 if (!adm_ctx.reply_skb)
2469 return retcode;
2470 if (retcode != NO_ERROR)
2471 goto out;
b411b363 2472
3b98c0c2
LE
2473 if (drbd_request_state(adm_ctx.mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO) {
2474 s = adm_ctx.mdev->state;
cd88d030
PR
2475 if (s.conn == C_PAUSED_SYNC_S || s.conn == C_PAUSED_SYNC_T) {
2476 retcode = s.aftr_isp ? ERR_PIC_AFTER_DEP :
2477 s.peer_isp ? ERR_PIC_PEER_DEP : ERR_PAUSE_IS_CLEAR;
2478 } else {
2479 retcode = ERR_PAUSE_IS_CLEAR;
2480 }
2481 }
b411b363 2482
3b98c0c2
LE
2483out:
2484 drbd_adm_finish(info, retcode);
b411b363
PR
2485 return 0;
2486}
2487
3b98c0c2 2488int drbd_adm_suspend_io(struct sk_buff *skb, struct genl_info *info)
b411b363 2489{
3b98c0c2 2490 return drbd_adm_simple_request_state(skb, info, NS(susp, 1));
b411b363
PR
2491}
2492
3b98c0c2 2493int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info)
b411b363 2494{
3b98c0c2
LE
2495 struct drbd_conf *mdev;
2496 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
2497
2498 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2499 if (!adm_ctx.reply_skb)
2500 return retcode;
2501 if (retcode != NO_ERROR)
2502 goto out;
2503
2504 mdev = adm_ctx.mdev;
43a5182c
PR
2505 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
2506 drbd_uuid_new_current(mdev);
2507 clear_bit(NEW_CUR_UUID, &mdev->flags);
43a5182c 2508 }
265be2d0 2509 drbd_suspend_io(mdev);
3b98c0c2
LE
2510 retcode = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0));
2511 if (retcode == SS_SUCCESS) {
265be2d0 2512 if (mdev->state.conn < C_CONNECTED)
2f5cdd0b 2513 tl_clear(mdev->tconn);
265be2d0 2514 if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED)
2f5cdd0b 2515 tl_restart(mdev->tconn, FAIL_FROZEN_DISK_IO);
265be2d0
PR
2516 }
2517 drbd_resume_io(mdev);
2518
3b98c0c2
LE
2519out:
2520 drbd_adm_finish(info, retcode);
b411b363
PR
2521 return 0;
2522}
2523
3b98c0c2 2524int drbd_adm_outdate(struct sk_buff *skb, struct genl_info *info)
b411b363 2525{
3b98c0c2 2526 return drbd_adm_simple_request_state(skb, info, NS(disk, D_OUTDATED));
b411b363
PR
2527}
2528
543cc10b
LE
2529int nla_put_drbd_cfg_context(struct sk_buff *skb, const char *conn_name, unsigned vnr)
2530{
2531 struct nlattr *nla;
2532 nla = nla_nest_start(skb, DRBD_NLA_CFG_CONTEXT);
2533 if (!nla)
2534 goto nla_put_failure;
2535 if (vnr != VOLUME_UNSPECIFIED)
2536 NLA_PUT_U32(skb, T_ctx_volume, vnr);
2537 NLA_PUT_STRING(skb, T_ctx_conn_name, conn_name);
2538 nla_nest_end(skb, nla);
2539 return 0;
2540
2541nla_put_failure:
2542 if (nla)
2543 nla_nest_cancel(skb, nla);
2544 return -EMSGSIZE;
2545}
2546
3b98c0c2
LE
2547int nla_put_status_info(struct sk_buff *skb, struct drbd_conf *mdev,
2548 const struct sib_info *sib)
b411b363 2549{
3b98c0c2 2550 struct state_info *si = NULL; /* for sizeof(si->member); */
44ed167d 2551 struct net_conf *nc;
3b98c0c2
LE
2552 struct nlattr *nla;
2553 int got_ldev;
3b98c0c2
LE
2554 int err = 0;
2555 int exclude_sensitive;
2556
2557 /* If sib != NULL, this is drbd_bcast_event, which anyone can listen
2558 * to. So we better exclude_sensitive information.
