blob: 24187f1c93d5918bcf472c3bedcee99ba86569fc [file] [log] [blame]
Philipp Reisnerb411b362009-09-25 16:07:19 -07001/*
2 drbd_nl.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23
24 */
25
Philipp Reisnerb411b362009-09-25 16:07:19 -070026#include <linux/module.h>
27#include <linux/drbd.h>
28#include <linux/in.h>
29#include <linux/fs.h>
30#include <linux/file.h>
31#include <linux/slab.h>
Philipp Reisnerb411b362009-09-25 16:07:19 -070032#include <linux/blkpg.h>
33#include <linux/cpumask.h>
34#include "drbd_int.h"
Philipp Reisner265be2d2010-05-31 10:14:17 +020035#include "drbd_req.h"
Philipp Reisnerb411b362009-09-25 16:07:19 -070036#include "drbd_wrappers.h"
37#include <asm/unaligned.h>
Philipp Reisnerb411b362009-09-25 16:07:19 -070038#include <linux/drbd_limits.h>
Philipp Reisner87f7be42010-06-11 13:56:33 +020039#include <linux/kthread.h>
Philipp Reisnerb411b362009-09-25 16:07:19 -070040
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010041#include <net/genetlink.h>
Philipp Reisnerb411b362009-09-25 16:07:19 -070042
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010043/* .doit */
44// int drbd_adm_create_resource(struct sk_buff *skb, struct genl_info *info);
45// int drbd_adm_delete_resource(struct sk_buff *skb, struct genl_info *info);
46
47int drbd_adm_add_minor(struct sk_buff *skb, struct genl_info *info);
48int drbd_adm_delete_minor(struct sk_buff *skb, struct genl_info *info);
49
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +020050int drbd_adm_new_resource(struct sk_buff *skb, struct genl_info *info);
51int drbd_adm_del_resource(struct sk_buff *skb, struct genl_info *info);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +010052int drbd_adm_down(struct sk_buff *skb, struct genl_info *info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010053
54int drbd_adm_set_role(struct sk_buff *skb, struct genl_info *info);
55int drbd_adm_attach(struct sk_buff *skb, struct genl_info *info);
Lars Ellenbergf3990022011-03-23 14:31:09 +010056int drbd_adm_disk_opts(struct sk_buff *skb, struct genl_info *info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010057int drbd_adm_detach(struct sk_buff *skb, struct genl_info *info);
58int drbd_adm_connect(struct sk_buff *skb, struct genl_info *info);
Lars Ellenbergf3990022011-03-23 14:31:09 +010059int drbd_adm_net_opts(struct sk_buff *skb, struct genl_info *info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010060int drbd_adm_resize(struct sk_buff *skb, struct genl_info *info);
61int drbd_adm_start_ov(struct sk_buff *skb, struct genl_info *info);
62int drbd_adm_new_c_uuid(struct sk_buff *skb, struct genl_info *info);
63int drbd_adm_disconnect(struct sk_buff *skb, struct genl_info *info);
64int drbd_adm_invalidate(struct sk_buff *skb, struct genl_info *info);
65int drbd_adm_invalidate_peer(struct sk_buff *skb, struct genl_info *info);
66int drbd_adm_pause_sync(struct sk_buff *skb, struct genl_info *info);
67int drbd_adm_resume_sync(struct sk_buff *skb, struct genl_info *info);
68int drbd_adm_suspend_io(struct sk_buff *skb, struct genl_info *info);
69int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info);
70int drbd_adm_outdate(struct sk_buff *skb, struct genl_info *info);
Lars Ellenbergf3990022011-03-23 14:31:09 +010071int drbd_adm_resource_opts(struct sk_buff *skb, struct genl_info *info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010072int drbd_adm_get_status(struct sk_buff *skb, struct genl_info *info);
73int drbd_adm_get_timeout_type(struct sk_buff *skb, struct genl_info *info);
74/* .dumpit */
75int drbd_adm_get_status_all(struct sk_buff *skb, struct netlink_callback *cb);
76
77#include <linux/drbd_genl_api.h>
78#include <linux/genl_magic_func.h>
79
80/* used blkdev_get_by_path, to claim our meta data device(s) */
Philipp Reisnerb411b362009-09-25 16:07:19 -070081static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
82
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010083/* Configuration is strictly serialized, because generic netlink message
84 * processing is strictly serialized by the genl_lock().
85 * Which means we can use one static global drbd_config_context struct.
86 */
87static struct drbd_config_context {
88 /* assigned from drbd_genlmsghdr */
89 unsigned int minor;
90 /* assigned from request attributes, if present */
91 unsigned int volume;
92#define VOLUME_UNSPECIFIED (-1U)
93 /* pointer into the request skb,
94 * limited lifetime! */
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +020095 char *resource_name;
Philipp Reisnerb411b362009-09-25 16:07:19 -070096
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +010097 /* reply buffer */
98 struct sk_buff *reply_skb;
99 /* pointer into reply buffer */
100 struct drbd_genlmsghdr *reply_dh;
101 /* resolved from attributes, if possible */
102 struct drbd_conf *mdev;
103 struct drbd_tconn *tconn;
104} adm_ctx;
105
106static void drbd_adm_send_reply(struct sk_buff *skb, struct genl_info *info)
107{
108 genlmsg_end(skb, genlmsg_data(nlmsg_data(nlmsg_hdr(skb))));
109 if (genlmsg_reply(skb, info))
110 printk(KERN_ERR "drbd: error sending genl reply\n");
Philipp Reisnerb411b362009-09-25 16:07:19 -0700111}
112
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100113/* Used on a fresh "drbd_adm_prepare"d reply_skb, this cannot fail: The only
114 * reason it could fail was no space in skb, and there are 4k available. */
Lars Ellenberg8432b312011-03-08 16:11:16 +0100115int drbd_msg_put_info(const char *info)
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100116{
117 struct sk_buff *skb = adm_ctx.reply_skb;
118 struct nlattr *nla;
119 int err = -EMSGSIZE;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700120
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100121 if (!info || !info[0])
122 return 0;
123
124 nla = nla_nest_start(skb, DRBD_NLA_CFG_REPLY);
125 if (!nla)
126 return err;
127
128 err = nla_put_string(skb, T_info_text, info);
129 if (err) {
130 nla_nest_cancel(skb, nla);
131 return err;
132 } else
133 nla_nest_end(skb, nla);
134 return 0;
135}
136
137/* This would be a good candidate for a "pre_doit" hook,
138 * and per-family private info->pointers.
139 * But we need to stay compatible with older kernels.
140 * If it returns successfully, adm_ctx members are valid.
141 */
142#define DRBD_ADM_NEED_MINOR 1
143#define DRBD_ADM_NEED_CONN 2
144static int drbd_adm_prepare(struct sk_buff *skb, struct genl_info *info,
145 unsigned flags)
146{
147 struct drbd_genlmsghdr *d_in = info->userhdr;
148 const u8 cmd = info->genlhdr->cmd;
149 int err;
150
151 memset(&adm_ctx, 0, sizeof(adm_ctx));
152
153 /* genl_rcv_msg only checks for CAP_NET_ADMIN on "GENL_ADMIN_PERM" :( */
154 if (cmd != DRBD_ADM_GET_STATUS
155 && security_netlink_recv(skb, CAP_SYS_ADMIN))
156 return -EPERM;
157
158 adm_ctx.reply_skb = genlmsg_new(NLMSG_GOODSIZE, GFP_KERNEL);
Andreas Gruenbacher1e2a2552011-05-24 14:17:08 +0200159 if (!adm_ctx.reply_skb) {
160 err = -ENOMEM;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100161 goto fail;
Andreas Gruenbacher1e2a2552011-05-24 14:17:08 +0200162 }
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100163
164 adm_ctx.reply_dh = genlmsg_put_reply(adm_ctx.reply_skb,
165 info, &drbd_genl_family, 0, cmd);
166 /* put of a few bytes into a fresh skb of >= 4k will always succeed.
167 * but anyways */
Andreas Gruenbacher1e2a2552011-05-24 14:17:08 +0200168 if (!adm_ctx.reply_dh) {
169 err = -ENOMEM;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100170 goto fail;
Andreas Gruenbacher1e2a2552011-05-24 14:17:08 +0200171 }
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100172
173 adm_ctx.reply_dh->minor = d_in->minor;
174 adm_ctx.reply_dh->ret_code = NO_ERROR;
175
176 if (info->attrs[DRBD_NLA_CFG_CONTEXT]) {
177 struct nlattr *nla;
178 /* parse and validate only */
Lars Ellenbergf3990022011-03-23 14:31:09 +0100179 err = drbd_cfg_context_from_attrs(NULL, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100180 if (err)
181 goto fail;
182
183 /* It was present, and valid,
184 * copy it over to the reply skb. */
185 err = nla_put_nohdr(adm_ctx.reply_skb,
186 info->attrs[DRBD_NLA_CFG_CONTEXT]->nla_len,
187 info->attrs[DRBD_NLA_CFG_CONTEXT]);
188 if (err)
189 goto fail;
190
191 /* and assign stuff to the global adm_ctx */
192 nla = nested_attr_tb[__nla_type(T_ctx_volume)];
193 adm_ctx.volume = nla ? nla_get_u32(nla) : VOLUME_UNSPECIFIED;
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +0200194 nla = nested_attr_tb[__nla_type(T_ctx_resource_name)];
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100195 if (nla)
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +0200196 adm_ctx.resource_name = nla_data(nla);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100197 } else
198 adm_ctx.volume = VOLUME_UNSPECIFIED;
199
200 adm_ctx.minor = d_in->minor;
201 adm_ctx.mdev = minor_to_mdev(d_in->minor);
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +0200202 adm_ctx.tconn = conn_get_by_name(adm_ctx.resource_name);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100203
204 if (!adm_ctx.mdev && (flags & DRBD_ADM_NEED_MINOR)) {
205 drbd_msg_put_info("unknown minor");
206 return ERR_MINOR_INVALID;
207 }
208 if (!adm_ctx.tconn && (flags & DRBD_ADM_NEED_CONN)) {
209 drbd_msg_put_info("unknown connection");
210 return ERR_INVALID_REQUEST;
211 }
212
213 /* some more paranoia, if the request was over-determined */
Lars Ellenberg527f4b22011-03-14 13:58:03 +0100214 if (adm_ctx.mdev && adm_ctx.tconn &&
215 adm_ctx.mdev->tconn != adm_ctx.tconn) {
216 pr_warning("request: minor=%u, conn=%s; but that minor belongs to connection %s\n",
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +0200217 adm_ctx.minor, adm_ctx.resource_name,
218 adm_ctx.mdev->tconn->name);
Lars Ellenberg527f4b22011-03-14 13:58:03 +0100219 drbd_msg_put_info("minor exists in different connection");
220 return ERR_INVALID_REQUEST;
221 }
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100222 if (adm_ctx.mdev &&
223 adm_ctx.volume != VOLUME_UNSPECIFIED &&
224 adm_ctx.volume != adm_ctx.mdev->vnr) {
225 pr_warning("request: minor=%u, volume=%u; but that minor is volume %u in %s\n",
226 adm_ctx.minor, adm_ctx.volume,
227 adm_ctx.mdev->vnr, adm_ctx.mdev->tconn->name);
Lars Ellenberg527f4b22011-03-14 13:58:03 +0100228 drbd_msg_put_info("minor exists as different volume");
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100229 return ERR_INVALID_REQUEST;
230 }
Philipp Reisner0ace9df2011-04-24 10:53:19 +0200231
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100232 return NO_ERROR;
233
234fail:
235 nlmsg_free(adm_ctx.reply_skb);
236 adm_ctx.reply_skb = NULL;
Andreas Gruenbacher1e2a2552011-05-24 14:17:08 +0200237 return err;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100238}
239
240static int drbd_adm_finish(struct genl_info *info, int retcode)
241{
242 struct nlattr *nla;
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +0200243 const char *resource_name = NULL;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100244
Philipp Reisner0ace9df2011-04-24 10:53:19 +0200245 if (adm_ctx.tconn) {
246 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
247 adm_ctx.tconn = NULL;
248 }
249
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100250 if (!adm_ctx.reply_skb)
251 return -ENOMEM;
252
253 adm_ctx.reply_dh->ret_code = retcode;
254
255 nla = info->attrs[DRBD_NLA_CFG_CONTEXT];
256 if (nla) {
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +0200257 int maxtype = ARRAY_SIZE(drbd_cfg_context_nl_policy) - 1;
258 nla = drbd_nla_find_nested(maxtype, nla, __nla_type(T_ctx_resource_name));
259 if (nla && !IS_ERR(nla))
260 resource_name = nla_data(nla);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100261 }
262
263 drbd_adm_send_reply(adm_ctx.reply_skb, info);
264 return 0;
265}
Philipp Reisnerb411b362009-09-25 16:07:19 -0700266
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100267static void setup_khelper_env(struct drbd_tconn *tconn, char **envp)
268{
269 char *afs;
Philipp Reisner44ed1672011-04-19 17:10:19 +0200270 struct net_conf *nc;
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100271
Philipp Reisner44ed1672011-04-19 17:10:19 +0200272 rcu_read_lock();
273 nc = rcu_dereference(tconn->net_conf);
274 if (nc) {
275 switch (((struct sockaddr *)nc->peer_addr)->sa_family) {
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100276 case AF_INET6:
277 afs = "ipv6";
278 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI6",
Philipp Reisner44ed1672011-04-19 17:10:19 +0200279 &((struct sockaddr_in6 *)nc->peer_addr)->sin6_addr);
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100280 break;
281 case AF_INET:
282 afs = "ipv4";
283 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI4",
Philipp Reisner44ed1672011-04-19 17:10:19 +0200284 &((struct sockaddr_in *)nc->peer_addr)->sin_addr);
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100285 break;
286 default:
287 afs = "ssocks";
288 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI4",
Philipp Reisner44ed1672011-04-19 17:10:19 +0200289 &((struct sockaddr_in *)nc->peer_addr)->sin_addr);
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100290 }
291 snprintf(envp[3], 20, "DRBD_PEER_AF=%s", afs);
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100292 }
Philipp Reisner44ed1672011-04-19 17:10:19 +0200293 rcu_read_unlock();
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100294}
295
Philipp Reisnerb411b362009-09-25 16:07:19 -0700296int drbd_khelper(struct drbd_conf *mdev, char *cmd)
297{
298 char *envp[] = { "HOME=/",
299 "TERM=linux",
300 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100301 (char[20]) { }, /* address family */
302 (char[60]) { }, /* address */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700303 NULL };
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100304 char mb[12];
Philipp Reisnerb411b362009-09-25 16:07:19 -0700305 char *argv[] = {usermode_helper, cmd, mb, NULL };
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100306 struct sib_info sib;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700307 int ret;
308
309 snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100310 setup_khelper_env(mdev->tconn, envp);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700311
Lars Ellenberg1090c052010-07-19 17:41:04 +0200312 /* The helper may take some time.