2559 *
2560 * If sib == NULL, this is drbd_adm_get_status, executed synchronously
2561 * in the context of the requesting user process. Exclude sensitive
2562 * information, unless current has superuser.
2563 *
2564 * NOTE: for drbd_adm_get_status_all(), this is a netlink dump, and
2565 * relies on the current implementation of netlink_dump(), which
2566 * executes the dump callback successively from netlink_recvmsg(),
2567 * always in the context of the receiving process */
2568 exclude_sensitive = sib || !capable(CAP_SYS_ADMIN);
2569
2570 got_ldev = get_ldev(mdev);
3b98c0c2
LE
2571
2572 /* We need to add connection name and volume number information still.
2573 * Minor number is in drbd_genlmsghdr. */
543cc10b 2574 if (nla_put_drbd_cfg_context(skb, mdev->tconn->name, mdev->vnr))
3b98c0c2 2575 goto nla_put_failure;
3b98c0c2 2576
f399002e
LE
2577 if (res_opts_to_skb(skb, &mdev->tconn->res_opts, exclude_sensitive))
2578 goto nla_put_failure;
2579
daeda1cc 2580 rcu_read_lock();
3b98c0c2 2581 if (got_ldev)
daeda1cc 2582 if (disk_conf_to_skb(skb, rcu_dereference(mdev->ldev->disk_conf), exclude_sensitive))
3b98c0c2 2583 goto nla_put_failure;
44ed167d 2584
44ed167d
PR
2585 nc = rcu_dereference(mdev->tconn->net_conf);
2586 if (nc)
2587 err = net_conf_to_skb(skb, nc, exclude_sensitive);
2588 rcu_read_unlock();
2589 if (err)
2590 goto nla_put_failure;
3b98c0c2 2591
3b98c0c2
LE
2592 nla = nla_nest_start(skb, DRBD_NLA_STATE_INFO);
2593 if (!nla)
2594 goto nla_put_failure;
2595 NLA_PUT_U32(skb, T_sib_reason, sib ? sib->sib_reason : SIB_GET_STATUS_REPLY);
2596 NLA_PUT_U32(skb, T_current_state, mdev->state.i);
2597 NLA_PUT_U64(skb, T_ed_uuid, mdev->ed_uuid);
2598 NLA_PUT_U64(skb, T_capacity, drbd_get_capacity(mdev->this_bdev));
2599
2600 if (got_ldev) {
2601 NLA_PUT_U32(skb, T_disk_flags, mdev->ldev->md.flags);
2602 NLA_PUT(skb, T_uuids, sizeof(si->uuids), mdev->ldev->md.uuid);
2603 NLA_PUT_U64(skb, T_bits_total, drbd_bm_bits(mdev));
2604 NLA_PUT_U64(skb, T_bits_oos, drbd_bm_total_weight(mdev));
2605 if (C_SYNC_SOURCE <= mdev->state.conn &&
2606 C_PAUSED_SYNC_T >= mdev->state.conn) {
2607 NLA_PUT_U64(skb, T_bits_rs_total, mdev->rs_total);
2608 NLA_PUT_U64(skb, T_bits_rs_failed, mdev->rs_failed);
2609 }
b411b363
PR
2610 }
2611
3b98c0c2
LE
2612 if (sib) {
2613 switch(sib->sib_reason) {
2614 case SIB_SYNC_PROGRESS:
2615 case SIB_GET_STATUS_REPLY:
2616 break;
2617 case SIB_STATE_CHANGE:
2618 NLA_PUT_U32(skb, T_prev_state, sib->os.i);
2619 NLA_PUT_U32(skb, T_new_state, sib->ns.i);
2620 break;
2621 case SIB_HELPER_POST:
2622 NLA_PUT_U32(skb,
2623 T_helper_exit_code, sib->helper_exit_code);
2624 /* fall through */
2625 case SIB_HELPER_PRE:
2626 NLA_PUT_STRING(skb, T_helper, sib->helper_name);
2627 break;
2628 }
b411b363 2629 }
3b98c0c2 2630 nla_nest_end(skb, nla);
b411b363 2631
3b98c0c2
LE
2632 if (0)
2633nla_put_failure:
2634 err = -EMSGSIZE;
2635 if (got_ldev)
2636 put_ldev(mdev);
3b98c0c2 2637 return err;
b411b363
PR
2638}
2639
3b98c0c2 2640int drbd_adm_get_status(struct sk_buff *skb, struct genl_info *info)
b411b363 2641{
3b98c0c2
LE
2642 enum drbd_ret_code retcode;
2643 int err;
b411b363 2644
3b98c0c2
LE
2645 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2646 if (!adm_ctx.reply_skb)
2647 return retcode;
2648 if (retcode != NO_ERROR)
2649 goto out;
b411b363 2650
3b98c0c2
LE
2651 err = nla_put_status_info(adm_ctx.reply_skb, adm_ctx.mdev, NULL);
2652 if (err) {
2653 nlmsg_free(adm_ctx.reply_skb);
2654 return err;
b411b363 2655 }
3b98c0c2
LE
2656out:
2657 drbd_adm_finish(info, retcode);
2658 return 0;
b411b363
PR
2659}
2660
71932efc 2661int get_one_status(struct sk_buff *skb, struct netlink_callback *cb)
b411b363 2662{
3b98c0c2
LE
2663 struct drbd_conf *mdev;
2664 struct drbd_genlmsghdr *dh;
543cc10b
LE
2665 struct drbd_tconn *pos = (struct drbd_tconn*)cb->args[0];
2666 struct drbd_tconn *tconn = NULL;
2667 struct drbd_tconn *tmp;
2668 unsigned volume = cb->args[1];
2669
2670 /* Open coded, deferred, iteration:
2671 * list_for_each_entry_safe(tconn, tmp, &drbd_tconns, all_tconn) {
2672 * idr_for_each_entry(&tconn->volumes, mdev, i) {
2673 * ...
2674 * }
2675 * }
2676 * where tconn is cb->args[0];
2677 * and i is cb->args[1];
2678 *
71932efc
LE
2679 * cb->args[2] indicates if we shall loop over all resources,
2680 * or just dump all volumes of a single resource.
2681 *
3b98c0c2
LE
2682 * This may miss entries inserted after this dump started,
2683 * or entries deleted before they are reached.
543cc10b
LE
2684 *
2685 * We need to make sure the mdev won't disappear while
2686 * we are looking at it, and revalidate our iterators
2687 * on each iteration.
2688 */
3b98c0c2 2689
9dc9fbb3 2690 /* synchronize with conn_create()/conn_destroy() */
c141ebda 2691 rcu_read_lock();
543cc10b 2692 /* revalidate iterator position */
ec0bddbc 2693 list_for_each_entry_rcu(tmp, &drbd_tconns, all_tconn) {
543cc10b
LE
2694 if (pos == NULL) {
2695 /* first iteration */
2696 pos = tmp;
2697 tconn = pos;
2698 break;
2699 }
2700 if (tmp == pos) {
2701 tconn = pos;
2702 break;
2703 }
2704 }
2705 if (tconn) {
71932efc 2706next_tconn:
543cc10b
LE
2707 mdev = idr_get_next(&tconn->volumes, &volume);
2708 if (!mdev) {
2709 /* No more volumes to dump on this tconn.