313 * write out any unsynced meta data changes now */
314 drbd_md_sync(mdev);
315
Philipp Reisnerb411b362009-09-25 16:07:19 -0700316 dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100317 sib.sib_reason = SIB_HELPER_PRE;
318 sib.helper_name = cmd;
319 drbd_bcast_event(mdev, &sib);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700320 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
321 if (ret)
322 dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
323 usermode_helper, cmd, mb,
324 (ret >> 8) & 0xff, ret);
325 else
326 dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
327 usermode_helper, cmd, mb,
328 (ret >> 8) & 0xff, ret);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100329 sib.sib_reason = SIB_HELPER_POST;
330 sib.helper_exit_code = ret;
331 drbd_bcast_event(mdev, &sib);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700332
333 if (ret < 0) /* Ignore any ERRNOs we got. */
334 ret = 0;
335
336 return ret;
337}
338
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100339static void conn_md_sync(struct drbd_tconn *tconn)
340{
341 struct drbd_conf *mdev;
Philipp Reisnere90285e2011-03-22 12:51:21 +0100342 int vnr;
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100343
Philipp Reisnerc141ebd2011-05-05 16:13:10 +0200344 rcu_read_lock();
345 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
346 kref_get(&mdev->kref);
347 rcu_read_unlock();
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100348 drbd_md_sync(mdev);
Philipp Reisnerc141ebd2011-05-05 16:13:10 +0200349 kref_put(&mdev->kref, &drbd_minor_destroy);
350 rcu_read_lock();
351 }
352 rcu_read_unlock();
Philipp Reisner6b75dce2011-03-16 17:39:12 +0100353}
354
355int conn_khelper(struct drbd_tconn *tconn, char *cmd)
356{
357 char *envp[] = { "HOME=/",
358 "TERM=linux",
359 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
360 (char[20]) { }, /* address family */
361 (char[60]) { }, /* address */
362 NULL };
363 char *argv[] = {usermode_helper, cmd, tconn->name, NULL };
364 int ret;
365
366 setup_khelper_env(tconn, envp);
367 conn_md_sync(tconn);
368
369 conn_info(tconn, "helper command: %s %s %s\n", usermode_helper, cmd, tconn->name);
370 /* TODO: conn_bcast_event() ?? */
371
372 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
373 if (ret)
374 conn_warn(tconn, "helper command: %s %s %s exit code %u (0x%x)\n",
375 usermode_helper, cmd, tconn->name,
376 (ret >> 8) & 0xff, ret);
377 else
378 conn_info(tconn, "helper command: %s %s %s exit code %u (0x%x)\n",
379 usermode_helper, cmd, tconn->name,
380 (ret >> 8) & 0xff, ret);
381 /* TODO: conn_bcast_event() ?? */
382
383 if (ret < 0) /* Ignore any ERRNOs we got. */
384 ret = 0;
385
386 return ret;
387}
388
Philipp Reisnercb703452011-03-24 11:03:07 +0100389static enum drbd_fencing_p highest_fencing_policy(struct drbd_tconn *tconn)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700390{
Philipp Reisnercb703452011-03-24 11:03:07 +0100391 enum drbd_fencing_p fp = FP_NOT_AVAIL;
392 struct drbd_conf *mdev;
393 int vnr;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700394
Philipp Reisner695d08f2011-04-11 22:53:32 -0700395 rcu_read_lock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100396 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
397 if (get_ldev_if_state(mdev, D_CONSISTENT)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200398 fp = max_t(enum drbd_fencing_p, fp,
399 rcu_dereference(mdev->ldev->disk_conf)->fencing);
Philipp Reisnercb703452011-03-24 11:03:07 +0100400 put_ldev(mdev);
401 }
Philipp Reisnerb411b362009-09-25 16:07:19 -0700402 }
Philipp Reisner695d08f2011-04-11 22:53:32 -0700403 rcu_read_unlock();
Philipp Reisnerb411b362009-09-25 16:07:19 -0700404
Philipp Reisnercb703452011-03-24 11:03:07 +0100405 return fp;
406}
407
408bool conn_try_outdate_peer(struct drbd_tconn *tconn)
409{
410 union drbd_state mask = { };
411 union drbd_state val = { };
412 enum drbd_fencing_p fp;
413 char *ex_to_string;
414 int r;
415
416 if (tconn->cstate >= C_WF_REPORT_PARAMS) {
417 conn_err(tconn, "Expected cstate < C_WF_REPORT_PARAMS\n");
418 return false;
419 }
420
421 fp = highest_fencing_policy(tconn);
422 switch (fp) {
423 case FP_NOT_AVAIL:
424 conn_warn(tconn, "Not fencing peer, I'm not even Consistent myself.\n");
425 goto out;
426 case FP_DONT_CARE:
427 return true;
428 default: ;
429 }
430
431 r = conn_khelper(tconn, "fence-peer");
Philipp Reisnerb411b362009-09-25 16:07:19 -0700432
433 switch ((r>>8) & 0xff) {
434 case 3: /* peer is inconsistent */
435 ex_to_string = "peer is inconsistent or worse";
Philipp Reisnercb703452011-03-24 11:03:07 +0100436 mask.pdsk = D_MASK;
437 val.pdsk = D_INCONSISTENT;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700438 break;
439 case 4: /* peer got outdated, or was already outdated */
440 ex_to_string = "peer was fenced";
Philipp Reisnercb703452011-03-24 11:03:07 +0100441 mask.pdsk = D_MASK;
442 val.pdsk = D_OUTDATED;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700443 break;
444 case 5: /* peer was down */
Philipp Reisnercb703452011-03-24 11:03:07 +0100445 if (conn_highest_disk(tconn) == D_UP_TO_DATE) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700446 /* we will(have) create(d) a new UUID anyways... */
447 ex_to_string = "peer is unreachable, assumed to be dead";
Philipp Reisnercb703452011-03-24 11:03:07 +0100448 mask.pdsk = D_MASK;
449 val.pdsk = D_OUTDATED;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700450 } else {
451 ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
Philipp Reisnerb411b362009-09-25 16:07:19 -0700452 }
453 break;
454 case 6: /* Peer is primary, voluntarily outdate myself.