2710 * Advance tconn iterator. */
ec0bddbc
PR
2711 pos = list_entry_rcu(tconn->all_tconn.next,
2712 struct drbd_tconn, all_tconn);
71932efc 2713 /* Did we dump any volume on this tconn yet? */
543cc10b 2714 if (volume != 0) {
71932efc
LE
2715 /* If we reached the end of the list,
2716 * or only a single resource dump was requested,
2717 * we are done. */
2718 if (&pos->all_tconn == &drbd_tconns || cb->args[2])
2719 goto out;
543cc10b 2720 volume = 0;
71932efc 2721 tconn = pos;
543cc10b
LE
2722 goto next_tconn;
2723 }
2724 }
2725
3b98c0c2
LE
2726 dh = genlmsg_put(skb, NETLINK_CB(cb->skb).pid,
2727 cb->nlh->nlmsg_seq, &drbd_genl_family,
2728 NLM_F_MULTI, DRBD_ADM_GET_STATUS);
2729 if (!dh)
543cc10b
LE
2730 goto out;
2731
2732 if (!mdev) {
2733 /* this is a tconn without a single volume */
2734 dh->minor = -1U;
2735 dh->ret_code = NO_ERROR;
2736 if (nla_put_drbd_cfg_context(skb, tconn->name, VOLUME_UNSPECIFIED))
2737 genlmsg_cancel(skb, dh);
2738 else
2739 genlmsg_end(skb, dh);
2740 goto out;
2741 }
3b98c0c2 2742
543cc10b
LE
2743 D_ASSERT(mdev->vnr == volume);
2744 D_ASSERT(mdev->tconn == tconn);
3b98c0c2 2745
543cc10b 2746 dh->minor = mdev_to_minor(mdev);
3b98c0c2
LE
2747 dh->ret_code = NO_ERROR;
2748
2749 if (nla_put_status_info(skb, mdev, NULL)) {
2750 genlmsg_cancel(skb, dh);
543cc10b 2751 goto out;
3b98c0c2
LE
2752 }
2753 genlmsg_end(skb, dh);
2754 }
b411b363 2755
543cc10b 2756out:
c141ebda 2757 rcu_read_unlock();
543cc10b
LE
2758 /* where to start the next iteration */
2759 cb->args[0] = (long)pos;
2760 cb->args[1] = (pos == tconn) ? volume + 1 : 0;
b411b363 2761
543cc10b
LE
2762 /* No more tconns/volumes/minors found results in an empty skb.
2763 * Which will terminate the dump. */
3b98c0c2 2764 return skb->len;
b411b363
PR
2765}
2766
71932efc
LE
2767/*
2768 * Request status of all resources, or of all volumes within a single resource.
2769 *
2770 * This is a dump, as the answer may not fit in a single reply skb otherwise.
2771 * Which means we cannot use the family->attrbuf or other such members, because
2772 * dump is NOT protected by the genl_lock(). During dump, we only have access
2773 * to the incoming skb, and need to opencode "parsing" of the nlattr payload.
2774 *
2775 * Once things are setup properly, we call into get_one_status().
2776 */
2777int drbd_adm_get_status_all(struct sk_buff *skb, struct netlink_callback *cb)
2778{
2779 const unsigned hdrlen = GENL_HDRLEN + GENL_MAGIC_FAMILY_HDRSZ;
2780 struct nlattr *nla;
2781 const char *conn_name;
2782 struct drbd_tconn *tconn;
2783
2784 /* Is this a followup call? */
2785 if (cb->args[0]) {
2786 /* ... of a single resource dump,
2787 * and the resource iterator has been advanced already? */
2788 if (cb->args[2] && cb->args[2] != cb->args[0])
2789 return 0; /* DONE. */
2790 goto dump;
2791 }
2792
2793 /* First call (from netlink_dump_start). We need to figure out
2794 * which resource(s) the user wants us to dump. */
2795 nla = nla_find(nlmsg_attrdata(cb->nlh, hdrlen),
2796 nlmsg_attrlen(cb->nlh, hdrlen),
2797 DRBD_NLA_CFG_CONTEXT);
2798
2799 /* No explicit context given. Dump all. */
2800 if (!nla)
2801 goto dump;
2802 nla = nla_find_nested(nla, __nla_type(T_ctx_conn_name));
2803 /* context given, but no name present? */
2804 if (!nla)
2805 return -EINVAL;
2806 conn_name = nla_data(nla);
0ace9dfa
PR
2807 tconn = conn_get_by_name(conn_name);
2808
71932efc
LE
2809 if (!tconn)
2810 return -ENODEV;
2811
0ace9dfa
PR
2812 kref_put(&tconn->kref, &conn_destroy); /* get_one_status() (re)validates tconn by itself */
2813
71932efc
LE
2814 /* prime iterators, and set "filter" mode mark:
2815 * only dump this tconn. */
2816 cb->args[0] = (long)tconn;
2817 /* cb->args[1] = 0; passed in this way. */
2818 cb->args[2] = (long)tconn;
2819
2820dump:
2821 return get_one_status(skb, cb);
2822}
2823
3b98c0c2 2824int drbd_adm_get_timeout_type(struct sk_buff *skb, struct genl_info *info)
b411b363 2825{
3b98c0c2
LE
2826 enum drbd_ret_code retcode;
2827 struct timeout_parms tp;
2828 int err;
b411b363 2829
3b98c0c2
LE
2830 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2831 if (!adm_ctx.reply_skb)
2832 return retcode;
2833 if (retcode != NO_ERROR)
2834 goto out;
b411b363 2835
3b98c0c2
LE
2836 tp.timeout_type =
2837 adm_ctx.mdev->state.pdsk == D_OUTDATED ? UT_PEER_OUTDATED :
2838 test_bit(USE_DEGR_WFC_T, &adm_ctx.mdev->flags) ? UT_DEGRADED :
2839 UT_DEFAULT;
b411b363 2840
3b98c0c2
LE
2841 err = timeout_parms_to_priv_skb(adm_ctx.reply_skb, &tp);
2842 if (err) {
2843 nlmsg_free(adm_ctx.reply_skb);
2844 return err;
2845 }
2846out:
2847 drbd_adm_finish(info, retcode);
2848 return 0;
b411b363
PR
2849}
2850
3b98c0c2 2851int drbd_adm_start_ov(struct sk_buff *skb, struct genl_info *info)
b411b363 2852{
3b98c0c2
LE
2853 struct drbd_conf *mdev;
2854 enum drbd_ret_code retcode;
b411b363 2855
3b98c0c2
LE
2856 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2857 if (!adm_ctx.reply_skb)
2858 return retcode;
2859 if (retcode != NO_ERROR)
2860 goto out;
873b0d5f 2861
3b98c0c2
LE
2862 mdev = adm_ctx.mdev;
2863 if (info->attrs[DRBD_NLA_START_OV_PARMS]) {
2864 /* resume from last known position, if possible */
2865 struct start_ov_parms parms =
2866 { .ov_start_sector = mdev->ov_start_sector };
f399002e 2867 int err = start_ov_parms_from_attrs(&parms, info);
3b98c0c2
LE
2868 if (err) {
2869 retcode = ERR_MANDATORY_TAG;
2870 drbd_msg_put_info(from_attrs_err_to_txt(err));
2871 goto out;
2872 }
2873 /* w_make_ov_request expects position to be aligned */
2874 mdev->ov_start_sector = parms.ov_start_sector & ~BM_SECT_PER_BIT;
2875 }
873b0d5f
LE
2876 /* If there is still bitmap IO pending, e.g. previous resync or verify
2877 * just being finished, wait for it before requesting a new resync. */
2878 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
3b98c0c2
LE
2879 retcode = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
2880out:
2881 drbd_adm_finish(info, retcode);
b411b363
PR
2882 return 0;
2883}
2884
2885
3b98c0c2 2886int drbd_adm_new_c_uuid(struct sk_buff *skb, struct genl_info *info)
b411b363 2887{
3b98c0c2
LE
2888 struct drbd_conf *mdev;
2889 enum drbd_ret_code retcode;
b411b363
PR
2890 int skip_initial_sync = 0;
2891 int err;
3b98c0c2 2892 struct new_c_uuid_parms args;
b411b363 2893
3b98c0c2
LE
2894 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2895 if (!adm_ctx.reply_skb)
2896 return retcode;
2897 if (retcode != NO_ERROR)
2898 goto out_nolock;
b411b363 2899
3b98c0c2
LE
2900 mdev = adm_ctx.mdev;
2901 memset(&args, 0, sizeof(args));
2902 if (info->attrs[DRBD_NLA_NEW_C_UUID_PARMS]) {
f399002e 2903 err = new_c_uuid_parms_from_attrs(&args, info);
3b98c0c2
LE
2904 if (err) {
2905 retcode = ERR_MANDATORY_TAG;
2906 drbd_msg_put_info(from_attrs_err_to_txt(err));
2907 goto out_nolock;
2908 }
b411b363
PR
2909 }
2910
8410da8f 2911 mutex_lock(mdev->state_mutex); /* Protects us against serialized state changes. */
b411b363
PR
2912
2913 if (!get_ldev(mdev)) {
2914 retcode = ERR_NO_DISK;
2915 goto out;
2916 }
2917
2918 /* this is "skip initial sync", assume to be clean */
31890f4a 2919 if (mdev->state.conn == C_CONNECTED && mdev->tconn->agreed_pro_version >= 90 &&
b411b363
PR
2920 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
2921 dev_info(DEV, "Preparing to skip initial sync\n");
2922 skip_initial_sync = 1;
2923 } else if (mdev->state.conn != C_STANDALONE) {
2924 retcode = ERR_CONNECTED;
2925 goto out_dec;
2926 }
2927
2928 drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
2929 drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
2930
2931 if (args.clear_bm) {
20ceb2b2
LE
2932 err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