455 * This is useful when an unconnected R_SECONDARY is asked to
456 * become R_PRIMARY, but finds the other peer being active. */
457 ex_to_string = "peer is active";
Philipp Reisnercb703452011-03-24 11:03:07 +0100458 conn_warn(tconn, "Peer is primary, outdating myself.\n");
459 mask.disk = D_MASK;
460 val.disk = D_OUTDATED;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700461 break;
462 case 7:
463 if (fp != FP_STONITH)
Philipp Reisnercb703452011-03-24 11:03:07 +0100464 conn_err(tconn, "fence-peer() = 7 && fencing != Stonith !!!\n");
Philipp Reisnerb411b362009-09-25 16:07:19 -0700465 ex_to_string = "peer was stonithed";
Philipp Reisnercb703452011-03-24 11:03:07 +0100466 mask.pdsk = D_MASK;
467 val.pdsk = D_OUTDATED;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700468 break;
469 default:
470 /* The script is broken ... */
Philipp Reisnercb703452011-03-24 11:03:07 +0100471 conn_err(tconn, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
472 return false; /* Eventually leave IO frozen */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700473 }
474
Philipp Reisnercb703452011-03-24 11:03:07 +0100475 conn_info(tconn, "fence-peer helper returned %d (%s)\n",
476 (r>>8) & 0xff, ex_to_string);
Philipp Reisnerfb22c402010-09-08 23:20:21 +0200477
Philipp Reisnercb703452011-03-24 11:03:07 +0100478 out:
Philipp Reisnerfb22c402010-09-08 23:20:21 +0200479
Philipp Reisnercb703452011-03-24 11:03:07 +0100480 /* Not using
481 conn_request_state(tconn, mask, val, CS_VERBOSE);
482 here, because we might were able to re-establish the connection in the
483 meantime. */
484 spin_lock_irq(&tconn->req_lock);
485 if (tconn->cstate < C_WF_REPORT_PARAMS)
486 _conn_request_state(tconn, mask, val, CS_VERBOSE);
487 spin_unlock_irq(&tconn->req_lock);
488
489 return conn_highest_pdsk(tconn) <= D_OUTDATED;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700490}
491
Philipp Reisner87f7be42010-06-11 13:56:33 +0200492static int _try_outdate_peer_async(void *data)
493{
Philipp Reisnercb703452011-03-24 11:03:07 +0100494 struct drbd_tconn *tconn = (struct drbd_tconn *)data;
Philipp Reisner87f7be42010-06-11 13:56:33 +0200495
Philipp Reisnercb703452011-03-24 11:03:07 +0100496 conn_try_outdate_peer(tconn);
Philipp Reisner87f7be42010-06-11 13:56:33 +0200497
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +0200498 kref_put(&tconn->kref, &conn_destroy);
Philipp Reisner87f7be42010-06-11 13:56:33 +0200499 return 0;
500}
501
Philipp Reisnercb703452011-03-24 11:03:07 +0100502void conn_try_outdate_peer_async(struct drbd_tconn *tconn)
Philipp Reisner87f7be42010-06-11 13:56:33 +0200503{
504 struct task_struct *opa;
505
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +0200506 kref_get(&tconn->kref);
Philipp Reisnercb703452011-03-24 11:03:07 +0100507 opa = kthread_run(_try_outdate_peer_async, tconn, "drbd_async_h");
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +0200508 if (IS_ERR(opa)) {
Philipp Reisnercb703452011-03-24 11:03:07 +0100509 conn_err(tconn, "out of mem, failed to invoke fence-peer helper\n");
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +0200510 kref_put(&tconn->kref, &conn_destroy);
511 }
Philipp Reisner87f7be42010-06-11 13:56:33 +0200512}
Philipp Reisnerb411b362009-09-25 16:07:19 -0700513
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100514enum drbd_state_rv
515drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700516{
517 const int max_tries = 4;
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100518 enum drbd_state_rv rv = SS_UNKNOWN_ERROR;
Philipp Reisner44ed1672011-04-19 17:10:19 +0200519 struct net_conf *nc;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700520 int try = 0;
521 int forced = 0;
522 union drbd_state mask, val;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700523
524 if (new_role == R_PRIMARY)
Philipp Reisner0625ac12011-02-07 14:49:19 +0100525 request_ping(mdev->tconn); /* Detect a dead peer ASAP */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700526
Philipp Reisner8410da82011-02-11 20:11:10 +0100527 mutex_lock(mdev->state_mutex);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700528
529 mask.i = 0; mask.role = R_MASK;
530 val.i = 0; val.role = new_role;
531
532 while (try++ < max_tries) {
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100533 rv = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700534
535 /* in case we first succeeded to outdate,
536 * but now suddenly could establish a connection */
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100537 if (rv == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700538 val.pdsk = 0;
539 mask.pdsk = 0;
540 continue;
541 }
542
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100543 if (rv == SS_NO_UP_TO_DATE_DISK && force &&
Philipp Reisnerd10a33c2010-03-04 15:11:39 +0100544 (mdev->state.disk < D_UP_TO_DATE &&
545 mdev->state.disk >= D_INCONSISTENT)) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700546 mask.disk = D_MASK;
547 val.disk = D_UP_TO_DATE;
548 forced = 1;
549 continue;
550 }
551
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100552 if (rv == SS_NO_UP_TO_DATE_DISK &&
Philipp Reisnerb411b362009-09-25 16:07:19 -0700553 mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
554 D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700555
Philipp Reisnercb703452011-03-24 11:03:07 +0100556 if (conn_try_outdate_peer(mdev->tconn)) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700557 val.disk = D_UP_TO_DATE;
558 mask.disk = D_MASK;
559 }
Philipp Reisnerb411b362009-09-25 16:07:19 -0700560 continue;
561 }
562
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100563 if (rv == SS_NOTHING_TO_DO)
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100564 goto out;
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100565 if (rv == SS_PRIMARY_NOP && mask.pdsk == 0) {
Philipp Reisnercb703452011-03-24 11:03:07 +0100566 if (!conn_try_outdate_peer(mdev->tconn) && force) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700567 dev_warn(DEV, "Forced into split brain situation!\n");
Philipp Reisnercb703452011-03-24 11:03:07 +0100568 mask.pdsk = D_MASK;
569 val.pdsk = D_OUTDATED;
570
Philipp Reisnerb411b362009-09-25 16:07:19 -0700571 }
Philipp Reisnerb411b362009-09-25 16:07:19 -0700572 continue;
573 }
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100574 if (rv == SS_TWO_PRIMARIES) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700575 /* Maybe the peer is detected as dead very soon...
576 retry at most once more in this case. */
Philipp Reisner44ed1672011-04-19 17:10:19 +0200577 int timeo;
578 rcu_read_lock();
579 nc = rcu_dereference(mdev->tconn->net_conf);
580 timeo = nc ? (nc->ping_timeo + 1) * HZ / 10 : 1;
581 rcu_read_unlock();
582 schedule_timeout_interruptible(timeo);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700583 if (try < max_tries)
584 try = max_tries - 1;
585 continue;
586 }
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100587 if (rv < SS_SUCCESS) {
588 rv = _drbd_request_state(mdev, mask, val,
Philipp Reisnerb411b362009-09-25 16:07:19 -0700589 CS_VERBOSE + CS_WAIT_COMPLETE);
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100590 if (rv < SS_SUCCESS)
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100591 goto out;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700592 }
593 break;
594 }
595
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100596 if (rv < SS_SUCCESS)
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100597 goto out;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700598
599 if (forced)
600 dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
601
602 /* Wait until nothing is on the fly :) */
603 wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
604
605 if (new_role == R_SECONDARY) {
Andreas Gruenbacher81e84652010-12-09 15:03:57 +0100606 set_disk_ro(mdev->vdisk, true);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700607 if (get_ldev(mdev)) {
608 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
609 put_ldev(mdev);
610 }
611 } else {
Philipp Reisnera0095502011-05-03 13:14:15 +0200612 mutex_lock(&mdev->tconn->conf_update);
Philipp Reisner91fd4da2011-04-20 17:47:29 +0200613 nc = mdev->tconn->net_conf;
Philipp Reisner44ed1672011-04-19 17:10:19 +0200614 if (nc)
Andreas Gruenbacher6139f602011-05-06 20:00:02 +0200615 nc->discard_my_data = 0; /* without copy; single bit op is atomic */
Philipp Reisnera0095502011-05-03 13:14:15 +0200616 mutex_unlock(&mdev->tconn->conf_update);
Philipp Reisner91fd4da2011-04-20 17:47:29 +0200617
Andreas Gruenbacher81e84652010-12-09 15:03:57 +0100618 set_disk_ro(mdev->vdisk, false);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700619 if (get_ldev(mdev)) {
620 if (((mdev->state.conn < C_CONNECTED ||
621 mdev->state.pdsk <= D_FAILED)
622 && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
623 drbd_uuid_new_current(mdev);
624
625 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
626 put_ldev(mdev);
627 }
628 }
629
Lars Ellenberg19f843a2010-12-15 08:59:11 +0100630 /* writeout of activity log covered areas of the bitmap
631 * to stable storage done in after state change already */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700632
633 if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
634 /* if this was forced, we should consider sync */
635 if (forced)
636 drbd_send_uuids(mdev);
637 drbd_send_state(mdev);
638 }
639
640 drbd_md_sync(mdev);
641
642 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100643out:
Philipp Reisner8410da82011-02-11 20:11:10 +0100644 mutex_unlock(mdev->state_mutex);
Andreas Gruenbacherbf885f82010-12-08 00:39:32 +0100645 return rv;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700646}
647
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100648static const char *from_attrs_err_to_txt(int err)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700649{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100650 return err == -ENOMSG ? "required attribute missing" :
651 err == -EOPNOTSUPP ? "unknown mandatory attribute" :
Lars Ellenbergf3990022011-03-23 14:31:09 +0100652 err == -EEXIST ? "can not change invariant setting" :
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100653 "invalid attribute value";
Philipp Reisnerb411b362009-09-25 16:07:19 -0700654}
655
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100656int drbd_adm_set_role(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700657{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100658 struct set_role_parms parms;
659 int err;
660 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700661
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100662 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
663 if (!adm_ctx.reply_skb)
664 return retcode;
665 if (retcode != NO_ERROR)
666 goto out;
667
668 memset(&parms, 0, sizeof(parms));
669 if (info->attrs[DRBD_NLA_SET_ROLE_PARMS]) {
Lars Ellenbergf3990022011-03-23 14:31:09 +0100670 err = set_role_parms_from_attrs(&parms, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100671 if (err) {
672 retcode = ERR_MANDATORY_TAG;
673 drbd_msg_put_info(from_attrs_err_to_txt(err));
674 goto out;
675 }
676 }
677
678 if (info->genlhdr->cmd == DRBD_ADM_PRIMARY)
679 retcode = drbd_set_role(adm_ctx.mdev, R_PRIMARY, parms.assume_uptodate);
680 else
681 retcode = drbd_set_role(adm_ctx.mdev, R_SECONDARY, 0);
682out:
683 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700684 return 0;
685}
686
687/* initializes the md.*_offset members, so we are able to find
688 * the on disk meta data */
689static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
690 struct drbd_backing_dev *bdev)
691{
692 sector_t md_size_sect = 0;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200693 int meta_dev_idx;
694
695 rcu_read_lock();
696 meta_dev_idx = rcu_dereference(bdev->disk_conf)->meta_dev_idx;
697
698 switch (meta_dev_idx) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700699 default:
700 /* v07 style fixed size indexed meta data */
701 bdev->md.md_size_sect = MD_RESERVED_SECT;
702 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
703 bdev->md.al_offset = MD_AL_OFFSET;
704 bdev->md.bm_offset = MD_BM_OFFSET;
705 break;
706 case DRBD_MD_INDEX_FLEX_EXT:
707 /* just occupy the full device; unit: sectors */
708 bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
709 bdev->md.md_offset = 0;
710 bdev->md.al_offset = MD_AL_OFFSET;
711 bdev->md.bm_offset = MD_BM_OFFSET;
712 break;
713 case DRBD_MD_INDEX_INTERNAL:
714 case DRBD_MD_INDEX_FLEX_INT:
715 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
716 /* al size is still fixed */
Lars Ellenberg7ad651b2011-02-21 13:21:03 +0100717 bdev->md.al_offset = -MD_AL_SECTORS;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700718 /* we need (slightly less than) ~ this much bitmap sectors: */
719 md_size_sect = drbd_get_capacity(bdev->backing_bdev);
720 md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
721 md_size_sect = BM_SECT_TO_EXT(md_size_sect);
722 md_size_sect = ALIGN(md_size_sect, 8);
723
724 /* plus the "drbd meta data super block",
725 * and the activity log; */
726 md_size_sect += MD_BM_OFFSET;
727
728 bdev->md.md_size_sect = md_size_sect;
729 /* bitmap offset is adjusted by 'super' block size */
730 bdev->md.bm_offset = -md_size_sect + MD_AL_OFFSET;
731 break;
732 }
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200733 rcu_read_unlock();
Philipp Reisnerb411b362009-09-25 16:07:19 -0700734}
735
Lars Ellenberg4b0715f2010-12-14 15:13:04 +0100736/* input size is expected to be in KB */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700737char *ppsize(char *buf, unsigned long long size)
738{
Lars Ellenberg4b0715f2010-12-14 15:13:04 +0100739 /* Needs 9 bytes at max including trailing NUL:
740 * -1ULL ==> "16384 EB" */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700741 static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
742 int base = 0;
Lars Ellenberg4b0715f2010-12-14 15:13:04 +0100743 while (size >= 10000 && base < sizeof(units)-1) {
Philipp Reisnerb411b362009-09-25 16:07:19 -0700744 /* shift + round */
745 size = (size >> 10) + !!(size & (1<<9));
746 base++;
747 }
Lars Ellenberg4b0715f2010-12-14 15:13:04 +0100748 sprintf(buf, "%u %cB", (unsigned)size, units[base]);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700749
750 return buf;
751}
752
753/* there is still a theoretical deadlock when called from receiver
754 * on an D_INCONSISTENT R_PRIMARY:
755 * remote READ does inc_ap_bio, receiver would need to receive answer
756 * packet from remote to dec_ap_bio again.