2933 "clear_n_write from new_c_uuid", BM_LOCKED_MASK);
b411b363
PR
2934 if (err) {
2935 dev_err(DEV, "Writing bitmap failed with %d\n",err);
2936 retcode = ERR_IO_MD_DISK;
2937 }
2938 if (skip_initial_sync) {
2939 drbd_send_uuids_skip_initial_sync(mdev);
2940 _drbd_uuid_set(mdev, UI_BITMAP, 0);
62b0da3a 2941 drbd_print_uuids(mdev, "cleared bitmap UUID");
87eeee41 2942 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
2943 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
2944 CS_VERBOSE, NULL);
87eeee41 2945 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
2946 }
2947 }
2948
2949 drbd_md_sync(mdev);
2950out_dec:
2951 put_ldev(mdev);
2952out:
8410da8f 2953 mutex_unlock(mdev->state_mutex);
3b98c0c2
LE
2954out_nolock:
2955 drbd_adm_finish(info, retcode);
774b3055
PR
2956 return 0;
2957}
2958
3b98c0c2
LE
2959static enum drbd_ret_code
2960drbd_check_conn_name(const char *name)
774b3055 2961{
3b98c0c2
LE
2962 if (!name || !name[0]) {
2963 drbd_msg_put_info("connection name missing");
2964 return ERR_MANDATORY_TAG;
774b3055 2965 }
3b98c0c2
LE
2966 /* if we want to use these in sysfs/configfs/debugfs some day,
2967 * we must not allow slashes */
2968 if (strchr(name, '/')) {
2969 drbd_msg_put_info("invalid connection name");
2970 return ERR_INVALID_REQUEST;
774b3055 2971 }
3b98c0c2 2972 return NO_ERROR;
774b3055
PR
2973}
2974
3b98c0c2 2975int drbd_adm_create_connection(struct sk_buff *skb, struct genl_info *info)
b411b363 2976{
3b98c0c2 2977 enum drbd_ret_code retcode;
9f5180e5 2978
3b98c0c2
LE
2979 retcode = drbd_adm_prepare(skb, info, 0);
2980 if (!adm_ctx.reply_skb)
2981 return retcode;
2982 if (retcode != NO_ERROR)
2983 goto out;
b411b363 2984
3b98c0c2
LE
2985 retcode = drbd_check_conn_name(adm_ctx.conn_name);
2986 if (retcode != NO_ERROR)
2987 goto out;
b411b363 2988
3b98c0c2 2989 if (adm_ctx.tconn) {
38f19616
LE
2990 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL) {
2991 retcode = ERR_INVALID_REQUEST;
2992 drbd_msg_put_info("connection exists");
2993 }
2994 /* else: still NO_ERROR */
3b98c0c2 2995 goto out;
b411b363
PR
2996 }
2997
9dc9fbb3 2998 if (!conn_create(adm_ctx.conn_name))
b411b363 2999 retcode = ERR_NOMEM;
3b98c0c2
LE
3000out:
3001 drbd_adm_finish(info, retcode);
3002 return 0;
b411b363
PR
3003}
3004
3b98c0c2 3005int drbd_adm_add_minor(struct sk_buff *skb, struct genl_info *info)
b411b363 3006{
3b98c0c2
LE
3007 struct drbd_genlmsghdr *dh = info->userhdr;
3008 enum drbd_ret_code retcode;
b411b363 3009
3b98c0c2
LE
3010 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
3011 if (!adm_ctx.reply_skb)
3012 return retcode;
3013 if (retcode != NO_ERROR)
3014 goto out;
b411b363 3015
3b98c0c2
LE
3016 /* FIXME drop minor_count parameter, limit to MINORMASK */
3017 if (dh->minor >= minor_count) {
3018 drbd_msg_put_info("requested minor out of range");
3019 retcode = ERR_INVALID_REQUEST;
3020 goto out;
b411b363 3021 }
0c8e36d9 3022 if (adm_ctx.volume > DRBD_VOLUME_MAX) {
3b98c0c2
LE
3023 drbd_msg_put_info("requested volume id out of range");
3024 retcode = ERR_INVALID_REQUEST;
3025 goto out;
b411b363 3026 }
b411b363 3027
38f19616
LE
3028 /* drbd_adm_prepare made sure already
3029 * that mdev->tconn and mdev->vnr match the request. */
3030 if (adm_ctx.mdev) {
3031 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL)
3032 retcode = ERR_MINOR_EXISTS;
3033 /* else: still NO_ERROR */
3034 goto out;
3035 }
3036
3b98c0c2
LE
3037 retcode = conn_new_minor(adm_ctx.tconn, dh->minor, adm_ctx.volume);
3038out:
3039 drbd_adm_finish(info, retcode);
3040 return 0;
b411b363
PR
3041}
3042
85f75dd7
LE
3043static enum drbd_ret_code adm_delete_minor(struct drbd_conf *mdev)
3044{
3045 if (mdev->state.disk == D_DISKLESS &&
3046 /* no need to be mdev->state.conn == C_STANDALONE &&
3047 * we may want to delete a minor from a live replication group.