757 * receiver receive_sizes(), comes here,
758 * waits for ap_bio_cnt == 0. -> deadlock.
759 * but this cannot happen, actually, because:
760 * R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
761 * (not connected, or bad/no disk on peer):
762 * see drbd_fail_request_early, ap_bio_cnt is zero.
763 * R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
764 * peer may not initiate a resize.
765 */
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +0100766/* Note these are not to be confused with
767 * drbd_adm_suspend_io/drbd_adm_resume_io,
768 * which are (sub) state changes triggered by admin (drbdsetup),
769 * and can be long lived.
770 * This changes an mdev->flag, is triggered by drbd internals,
771 * and should be short-lived. */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700772void drbd_suspend_io(struct drbd_conf *mdev)
773{
774 set_bit(SUSPEND_IO, &mdev->flags);
Philipp Reisner2aebfab2011-03-28 16:48:11 +0200775 if (drbd_suspended(mdev))
Philipp Reisner265be2d2010-05-31 10:14:17 +0200776 return;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700777 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
778}
779
780void drbd_resume_io(struct drbd_conf *mdev)
781{
782 clear_bit(SUSPEND_IO, &mdev->flags);
783 wake_up(&mdev->misc_wait);
784}
785
786/**
787 * drbd_determine_dev_size() - Sets the right device size obeying all constraints
788 * @mdev: DRBD device.
789 *
790 * Returns 0 on success, negative return values indicate errors.
791 * You should call drbd_md_sync() after calling this function.
792 */
Bart Van Assche24c48302011-05-21 18:32:29 +0200793enum determine_dev_size drbd_determine_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700794{
795 sector_t prev_first_sect, prev_size; /* previous meta location */
Philipp Reisneref5e44a2011-05-03 13:27:43 +0200796 sector_t la_size, u_size;
Philipp Reisnerb411b362009-09-25 16:07:19 -0700797 sector_t size;
798 char ppb[10];
799
800 int md_moved, la_size_changed;
801 enum determine_dev_size rv = unchanged;
802
803 /* race:
804 * application request passes inc_ap_bio,
805 * but then cannot get an AL-reference.
806 * this function later may wait on ap_bio_cnt == 0. -> deadlock.
807 *
808 * to avoid that:
809 * Suspend IO right here.
810 * still lock the act_log to not trigger ASSERTs there.
811 */
812 drbd_suspend_io(mdev);
813
814 /* no wait necessary anymore, actually we could assert that */
815 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
816
817 prev_first_sect = drbd_md_first_sector(mdev->ldev);
818 prev_size = mdev->ldev->md.md_size_sect;
819 la_size = mdev->ldev->md.la_size_sect;
820
821 /* TODO: should only be some assert here, not (re)init... */
822 drbd_md_set_sector_offsets(mdev, mdev->ldev);
823
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200824 rcu_read_lock();
825 u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
826 rcu_read_unlock();
Philipp Reisneref5e44a2011-05-03 13:27:43 +0200827 size = drbd_new_dev_size(mdev, mdev->ldev, u_size, flags & DDSF_FORCED);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700828
829 if (drbd_get_capacity(mdev->this_bdev) != size ||
830 drbd_bm_capacity(mdev) != size) {
831 int err;
Philipp Reisner02d9a942010-03-24 16:23:03 +0100832 err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC));
Philipp Reisnerb411b362009-09-25 16:07:19 -0700833 if (unlikely(err)) {
834 /* currently there is only one error: ENOMEM! */
835 size = drbd_bm_capacity(mdev)>>1;
836 if (size == 0) {
837 dev_err(DEV, "OUT OF MEMORY! "
838 "Could not allocate bitmap!\n");
839 } else {
840 dev_err(DEV, "BM resizing failed. "
841 "Leaving size unchanged at size = %lu KB\n",
842 (unsigned long)size);
843 }
844 rv = dev_size_error;
845 }
846 /* racy, see comments above. */
847 drbd_set_my_capacity(mdev, size);
848 mdev->ldev->md.la_size_sect = size;
849 dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
850 (unsigned long long)size>>1);
851 }
852 if (rv == dev_size_error)
853 goto out;
854
855 la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
856
857 md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
858 || prev_size != mdev->ldev->md.md_size_sect;
859
860 if (la_size_changed || md_moved) {
Andreas Gruenbacher24dccab2010-12-12 17:45:41 +0100861 int err;
862
Philipp Reisnerb411b362009-09-25 16:07:19 -0700863 drbd_al_shrink(mdev); /* All extents inactive. */
864 dev_info(DEV, "Writing the whole bitmap, %s\n",
865 la_size_changed && md_moved ? "size changed and md moved" :
866 la_size_changed ? "size changed" : "md moved");
Lars Ellenberg20ceb2b2011-01-21 10:56:44 +0100867 /* next line implicitly does drbd_suspend_io()+drbd_resume_io() */
868 err = drbd_bitmap_io(mdev, &drbd_bm_write,
869 "size changed", BM_LOCKED_MASK);
Andreas Gruenbacher24dccab2010-12-12 17:45:41 +0100870 if (err) {
871 rv = dev_size_error;
872 goto out;
873 }
Philipp Reisnerb411b362009-09-25 16:07:19 -0700874 drbd_md_mark_dirty(mdev);
875 }
876
877 if (size > la_size)
878 rv = grew;
879 if (size < la_size)
880 rv = shrunk;
881out:
882 lc_unlock(mdev->act_log);
883 wake_up(&mdev->al_wait);
884 drbd_resume_io(mdev);
885
886 return rv;
887}
888
889sector_t
Philipp Reisneref5e44a2011-05-03 13:27:43 +0200890drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev,
891 sector_t u_size, int assume_peer_has_space)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700892{
893 sector_t p_size = mdev->p_size; /* partner's disk size. */
894 sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
895 sector_t m_size; /* my size */
Philipp Reisnerb411b362009-09-25 16:07:19 -0700896 sector_t size = 0;
897
898 m_size = drbd_get_max_capacity(bdev);
899
Philipp Reisnera393db62009-12-22 13:35:52 +0100900 if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
901 dev_warn(DEV, "Resize while not connected was forced by the user!\n");
902 p_size = m_size;
903 }
904
Philipp Reisnerb411b362009-09-25 16:07:19 -0700905 if (p_size && m_size) {
906 size = min_t(sector_t, p_size, m_size);
907 } else {
908 if (la_size) {
909 size = la_size;
910 if (m_size && m_size < size)
911 size = m_size;
912 if (p_size && p_size < size)
913 size = p_size;
914 } else {
915 if (m_size)
916 size = m_size;
917 if (p_size)
918 size = p_size;
919 }
920 }
921
922 if (size == 0)
923 dev_err(DEV, "Both nodes diskless!\n");
924
925 if (u_size) {
926 if (u_size > size)
927 dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
928 (unsigned long)u_size>>1, (unsigned long)size>>1);
929 else
930 size = u_size;
931 }
932
933 return size;
934}
935
936/**
937 * drbd_check_al_size() - Ensures that the AL is of the right size
938 * @mdev: DRBD device.
939 *
940 * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
941 * failed, and 0 on success. You should call drbd_md_sync() after you called
942 * this function.
943 */
Lars Ellenbergf3990022011-03-23 14:31:09 +0100944static int drbd_check_al_size(struct drbd_conf *mdev, struct disk_conf *dc)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700945{
946 struct lru_cache *n, *t;
947 struct lc_element *e;
948 unsigned int in_use;
949 int i;
950
Philipp Reisnerb411b362009-09-25 16:07:19 -0700951 if (mdev->act_log &&
Lars Ellenbergf3990022011-03-23 14:31:09 +0100952 mdev->act_log->nr_elements == dc->al_extents)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700953 return 0;
954
955 in_use = 0;
956 t = mdev->act_log;
Lars Ellenberg7ad651b2011-02-21 13:21:03 +0100957 n = lc_create("act_log", drbd_al_ext_cache, AL_UPDATES_PER_TRANSACTION,
Lars Ellenbergf3990022011-03-23 14:31:09 +0100958 dc->al_extents, sizeof(struct lc_element), 0);
Philipp Reisnerb411b362009-09-25 16:07:19 -0700959
960 if (n == NULL) {
961 dev_err(DEV, "Cannot allocate act_log lru!\n");
962 return -ENOMEM;
963 }
964 spin_lock_irq(&mdev->al_lock);
965 if (t) {
966 for (i = 0; i < t->nr_elements; i++) {
967 e = lc_element_by_index(t, i);
968 if (e->refcnt)
969 dev_err(DEV, "refcnt(%d)==%d\n",
970 e->lc_number, e->refcnt);
971 in_use += e->refcnt;
972 }
973 }
974 if (!in_use)
975 mdev->act_log = n;
976 spin_unlock_irq(&mdev->al_lock);
977 if (in_use) {
978 dev_err(DEV, "Activity log still in use!\n");
979 lc_destroy(n);
980 return -EBUSY;
981 } else {
982 if (t)
983 lc_destroy(t);
984 }
985 drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
986 return 0;
987}
988
Philipp Reisner99432fc2011-05-20 16:39:13 +0200989static void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_bio_size)
Philipp Reisnerb411b362009-09-25 16:07:19 -0700990{
991 struct request_queue * const q = mdev->rq_queue;
Philipp Reisner99432fc2011-05-20 16:39:13 +0200992 int max_hw_sectors = max_bio_size >> 9;
993 int max_segments = 0;
994
995 if (get_ldev_if_state(mdev, D_ATTACHING)) {
996 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
997
998 max_hw_sectors = min(queue_max_hw_sectors(b), max_bio_size >> 9);
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200999 rcu_read_lock();
1000 max_segments = rcu_dereference(mdev->ldev->disk_conf)->max_bio_bvecs;
1001 rcu_read_unlock();
Philipp Reisner99432fc2011-05-20 16:39:13 +02001002 put_ldev(mdev);
1003 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07001004
Philipp Reisnerb411b362009-09-25 16:07:19 -07001005 blk_queue_logical_block_size(q, 512);
Lars Ellenberg1816a2b2010-11-11 15:19:07 +01001006 blk_queue_max_hw_sectors(q, max_hw_sectors);
1007 /* This is the workaround for "bio would need to, but cannot, be split" */
1008 blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
1009 blk_queue_segment_boundary(q, PAGE_CACHE_SIZE-1);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001010
Philipp Reisner99432fc2011-05-20 16:39:13 +02001011 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1012 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001013
Philipp Reisner99432fc2011-05-20 16:39:13 +02001014 blk_queue_stack_limits(q, b);
1015
1016 if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
1017 dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
1018 q->backing_dev_info.ra_pages,
1019 b->backing_dev_info.ra_pages);
1020 q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
1021 }
1022 put_ldev(mdev);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001023 }
1024}
1025
Philipp Reisner99432fc2011-05-20 16:39:13 +02001026void drbd_reconsider_max_bio_size(struct drbd_conf *mdev)
1027{
1028 int now, new, local, peer;
1029
1030 now = queue_max_hw_sectors(mdev->rq_queue) << 9;
1031 local = mdev->local_max_bio_size; /* Eventually last known value, from volatile memory */
1032 peer = mdev->peer_max_bio_size; /* Eventually last known value, from meta data */
1033
1034 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1035 local = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9;
1036 mdev->local_max_bio_size = local;
1037 put_ldev(mdev);
1038 }
1039
1040 /* We may ignore peer limits if the peer is modern enough.
1041 Because new from 8.3.8 onwards the peer can use multiple
1042 BIOs for a single peer_request */
1043 if (mdev->state.conn >= C_CONNECTED) {
Philipp Reisner31890f42011-01-19 14:12:51 +01001044 if (mdev->tconn->agreed_pro_version < 94)
Philipp Reisner99432fc2011-05-20 16:39:13 +02001045 peer = mdev->peer_max_bio_size;
Philipp Reisner31890f42011-01-19 14:12:51 +01001046 else if (mdev->tconn->agreed_pro_version == 94)
Philipp Reisner99432fc2011-05-20 16:39:13 +02001047 peer = DRBD_MAX_SIZE_H80_PACKET;
1048 else /* drbd 8.3.8 onwards */
1049 peer = DRBD_MAX_BIO_SIZE;
1050 }
1051
1052 new = min_t(int, local, peer);
1053
1054 if (mdev->state.role == R_PRIMARY && new < now)
1055 dev_err(DEV, "ASSERT FAILED new < now; (%d < %d)\n", new, now);
1056
1057 if (new != now)
1058 dev_info(DEV, "max BIO size = %u\n", new);
1059
1060 drbd_setup_queue_param(mdev, new);
1061}
1062
Philipp Reisnera18e9d12011-04-24 11:09:55 +02001063/* Starts the worker thread */
Philipp Reisner0e29d162011-02-18 14:23:11 +01001064static void conn_reconfig_start(struct drbd_tconn *tconn)
Philipp Reisnerb411b362009-09-25 16:07:19 -07001065{
Philipp Reisner0e29d162011-02-18 14:23:11 +01001066 drbd_thread_start(&tconn->worker);
1067 conn_flush_workqueue(tconn);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001068}
1069
Philipp Reisnera18e9d12011-04-24 11:09:55 +02001070/* if still unconfigured, stops worker again. */
Philipp Reisner0e29d162011-02-18 14:23:11 +01001071static void conn_reconfig_done(struct drbd_tconn *tconn)
Philipp Reisnerb411b362009-09-25 16:07:19 -07001072{
Lars Ellenberg992d6e92011-05-02 11:47:18 +02001073 bool stop_threads;
Philipp Reisner0e29d162011-02-18 14:23:11 +01001074 spin_lock_irq(&tconn->req_lock);
Lars Ellenberg992d6e92011-05-02 11:47:18 +02001075 stop_threads = conn_all_vols_unconf(tconn);
Philipp Reisner0e29d162011-02-18 14:23:11 +01001076 spin_unlock_irq(&tconn->req_lock);
Lars Ellenberg992d6e92011-05-02 11:47:18 +02001077 if (stop_threads) {
1078 /* asender is implicitly stopped by receiver
Philipp Reisner81fa2e62011-05-04 15:10:30 +02001079 * in conn_disconnect() */
Lars Ellenberg992d6e92011-05-02 11:47:18 +02001080 drbd_thread_stop(&tconn->receiver);
1081 drbd_thread_stop(&tconn->worker);
1082 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07001083}
1084
Philipp Reisner07782862010-08-31 12:00:50 +02001085/* Make sure IO is suspended before calling this function(). */
1086static void drbd_suspend_al(struct drbd_conf *mdev)
1087{
1088 int s = 0;
1089
Lars Ellenberg61610422011-02-21 13:20:54 +01001090 if (!lc_try_lock(mdev->act_log)) {
Philipp Reisner07782862010-08-31 12:00:50 +02001091 dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n");
1092 return;
1093 }
1094
Lars Ellenberg61610422011-02-21 13:20:54 +01001095 drbd_al_shrink(mdev);
Philipp Reisner87eeee42011-01-19 14:16:30 +01001096 spin_lock_irq(&mdev->tconn->req_lock);
Philipp Reisner07782862010-08-31 12:00:50 +02001097 if (mdev->state.conn < C_CONNECTED)
1098 s = !test_and_set_bit(AL_SUSPENDED, &mdev->flags);
Philipp Reisner87eeee42011-01-19 14:16:30 +01001099 spin_unlock_irq(&mdev->tconn->req_lock);
Lars Ellenberg61610422011-02-21 13:20:54 +01001100 lc_unlock(mdev->act_log);
Philipp Reisner07782862010-08-31 12:00:50 +02001101
1102 if (s)
1103 dev_info(DEV, "Suspended AL updates\n");
1104}
1105
Lars Ellenberg5979e362011-04-27 21:09:55 +02001106
1107static bool should_set_defaults(struct genl_info *info)
1108{
1109 unsigned flags = ((struct drbd_genlmsghdr*)info->userhdr)->flags;
1110 return 0 != (flags & DRBD_GENL_F_SET_DEFAULTS);
1111}
1112
Philipp Reisnerd589a212011-05-04 10:06:52 +02001113static void enforce_disk_conf_limits(struct disk_conf *dc)
1114{
1115 if (dc->al_extents < DRBD_AL_EXTENTS_MIN)
1116 dc->al_extents = DRBD_AL_EXTENTS_MIN;
1117 if (dc->al_extents > DRBD_AL_EXTENTS_MAX)
1118 dc->al_extents = DRBD_AL_EXTENTS_MAX;
1119
1120 if (dc->c_plan_ahead > DRBD_C_PLAN_AHEAD_MAX)
1121 dc->c_plan_ahead = DRBD_C_PLAN_AHEAD_MAX;
1122}
1123
Lars Ellenbergf3990022011-03-23 14:31:09 +01001124int drbd_adm_disk_opts(struct sk_buff *skb, struct genl_info *info)
1125{
1126 enum drbd_ret_code retcode;
1127 struct drbd_conf *mdev;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001128 struct disk_conf *new_disk_conf, *old_disk_conf;
Philipp Reisner813472c2011-05-03 16:47:02 +02001129 struct fifo_buffer *old_plan = NULL, *new_plan = NULL;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001130 int err, fifo_size;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001131
1132 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1133 if (!adm_ctx.reply_skb)
1134 return retcode;
1135 if (retcode != NO_ERROR)
1136 goto out;
1137
1138 mdev = adm_ctx.mdev;
1139
1140 /* we also need a disk
1141 * to change the options on */
1142 if (!get_ldev(mdev)) {
1143 retcode = ERR_NO_DISK;
1144 goto out;
1145 }
1146
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001147 new_disk_conf = kmalloc(sizeof(struct disk_conf), GFP_KERNEL);
Lars Ellenberg5ecc72c2011-04-27 21:14:57 +02001148 if (!new_disk_conf) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01001149 retcode = ERR_NOMEM;
1150 goto fail;
1151 }
1152
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001153 mutex_lock(&mdev->tconn->conf_update);
1154 old_disk_conf = mdev->ldev->disk_conf;
1155 *new_disk_conf = *old_disk_conf;
Lars Ellenberg5979e362011-04-27 21:09:55 +02001156 if (should_set_defaults(info))
Andreas Gruenbacherb966b5d2011-05-03 14:56:09 +02001157 set_disk_conf_defaults(new_disk_conf);
Lars Ellenberg5979e362011-04-27 21:09:55 +02001158
Lars Ellenberg5ecc72c2011-04-27 21:14:57 +02001159 err = disk_conf_from_attrs_for_change(new_disk_conf, info);
Andreas Gruenbacherc75b9b12011-05-24 14:18:31 +02001160 if (err && err != -ENOMSG) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01001161 retcode = ERR_MANDATORY_TAG;
1162 drbd_msg_put_info(from_attrs_err_to_txt(err));
1163 }
1164
Lars Ellenberg5ecc72c2011-04-27 21:14:57 +02001165 if (!expect(new_disk_conf->resync_rate >= 1))
1166 new_disk_conf->resync_rate = 1;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001167
Philipp Reisnerd589a212011-05-04 10:06:52 +02001168 enforce_disk_conf_limits(new_disk_conf);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001169
Lars Ellenberg5ecc72c2011-04-27 21:14:57 +02001170 fifo_size = (new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ;
Philipp Reisner9958c852011-05-03 16:19:31 +02001171 if (fifo_size != mdev->rs_plan_s->size) {
Philipp Reisner813472c2011-05-03 16:47:02 +02001172 new_plan = fifo_alloc(fifo_size);
1173 if (!new_plan) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01001174 dev_err(DEV, "kmalloc of fifo_buffer failed");
1175 retcode = ERR_NOMEM;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001176 goto fail_unlock;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001177 }
1178 }
1179
Lars Ellenbergf3990022011-03-23 14:31:09 +01001180 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
1181 drbd_al_shrink(mdev);
Lars Ellenberg5ecc72c2011-04-27 21:14:57 +02001182 err = drbd_check_al_size(mdev, new_disk_conf);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001183 lc_unlock(mdev->act_log);
1184 wake_up(&mdev->al_wait);
1185
1186 if (err) {
1187 retcode = ERR_NOMEM;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001188 goto fail_unlock;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001189 }
1190
Philipp Reisnerdc97b702011-05-03 14:27:15 +02001191 write_lock_irq(&global_state_lock);
Andreas Gruenbacher95f8efd2011-05-12 11:15:34 +02001192 retcode = drbd_resync_after_valid(mdev, new_disk_conf->resync_after);
Philipp Reisnerdc97b702011-05-03 14:27:15 +02001193 if (retcode == NO_ERROR) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001194 rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
Andreas Gruenbacher95f8efd2011-05-12 11:15:34 +02001195 drbd_resync_after_changed(mdev);
Philipp Reisnerdc97b702011-05-03 14:27:15 +02001196 }
1197 write_unlock_irq(&global_state_lock);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001198
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001199 if (retcode != NO_ERROR)
1200 goto fail_unlock;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001201
Philipp Reisner813472c2011-05-03 16:47:02 +02001202 if (new_plan) {
1203 old_plan = mdev->rs_plan_s;
1204 rcu_assign_pointer(mdev->rs_plan_s, new_plan);
Philipp Reisner9958c852011-05-03 16:19:31 +02001205 }
Philipp Reisner9958c852011-05-03 16:19:31 +02001206
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02001207 mutex_unlock(&mdev->tconn->conf_update);
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001208 drbd_md_sync(mdev);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001209
1210 if (mdev->state.conn >= C_CONNECTED)
1211 drbd_send_sync_param(mdev);
1212
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001213 synchronize_rcu();
1214 kfree(old_disk_conf);
Philipp Reisner813472c2011-05-03 16:47:02 +02001215 kfree(old_plan);
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001216 goto success;
1217
1218fail_unlock:
1219 mutex_unlock(&mdev->tconn->conf_update);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001220 fail:
Lars Ellenberg5ecc72c2011-04-27 21:14:57 +02001221 kfree(new_disk_conf);
Philipp Reisner813472c2011-05-03 16:47:02 +02001222 kfree(new_plan);
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001223success:
1224 put_ldev(mdev);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001225 out:
1226 drbd_adm_finish(info, retcode);
1227 return 0;
1228}
1229
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001230int drbd_adm_attach(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07001231{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001232 struct drbd_conf *mdev;
1233 int err;
Andreas Gruenbacher116676c2010-12-08 13:33:11 +01001234 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001235 enum determine_dev_size dd;
1236 sector_t max_possible_sectors;
1237 sector_t min_md_device_sectors;
1238 struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001239 struct disk_conf *new_disk_conf = NULL;
Tejun Heoe525fd82010-11-13 11:55:17 +01001240 struct block_device *bdev;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001241 struct lru_cache *resync_lru = NULL;
Philipp Reisner9958c852011-05-03 16:19:31 +02001242 struct fifo_buffer *new_plan = NULL;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001243 union drbd_state ns, os;
Andreas Gruenbacherf2024e72010-12-10 13:44:05 +01001244 enum drbd_state_rv rv;
Philipp Reisner44ed1672011-04-19 17:10:19 +02001245 struct net_conf *nc;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001246 int cp_discovered = 0;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001247
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001248 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1249 if (!adm_ctx.reply_skb)
1250 return retcode;
1251 if (retcode != NO_ERROR)
Lars Ellenberg40cbf082011-03-16 16:52:10 +01001252 goto finish;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001253
1254 mdev = adm_ctx.mdev;
Philipp Reisner0e29d162011-02-18 14:23:11 +01001255 conn_reconfig_start(mdev->tconn);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001256
1257 /* if you want to reconfigure, please tear down first */
1258 if (mdev->state.disk > D_DISKLESS) {