3048 */
3049 mdev->state.role == R_SECONDARY) {
81fa2e67
PR
3050 idr_remove(&mdev->tconn->volumes, mdev->vnr);
3051 idr_remove(&minors, mdev_to_minor(mdev));
3052 del_gendisk(mdev->vdisk);
3053 synchronize_rcu();
3054 kref_put(&mdev->kref, &drbd_minor_destroy);
85f75dd7
LE
3055 return NO_ERROR;
3056 } else
3057 return ERR_MINOR_CONFIGURED;
3058}
3059
3b98c0c2 3060int drbd_adm_delete_minor(struct sk_buff *skb, struct genl_info *info)
b411b363 3061{
3b98c0c2 3062 enum drbd_ret_code retcode;
b411b363 3063
3b98c0c2
LE
3064 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
3065 if (!adm_ctx.reply_skb)
3066 return retcode;
3067 if (retcode != NO_ERROR)
3068 goto out;
b411b363 3069
85f75dd7 3070 retcode = adm_delete_minor(adm_ctx.mdev);
85f75dd7
LE
3071out:
3072 drbd_adm_finish(info, retcode);
3073 return 0;
3074}
3075
3076int drbd_adm_down(struct sk_buff *skb, struct genl_info *info)
3077{
f3dfa40a 3078 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
85f75dd7
LE
3079 struct drbd_conf *mdev;
3080 unsigned i;
3081
3082 retcode = drbd_adm_prepare(skb, info, 0);
3083 if (!adm_ctx.reply_skb)
3084 return retcode;
3085 if (retcode != NO_ERROR)
3086 goto out;
3087
3088 if (!adm_ctx.tconn) {
3089 retcode = ERR_CONN_NOT_KNOWN;
3090 goto out;
3091 }
3092
85f75dd7
LE
3093 /* demote */
3094 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
3095 retcode = drbd_set_role(mdev, R_SECONDARY, 0);
3096 if (retcode < SS_SUCCESS) {
3097 drbd_msg_put_info("failed to demote");
c141ebda 3098 goto out;
85f75dd7
LE
3099 }
3100 }
3101
f3dfa40a
LE
3102 retcode = conn_try_disconnect(adm_ctx.tconn, 0);
3103 if (retcode < SS_SUCCESS) {
85f75dd7 3104 drbd_msg_put_info("failed to disconnect");
f3dfa40a 3105 goto out;
85f75dd7
LE
3106 }
3107
3108 /* detach */
3109 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
f3dfa40a
LE
3110 retcode = adm_detach(mdev);
3111 if (retcode < SS_SUCCESS) {
85f75dd7 3112 drbd_msg_put_info("failed to detach");
c141ebda 3113 goto out;
85f75dd7
LE
3114 }
3115 }
3116
f3dfa40a
LE
3117 /* If we reach this, all volumes (of this tconn) are Secondary,
3118 * Disconnected, Diskless, aka Unconfigured. Make sure all threads have
c141ebda 3119 * actually stopped, state handling only does drbd_thread_stop_nowait(). */
f3dfa40a
LE
3120 drbd_thread_stop(&adm_ctx.tconn->worker);
3121
3122 /* Now, nothing can fail anymore */
3123
85f75dd7
LE
3124 /* delete volumes */
3125 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
3126 retcode = adm_delete_minor(mdev);
3127 if (retcode != NO_ERROR) {
3128 /* "can not happen" */
3129 drbd_msg_put_info("failed to delete volume");
ef356262 3130 goto out;