1259 retcode = ERR_DISK_CONFIGURED;
1260 goto fail;
1261 }
Lars Ellenberg82f59cc2010-10-16 12:13:47 +02001262 /* It may just now have detached because of IO error. Make sure
1263 * drbd_ldev_destroy is done already, we may end up here very fast,
1264 * e.g. if someone calls attach from the on-io-error handler,
1265 * to realize a "hot spare" feature (not that I'd recommend that) */
1266 wait_event(mdev->misc_wait, !atomic_read(&mdev->local_cnt));
Philipp Reisnerb411b362009-09-25 16:07:19 -07001267
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001268 /* allocation not in the IO path, drbdsetup context */
Philipp Reisnerb411b362009-09-25 16:07:19 -07001269 nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
1270 if (!nbc) {
1271 retcode = ERR_NOMEM;
1272 goto fail;
1273 }
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001274 new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
1275 if (!new_disk_conf) {
1276 retcode = ERR_NOMEM;
1277 goto fail;
1278 }
1279 nbc->disk_conf = new_disk_conf;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001280
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001281 set_disk_conf_defaults(new_disk_conf);
1282 err = disk_conf_from_attrs(new_disk_conf, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001283 if (err) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001284 retcode = ERR_MANDATORY_TAG;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001285 drbd_msg_put_info(from_attrs_err_to_txt(err));
Philipp Reisnerb411b362009-09-25 16:07:19 -07001286 goto fail;
1287 }
1288
Philipp Reisnerd589a212011-05-04 10:06:52 +02001289 enforce_disk_conf_limits(new_disk_conf);
1290
Philipp Reisner9958c852011-05-03 16:19:31 +02001291 new_plan = fifo_alloc((new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ);
1292 if (!new_plan) {
1293 retcode = ERR_NOMEM;
1294 goto fail;
1295 }
1296
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001297 if (new_disk_conf->meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001298 retcode = ERR_MD_IDX_INVALID;
1299 goto fail;
1300 }
1301
Philipp Reisner44ed1672011-04-19 17:10:19 +02001302 rcu_read_lock();
1303 nc = rcu_dereference(mdev->tconn->net_conf);
1304 if (nc) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001305 if (new_disk_conf->fencing == FP_STONITH && nc->wire_protocol == DRBD_PROT_A) {
Philipp Reisner44ed1672011-04-19 17:10:19 +02001306 rcu_read_unlock();
Philipp Reisner47ff2d02010-06-18 13:56:57 +02001307 retcode = ERR_STONITH_AND_PROT_A;
1308 goto fail;
1309 }
1310 }
Philipp Reisner44ed1672011-04-19 17:10:19 +02001311 rcu_read_unlock();
Philipp Reisner47ff2d02010-06-18 13:56:57 +02001312
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001313 bdev = blkdev_get_by_path(new_disk_conf->backing_dev,
Tejun Heod4d77622010-11-13 11:55:18 +01001314 FMODE_READ | FMODE_WRITE | FMODE_EXCL, mdev);
Tejun Heoe525fd82010-11-13 11:55:17 +01001315 if (IS_ERR(bdev)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001316 dev_err(DEV, "open(\"%s\") failed with %ld\n", new_disk_conf->backing_dev,
Tejun Heoe525fd82010-11-13 11:55:17 +01001317 PTR_ERR(bdev));
Philipp Reisnerb411b362009-09-25 16:07:19 -07001318 retcode = ERR_OPEN_DISK;
1319 goto fail;
1320 }
Tejun Heoe525fd82010-11-13 11:55:17 +01001321 nbc->backing_bdev = bdev;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001322
Tejun Heoe525fd82010-11-13 11:55:17 +01001323 /*
1324 * meta_dev_idx >= 0: external fixed size, possibly multiple
1325 * drbd sharing one meta device. TODO in that case, paranoia
1326 * check that [md_bdev, meta_dev_idx] is not yet used by some
1327 * other drbd minor! (if you use drbd.conf + drbdadm, that
1328 * should check it for you already; but if you don't, or
1329 * someone fooled it, we need to double check here)
1330 */
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001331 bdev = blkdev_get_by_path(new_disk_conf->meta_dev,
Tejun Heod4d77622010-11-13 11:55:18 +01001332 FMODE_READ | FMODE_WRITE | FMODE_EXCL,
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001333 (new_disk_conf->meta_dev_idx < 0) ?
Tejun Heod4d77622010-11-13 11:55:18 +01001334 (void *)mdev : (void *)drbd_m_holder);
Tejun Heoe525fd82010-11-13 11:55:17 +01001335 if (IS_ERR(bdev)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001336 dev_err(DEV, "open(\"%s\") failed with %ld\n", new_disk_conf->meta_dev,
Tejun Heoe525fd82010-11-13 11:55:17 +01001337 PTR_ERR(bdev));
Philipp Reisnerb411b362009-09-25 16:07:19 -07001338 retcode = ERR_OPEN_MD_DISK;
1339 goto fail;
1340 }
Tejun Heoe525fd82010-11-13 11:55:17 +01001341 nbc->md_bdev = bdev;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001342
Tejun Heoe525fd82010-11-13 11:55:17 +01001343 if ((nbc->backing_bdev == nbc->md_bdev) !=
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001344 (new_disk_conf->meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
1345 new_disk_conf->meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
Tejun Heoe525fd82010-11-13 11:55:17 +01001346 retcode = ERR_MD_IDX_INVALID;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001347 goto fail;
1348 }
1349
1350 resync_lru = lc_create("resync", drbd_bm_ext_cache,
Lars Ellenberg46a15bc2011-02-21 13:21:01 +01001351 1, 61, sizeof(struct bm_extent),
Philipp Reisnerb411b362009-09-25 16:07:19 -07001352 offsetof(struct bm_extent, lce));
1353 if (!resync_lru) {
1354 retcode = ERR_NOMEM;
Tejun Heoe525fd82010-11-13 11:55:17 +01001355 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001356 }
1357
1358 /* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
1359 drbd_md_set_sector_offsets(mdev, nbc);
1360
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001361 if (drbd_get_max_capacity(nbc) < new_disk_conf->disk_size) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001362 dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
1363 (unsigned long long) drbd_get_max_capacity(nbc),
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001364 (unsigned long long) new_disk_conf->disk_size);
Lars Ellenberg67b58bf2011-06-06 15:36:04 +02001365 retcode = ERR_DISK_TOO_SMALL;
Tejun Heoe525fd82010-11-13 11:55:17 +01001366 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001367 }
1368
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001369 if (new_disk_conf->meta_dev_idx < 0) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001370 max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
1371 /* at least one MB, otherwise it does not make sense */
1372 min_md_device_sectors = (2<<10);
1373 } else {
1374 max_possible_sectors = DRBD_MAX_SECTORS;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001375 min_md_device_sectors = MD_RESERVED_SECT * (new_disk_conf->meta_dev_idx + 1);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001376 }
1377
Philipp Reisnerb411b362009-09-25 16:07:19 -07001378 if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
Lars Ellenberg67b58bf2011-06-06 15:36:04 +02001379 retcode = ERR_MD_DISK_TOO_SMALL;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001380 dev_warn(DEV, "refusing attach: md-device too small, "
1381 "at least %llu sectors needed for this meta-disk type\n",
1382 (unsigned long long) min_md_device_sectors);
Tejun Heoe525fd82010-11-13 11:55:17 +01001383 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001384 }
1385
1386 /* Make sure the new disk is big enough
1387 * (we may currently be R_PRIMARY with no local disk...) */
1388 if (drbd_get_max_capacity(nbc) <
1389 drbd_get_capacity(mdev->this_bdev)) {
Lars Ellenberg67b58bf2011-06-06 15:36:04 +02001390 retcode = ERR_DISK_TOO_SMALL;
Tejun Heoe525fd82010-11-13 11:55:17 +01001391 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001392 }
1393
1394 nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
1395
Lars Ellenberg13529942009-10-12 19:07:49 +02001396 if (nbc->known_size > max_possible_sectors) {
1397 dev_warn(DEV, "==> truncating very big lower level device "
1398 "to currently maximum possible %llu sectors <==\n",
1399 (unsigned long long) max_possible_sectors);
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001400 if (new_disk_conf->meta_dev_idx >= 0)
Lars Ellenberg13529942009-10-12 19:07:49 +02001401 dev_warn(DEV, "==>> using internal or flexible "
1402 "meta data may help <<==\n");
1403 }
1404
Philipp Reisnerb411b362009-09-25 16:07:19 -07001405 drbd_suspend_io(mdev);
1406 /* also wait for the last barrier ack. */
Philipp Reisner2aebfab2011-03-28 16:48:11 +02001407 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || drbd_suspended(mdev));
Philipp Reisnerb411b362009-09-25 16:07:19 -07001408 /* and for any other previously queued work */
Philipp Reisnera21e9292011-02-08 15:08:49 +01001409 drbd_flush_workqueue(mdev);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001410
Andreas Gruenbacherf2024e72010-12-10 13:44:05 +01001411 rv = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
1412 retcode = rv; /* FIXME: Type mismatch. */
Philipp Reisnerb411b362009-09-25 16:07:19 -07001413 drbd_resume_io(mdev);
Andreas Gruenbacherf2024e72010-12-10 13:44:05 +01001414 if (rv < SS_SUCCESS)
Tejun Heoe525fd82010-11-13 11:55:17 +01001415 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001416
1417 if (!get_ldev_if_state(mdev, D_ATTACHING))
1418 goto force_diskless;
1419
1420 drbd_md_set_sector_offsets(mdev, nbc);
1421
1422 if (!mdev->bitmap) {
1423 if (drbd_bm_init(mdev)) {
1424 retcode = ERR_NOMEM;
1425 goto force_diskless_dec;
1426 }
1427 }
1428
1429 retcode = drbd_md_read(mdev, nbc);
1430 if (retcode != NO_ERROR)
1431 goto force_diskless_dec;
1432
1433 if (mdev->state.conn < C_CONNECTED &&
1434 mdev->state.role == R_PRIMARY &&
1435 (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
1436 dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
1437 (unsigned long long)mdev->ed_uuid);
1438 retcode = ERR_DATA_NOT_CURRENT;
1439 goto force_diskless_dec;
1440 }
1441
1442 /* Since we are diskless, fix the activity log first... */
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001443 if (drbd_check_al_size(mdev, new_disk_conf)) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001444 retcode = ERR_NOMEM;
1445 goto force_diskless_dec;
1446 }
1447
1448 /* Prevent shrinking of consistent devices ! */
1449 if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001450 drbd_new_dev_size(mdev, nbc, nbc->disk_conf->disk_size, 0) < nbc->md.la_size_sect) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001451 dev_warn(DEV, "refusing to truncate a consistent device\n");
Lars Ellenberg67b58bf2011-06-06 15:36:04 +02001452 retcode = ERR_DISK_TOO_SMALL;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001453 goto force_diskless_dec;
1454 }
1455
1456 if (!drbd_al_read_log(mdev, nbc)) {
1457 retcode = ERR_IO_MD_DISK;
1458 goto force_diskless_dec;
1459 }
1460
Philipp Reisnerb411b362009-09-25 16:07:19 -07001461 /* Reset the "barriers don't work" bits here, then force meta data to
1462 * be written, to ensure we determine if barriers are supported. */
Andreas Gruenbachere5440462011-05-04 15:25:35 +02001463 if (new_disk_conf->md_flushes)
Philipp Reisnera8a4e512010-08-25 10:21:04 +02001464 clear_bit(MD_NO_FUA, &mdev->flags);
Andreas Gruenbachere5440462011-05-04 15:25:35 +02001465 else
1466 set_bit(MD_NO_FUA, &mdev->flags);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001467
1468 /* Point of no return reached.
1469 * Devices and memory are no longer released by error cleanup below.
1470 * now mdev takes over responsibility, and the state engine should
1471 * clean it up somewhere. */
1472 D_ASSERT(mdev->ldev == NULL);
1473 mdev->ldev = nbc;
1474 mdev->resync = resync_lru;
Philipp Reisner9958c852011-05-03 16:19:31 +02001475 mdev->rs_plan_s = new_plan;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001476 nbc = NULL;
1477 resync_lru = NULL;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001478 new_disk_conf = NULL;
Philipp Reisner9958c852011-05-03 16:19:31 +02001479 new_plan = NULL;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001480
Philipp Reisner2451fc32010-08-24 13:43:11 +02001481 mdev->write_ordering = WO_bdev_flush;
1482 drbd_bump_write_ordering(mdev, WO_bdev_flush);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001483
1484 if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
1485 set_bit(CRASHED_PRIMARY, &mdev->flags);
1486 else
1487 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1488
Philipp Reisner894c6a92010-06-18 16:03:20 +02001489 if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
Philipp Reisnerda9fbc22011-03-29 10:52:01 +02001490 !(mdev->state.role == R_PRIMARY && mdev->tconn->susp_nod)) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001491 set_bit(CRASHED_PRIMARY, &mdev->flags);
1492 cp_discovered = 1;
1493 }
1494
1495 mdev->send_cnt = 0;
1496 mdev->recv_cnt = 0;
1497 mdev->read_cnt = 0;
1498 mdev->writ_cnt = 0;
1499
Philipp Reisner99432fc2011-05-20 16:39:13 +02001500 drbd_reconsider_max_bio_size(mdev);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001501
1502 /* If I am currently not R_PRIMARY,
1503 * but meta data primary indicator is set,
1504 * I just now recover from a hard crash,
1505 * and have been R_PRIMARY before that crash.
1506 *
1507 * Now, if I had no connection before that crash
1508 * (have been degraded R_PRIMARY), chances are that
1509 * I won't find my peer now either.
1510 *
1511 * In that case, and _only_ in that case,
1512 * we use the degr-wfc-timeout instead of the default,
1513 * so we can automatically recover from a crash of a
1514 * degraded but active "cluster" after a certain timeout.
1515 */
1516 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
1517 if (mdev->state.role != R_PRIMARY &&
1518 drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1519 !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
1520 set_bit(USE_DEGR_WFC_T, &mdev->flags);
1521
Bart Van Assche24c48302011-05-21 18:32:29 +02001522 dd = drbd_determine_dev_size(mdev, 0);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001523 if (dd == dev_size_error) {
1524 retcode = ERR_NOMEM_BITMAP;
1525 goto force_diskless_dec;
1526 } else if (dd == grew)
1527 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
1528
1529 if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) {
1530 dev_info(DEV, "Assuming that all blocks are out of sync "
1531 "(aka FullSync)\n");
Lars Ellenberg20ceb2b2011-01-21 10:56:44 +01001532 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write,
1533 "set_n_write from attaching", BM_LOCKED_MASK)) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001534 retcode = ERR_IO_MD_DISK;
1535 goto force_diskless_dec;
1536 }
1537 } else {
Lars Ellenberg20ceb2b2011-01-21 10:56:44 +01001538 if (drbd_bitmap_io(mdev, &drbd_bm_read,
Andreas Gruenbacher22ab6a32010-12-13 01:44:11 +01001539 "read from attaching", BM_LOCKED_MASK)) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07001540 retcode = ERR_IO_MD_DISK;
1541 goto force_diskless_dec;
1542 }
1543 }
1544
1545 if (cp_discovered) {
1546 drbd_al_apply_to_bm(mdev);
Lars Ellenberg20ceb2b2011-01-21 10:56:44 +01001547 if (drbd_bitmap_io(mdev, &drbd_bm_write,
1548 "crashed primary apply AL", BM_LOCKED_MASK)) {
Lars Ellenberg19f843a2010-12-15 08:59:11 +01001549 retcode = ERR_IO_MD_DISK;
1550 goto force_diskless_dec;
1551 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07001552 }
1553
Philipp Reisner07782862010-08-31 12:00:50 +02001554 if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev))
1555 drbd_suspend_al(mdev); /* IO is still suspended here... */
1556
Philipp Reisner87eeee42011-01-19 14:16:30 +01001557 spin_lock_irq(&mdev->tconn->req_lock);
Philipp Reisner78bae592011-03-28 15:40:12 +02001558 os = drbd_read_state(mdev);
1559 ns = os;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001560 /* If MDF_CONSISTENT is not set go into inconsistent state,
1561 otherwise investigate MDF_WasUpToDate...
1562 If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
1563 otherwise into D_CONSISTENT state.
1564 */
1565 if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
1566 if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
1567 ns.disk = D_CONSISTENT;
1568 else
1569 ns.disk = D_OUTDATED;
1570 } else {
1571 ns.disk = D_INCONSISTENT;
1572 }
1573
1574 if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
1575 ns.pdsk = D_OUTDATED;
1576
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001577 rcu_read_lock();
1578 if (ns.disk == D_CONSISTENT &&
1579 (ns.pdsk == D_OUTDATED || rcu_dereference(mdev->ldev->disk_conf)->fencing == FP_DONT_CARE))
Philipp Reisnerb411b362009-09-25 16:07:19 -07001580 ns.disk = D_UP_TO_DATE;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001581 rcu_read_unlock();
Philipp Reisnerb411b362009-09-25 16:07:19 -07001582
1583 /* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
1584 MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
1585 this point, because drbd_request_state() modifies these
1586 flags. */
1587
1588 /* In case we are C_CONNECTED postpone any decision on the new disk
1589 state after the negotiation phase. */
1590 if (mdev->state.conn == C_CONNECTED) {
1591 mdev->new_state_tmp.i = ns.i;
1592 ns.i = os.i;
1593 ns.disk = D_NEGOTIATING;
Philipp Reisnerdc66c742010-06-02 14:31:29 +02001594
1595 /* We expect to receive up-to-date UUIDs soon.
1596 To avoid a race in receive_state, free p_uuid while
1597 holding req_lock. I.e. atomic with the state change */
1598 kfree(mdev->p_uuid);
1599 mdev->p_uuid = NULL;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001600 }
1601
1602 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
Philipp Reisner87eeee42011-01-19 14:16:30 +01001603 spin_unlock_irq(&mdev->tconn->req_lock);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001604
1605 if (rv < SS_SUCCESS)
1606 goto force_diskless_dec;
1607
1608 if (mdev->state.role == R_PRIMARY)
1609 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
1610 else
1611 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
1612
1613 drbd_md_mark_dirty(mdev);
1614 drbd_md_sync(mdev);
1615
1616 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1617 put_ldev(mdev);
Philipp Reisner0e29d162011-02-18 14:23:11 +01001618 conn_reconfig_done(mdev->tconn);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001619 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001620 return 0;
1621
1622 force_diskless_dec:
1623 put_ldev(mdev);
1624 force_diskless:
Lars Ellenberg82f59cc2010-10-16 12:13:47 +02001625 drbd_force_state(mdev, NS(disk, D_FAILED));
Philipp Reisnerb411b362009-09-25 16:07:19 -07001626 drbd_md_sync(mdev);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001627 fail:
Lars Ellenberg40cbf082011-03-16 16:52:10 +01001628 conn_reconfig_done(mdev->tconn);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001629 if (nbc) {
Tejun Heoe525fd82010-11-13 11:55:17 +01001630 if (nbc->backing_bdev)
1631 blkdev_put(nbc->backing_bdev,
1632 FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1633 if (nbc->md_bdev)
1634 blkdev_put(nbc->md_bdev,
1635 FMODE_READ | FMODE_WRITE | FMODE_EXCL);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001636 kfree(nbc);
1637 }
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001638 kfree(new_disk_conf);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001639 lc_destroy(resync_lru);
Philipp Reisner9958c852011-05-03 16:19:31 +02001640 kfree(new_plan);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001641
Lars Ellenberg40cbf082011-03-16 16:52:10 +01001642 finish:
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001643 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001644 return 0;
1645}
1646
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01001647static int adm_detach(struct drbd_conf *mdev)
1648{
Philipp Reisner19f83c72011-03-29 14:21:03 +02001649 enum drbd_state_rv retcode;
Lars Ellenberg009ba892011-05-02 11:51:31 +02001650 int ret;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01001651 drbd_suspend_io(mdev); /* so no-one is stuck in drbd_al_begin_io */
Lars Ellenberg009ba892011-05-02 11:51:31 +02001652 retcode = drbd_request_state(mdev, NS(disk, D_FAILED));
1653 /* D_FAILED will transition to DISKLESS. */
1654 ret = wait_event_interruptible(mdev->misc_wait,
1655 mdev->state.disk != D_FAILED);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01001656 drbd_resume_io(mdev);
Lars Ellenberg009ba892011-05-02 11:51:31 +02001657 if ((int)retcode == (int)SS_IS_DISKLESS)
1658 retcode = SS_NOTHING_TO_DO;
1659 if (ret)
1660 retcode = ERR_INTR;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01001661 return retcode;
1662}
1663
Lars Ellenberg82f59cc2010-10-16 12:13:47 +02001664/* Detaching the disk is a process in multiple stages. First we need to lock
1665 * out application IO, in-flight IO, IO stuck in drbd_al_begin_io.
1666 * Then we transition to D_DISKLESS, and wait for put_ldev() to return all
1667 * internal references as well.