85f75dd7
LE
3131 }
3132 }
3133
85f75dd7
LE
3134 /* delete connection */
3135 if (conn_lowest_minor(adm_ctx.tconn) < 0) {
ec0bddbc
PR
3136 list_del_rcu(&adm_ctx.tconn->all_tconn);
3137 synchronize_rcu();
9dc9fbb3
PR
3138 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
3139
85f75dd7
LE
3140 retcode = NO_ERROR;
3141 } else {
3142 /* "can not happen" */
3143 retcode = ERR_CONN_IN_USE;
3144 drbd_msg_put_info("failed to delete connection");
85f75dd7 3145 }
ef356262 3146 goto out;
3b98c0c2
LE
3147out:
3148 drbd_adm_finish(info, retcode);
3149 return 0;
b411b363
PR
3150}
3151
3b98c0c2 3152int drbd_adm_delete_connection(struct sk_buff *skb, struct genl_info *info)
b411b363 3153{
3b98c0c2 3154 enum drbd_ret_code retcode;
b411b363 3155
3b98c0c2
LE
3156 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
3157 if (!adm_ctx.reply_skb)
3158 return retcode;
3159 if (retcode != NO_ERROR)
3160 goto out;
3161
3162 if (conn_lowest_minor(adm_ctx.tconn) < 0) {
ec0bddbc
PR
3163 list_del_rcu(&adm_ctx.tconn->all_tconn);
3164 synchronize_rcu();
9dc9fbb3
PR
3165 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
3166
3b98c0c2
LE
3167 retcode = NO_ERROR;
3168 } else {
3169 retcode = ERR_CONN_IN_USE;
b411b363
PR
3170 }
3171
992d6e91
LE
3172 if (retcode == NO_ERROR)
3173 drbd_thread_stop(&adm_ctx.tconn->worker);
3b98c0c2
LE
3174out:
3175 drbd_adm_finish(info, retcode);
b411b363
PR
3176 return 0;
3177}
3178
3b98c0c2 3179void drbd_bcast_event(struct drbd_conf *mdev, const struct sib_info *sib)
b411b363 3180{
3b98c0c2
LE
3181 static atomic_t drbd_genl_seq = ATOMIC_INIT(2); /* two. */
3182 struct sk_buff *msg;
3183 struct drbd_genlmsghdr *d_out;
3184 unsigned seq;
3185 int err = -ENOMEM;
3186
3187 seq = atomic_inc_return(&drbd_genl_seq);
3188 msg = genlmsg_new(NLMSG_GOODSIZE, GFP_NOIO);
3189 if (!msg)
3190 goto failed;
3191
3192 err = -EMSGSIZE;
3193 d_out = genlmsg_put(msg, 0, seq, &drbd_genl_family, 0, DRBD_EVENT);
3194 if (!d_out) /* cannot happen, but anyways. */
3195 goto nla_put_failure;
3196 d_out->minor = mdev_to_minor(mdev);
6f9b5f84 3197 d_out->ret_code = NO_ERROR;
3b98c0c2
LE
3198
3199 if (nla_put_status_info(msg, mdev, sib))
3200 goto nla_put_failure;
3201 genlmsg_end(msg, d_out);
3202 err = drbd_genl_multicast_events(msg, 0);
3203 /* msg has been consumed or freed in netlink_broadcast() */
3204 if (err && err != -ESRCH)
3205 goto failed;
b411b363 3206
3b98c0c2 3207 return;
b411b363 3208
3b98c0c2
LE
3209nla_put_failure:
3210 nlmsg_free(msg);
3211failed:
3212 dev_err(DEV, "Error %d while broadcasting event. "
3213 "Event seq:%u sib_reason:%u\n",
3214 err, seq, sib->sib_reason);
b411b363 3215}