1668 * Only then we have finally detached. */
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001669int drbd_adm_detach(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07001670{
Lars Ellenberg9a0d9d02011-05-02 11:51:31 +02001671 enum drbd_ret_code retcode;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001672
1673 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1674 if (!adm_ctx.reply_skb)
1675 return retcode;
1676 if (retcode != NO_ERROR)
1677 goto out;
1678
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01001679 retcode = adm_detach(adm_ctx.mdev);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001680out:
1681 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07001682 return 0;
1683}
1684
Lars Ellenbergf3990022011-03-23 14:31:09 +01001685static bool conn_resync_running(struct drbd_tconn *tconn)
1686{
1687 struct drbd_conf *mdev;
Philipp Reisner695d08f2011-04-11 22:53:32 -07001688 bool rv = false;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001689 int vnr;
1690
Philipp Reisner695d08f2011-04-11 22:53:32 -07001691 rcu_read_lock();
Lars Ellenbergf3990022011-03-23 14:31:09 +01001692 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1693 if (mdev->state.conn == C_SYNC_SOURCE ||
1694 mdev->state.conn == C_SYNC_TARGET ||
1695 mdev->state.conn == C_PAUSED_SYNC_S ||
Philipp Reisner695d08f2011-04-11 22:53:32 -07001696 mdev->state.conn == C_PAUSED_SYNC_T) {
1697 rv = true;
1698 break;
1699 }
Lars Ellenbergf3990022011-03-23 14:31:09 +01001700 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07001701 rcu_read_unlock();
1702
1703 return rv;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001704}
1705
1706static bool conn_ov_running(struct drbd_tconn *tconn)
1707{
1708 struct drbd_conf *mdev;
Philipp Reisner695d08f2011-04-11 22:53:32 -07001709 bool rv = false;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001710 int vnr;
1711
Philipp Reisner695d08f2011-04-11 22:53:32 -07001712 rcu_read_lock();
Lars Ellenbergf3990022011-03-23 14:31:09 +01001713 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1714 if (mdev->state.conn == C_VERIFY_S ||
Philipp Reisner695d08f2011-04-11 22:53:32 -07001715 mdev->state.conn == C_VERIFY_T) {
1716 rv = true;
1717 break;
1718 }
Lars Ellenbergf3990022011-03-23 14:31:09 +01001719 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07001720 rcu_read_unlock();
1721
1722 return rv;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001723}
1724
Philipp Reisnercd643972011-04-13 18:00:59 -07001725static enum drbd_ret_code
Philipp Reisner44ed1672011-04-19 17:10:19 +02001726_check_net_options(struct drbd_tconn *tconn, struct net_conf *old_conf, struct net_conf *new_conf)
Philipp Reisnercd643972011-04-13 18:00:59 -07001727{
1728 struct drbd_conf *mdev;
1729 int i;
1730
Philipp Reisnerdcb20d12011-05-16 14:30:24 +02001731 if (old_conf && tconn->cstate == C_WF_REPORT_PARAMS && tconn->agreed_pro_version < 100) {
1732 if (new_conf->wire_protocol != old_conf->wire_protocol)
1733 return ERR_NEED_APV_100;
1734
1735 if (new_conf->two_primaries != old_conf->two_primaries)
1736 return ERR_NEED_APV_100;
1737
1738 if (!new_conf->integrity_alg != !old_conf->integrity_alg)
1739 return ERR_NEED_APV_100;
1740
1741 if (strcmp(new_conf->integrity_alg, old_conf->integrity_alg))
1742 return ERR_NEED_APV_100;
1743 }
1744
1745 if (!new_conf->two_primaries &&
1746 conn_highest_role(tconn) == R_PRIMARY &&
1747 conn_highest_peer(tconn) == R_PRIMARY)
1748 return ERR_NEED_ALLOW_TWO_PRI;
Philipp Reisnerb032b6f2011-04-13 18:16:10 -07001749
Philipp Reisnercd643972011-04-13 18:00:59 -07001750 if (new_conf->two_primaries &&
1751 (new_conf->wire_protocol != DRBD_PROT_C))
1752 return ERR_NOT_PROTO_C;
1753
Philipp Reisnercd643972011-04-13 18:00:59 -07001754 idr_for_each_entry(&tconn->volumes, mdev, i) {
1755 if (get_ldev(mdev)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001756 enum drbd_fencing_p fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
Philipp Reisnercd643972011-04-13 18:00:59 -07001757 put_ldev(mdev);
Philipp Reisner44ed1672011-04-19 17:10:19 +02001758 if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH)
Philipp Reisnercd643972011-04-13 18:00:59 -07001759 return ERR_STONITH_AND_PROT_A;
Philipp Reisnercd643972011-04-13 18:00:59 -07001760 }
Andreas Gruenbacher6139f602011-05-06 20:00:02 +02001761 if (mdev->state.role == R_PRIMARY && new_conf->discard_my_data)
Philipp Reisnercd643972011-04-13 18:00:59 -07001762 return ERR_DISCARD;
Philipp Reisnercd643972011-04-13 18:00:59 -07001763 }
Philipp Reisnercd643972011-04-13 18:00:59 -07001764
1765 if (new_conf->on_congestion != OC_BLOCK && new_conf->wire_protocol != DRBD_PROT_A)
1766 return ERR_CONG_NOT_PROTO_A;
1767
1768 return NO_ERROR;
1769}
1770
Philipp Reisner44ed1672011-04-19 17:10:19 +02001771static enum drbd_ret_code
1772check_net_options(struct drbd_tconn *tconn, struct net_conf *new_conf)
1773{
1774 static enum drbd_ret_code rv;
1775 struct drbd_conf *mdev;
1776 int i;
1777
1778 rcu_read_lock();
1779 rv = _check_net_options(tconn, rcu_dereference(tconn->net_conf), new_conf);
1780 rcu_read_unlock();
1781
1782 /* tconn->volumes protected by genl_lock() here */
1783 idr_for_each_entry(&tconn->volumes, mdev, i) {
1784 if (!mdev->bitmap) {
1785 if(drbd_bm_init(mdev))
1786 return ERR_NOMEM;
1787 }
1788 }
1789
1790 return rv;
1791}
1792
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001793struct crypto {
1794 struct crypto_hash *verify_tfm;
1795 struct crypto_hash *csums_tfm;
1796 struct crypto_hash *cram_hmac_tfm;
Andreas Gruenbacher8d412fc2011-04-27 20:59:18 +02001797 struct crypto_hash *integrity_tfm;
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001798 void *int_dig_in;
1799 void *int_dig_vv;
1800};
1801
1802static int
Andreas Gruenbacher4b6ad6d2011-04-29 10:20:08 +02001803alloc_hash(struct crypto_hash **tfm, char *tfm_name, int err_alg)
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001804{
1805 if (!tfm_name[0])
1806 return NO_ERROR;
1807
1808 *tfm = crypto_alloc_hash(tfm_name, 0, CRYPTO_ALG_ASYNC);
1809 if (IS_ERR(*tfm)) {
1810 *tfm = NULL;
1811 return err_alg;
1812 }
1813
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001814 return NO_ERROR;
1815}
1816
1817static enum drbd_ret_code
1818alloc_crypto(struct crypto *crypto, struct net_conf *new_conf)
1819{
1820 char hmac_name[CRYPTO_MAX_ALG_NAME];
1821 enum drbd_ret_code rv;
1822 int hash_size;
1823
Andreas Gruenbacher4b6ad6d2011-04-29 10:20:08 +02001824 rv = alloc_hash(&crypto->csums_tfm, new_conf->csums_alg,
1825 ERR_CSUMS_ALG);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001826 if (rv != NO_ERROR)
1827 return rv;
Andreas Gruenbacher4b6ad6d2011-04-29 10:20:08 +02001828 rv = alloc_hash(&crypto->verify_tfm, new_conf->verify_alg,
1829 ERR_VERIFY_ALG);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001830 if (rv != NO_ERROR)
1831 return rv;
Andreas Gruenbacher4b6ad6d2011-04-29 10:20:08 +02001832 rv = alloc_hash(&crypto->integrity_tfm, new_conf->integrity_alg,
1833 ERR_INTEGRITY_ALG);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001834 if (rv != NO_ERROR)
1835 return rv;
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001836 if (new_conf->cram_hmac_alg[0] != 0) {
1837 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
1838 new_conf->cram_hmac_alg);
1839
Andreas Gruenbacher4b6ad6d2011-04-29 10:20:08 +02001840 rv = alloc_hash(&crypto->cram_hmac_tfm, hmac_name,
1841 ERR_AUTH_ALG);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001842 }
Andreas Gruenbacher8d412fc2011-04-27 20:59:18 +02001843 if (crypto->integrity_tfm) {
1844 hash_size = crypto_hash_digestsize(crypto->integrity_tfm);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001845 crypto->int_dig_in = kmalloc(hash_size, GFP_KERNEL);
1846 if (!crypto->int_dig_in)
1847 return ERR_NOMEM;
1848 crypto->int_dig_vv = kmalloc(hash_size, GFP_KERNEL);
1849 if (!crypto->int_dig_vv)
1850 return ERR_NOMEM;
1851 }
1852
1853 return rv;
1854}
1855
1856static void free_crypto(struct crypto *crypto)
1857{
1858 kfree(crypto->int_dig_in);
1859 kfree(crypto->int_dig_vv);
1860 crypto_free_hash(crypto->cram_hmac_tfm);
Andreas Gruenbacher8d412fc2011-04-27 20:59:18 +02001861 crypto_free_hash(crypto->integrity_tfm);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001862 crypto_free_hash(crypto->csums_tfm);
1863 crypto_free_hash(crypto->verify_tfm);
1864}
1865
Lars Ellenbergf3990022011-03-23 14:31:09 +01001866int drbd_adm_net_opts(struct sk_buff *skb, struct genl_info *info)
1867{
1868 enum drbd_ret_code retcode;
1869 struct drbd_tconn *tconn;
Philipp Reisner44ed1672011-04-19 17:10:19 +02001870 struct net_conf *old_conf, *new_conf = NULL;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001871 int err;
1872 int ovr; /* online verify running */
1873 int rsr; /* re-sync running */
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001874 struct crypto crypto = { };
Lars Ellenbergf3990022011-03-23 14:31:09 +01001875
1876 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
1877 if (!adm_ctx.reply_skb)
1878 return retcode;
1879 if (retcode != NO_ERROR)
1880 goto out;
1881
1882 tconn = adm_ctx.tconn;
1883
1884 new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
1885 if (!new_conf) {
1886 retcode = ERR_NOMEM;
1887 goto out;
1888 }
1889
Lars Ellenbergf3990022011-03-23 14:31:09 +01001890 conn_reconfig_start(tconn);
1891
Andreas Gruenbacher88104ca2011-04-28 21:47:21 +02001892 mutex_lock(&tconn->data.mutex);
Philipp Reisnera0095502011-05-03 13:14:15 +02001893 mutex_lock(&tconn->conf_update);
Philipp Reisner91fd4da2011-04-20 17:47:29 +02001894 old_conf = tconn->net_conf;
Philipp Reisner44ed1672011-04-19 17:10:19 +02001895
1896 if (!old_conf) {
1897 drbd_msg_put_info("net conf missing, try connect");
1898 retcode = ERR_INVALID_REQUEST;
Philipp Reisner91fd4da2011-04-20 17:47:29 +02001899 goto fail;
Philipp Reisner44ed1672011-04-19 17:10:19 +02001900 }
1901
1902 *new_conf = *old_conf;
Lars Ellenberg5979e362011-04-27 21:09:55 +02001903 if (should_set_defaults(info))
Andreas Gruenbacherb966b5d2011-05-03 14:56:09 +02001904 set_net_conf_defaults(new_conf);
Philipp Reisner44ed1672011-04-19 17:10:19 +02001905
Lars Ellenbergf3990022011-03-23 14:31:09 +01001906 err = net_conf_from_attrs_for_change(new_conf, info);
Andreas Gruenbacherc75b9b12011-05-24 14:18:31 +02001907 if (err && err != -ENOMSG) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01001908 retcode = ERR_MANDATORY_TAG;
1909 drbd_msg_put_info(from_attrs_err_to_txt(err));
1910 goto fail;
1911 }
1912
Philipp Reisnercd643972011-04-13 18:00:59 -07001913 retcode = check_net_options(tconn, new_conf);
1914 if (retcode != NO_ERROR)
1915 goto fail;
1916
Lars Ellenbergf3990022011-03-23 14:31:09 +01001917 /* re-sync running */
1918 rsr = conn_resync_running(tconn);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001919 if (rsr && strcmp(new_conf->csums_alg, old_conf->csums_alg)) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01001920 retcode = ERR_CSUMS_RESYNC_RUNNING;
Philipp Reisner91fd4da2011-04-20 17:47:29 +02001921 goto fail;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001922 }
1923
Lars Ellenbergf3990022011-03-23 14:31:09 +01001924 /* online verify running */
1925 ovr = conn_ov_running(tconn);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001926 if (ovr && strcmp(new_conf->verify_alg, old_conf->verify_alg)) {
1927 retcode = ERR_VERIFY_RUNNING;
1928 goto fail;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001929 }
1930
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001931 retcode = alloc_crypto(&crypto, new_conf);
1932 if (retcode != NO_ERROR)
1933 goto fail;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001934
Philipp Reisner44ed1672011-04-19 17:10:19 +02001935 rcu_assign_pointer(tconn->net_conf, new_conf);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001936
1937 if (!rsr) {
1938 crypto_free_hash(tconn->csums_tfm);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001939 tconn->csums_tfm = crypto.csums_tfm;
1940 crypto.csums_tfm = NULL;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001941 }
1942 if (!ovr) {
1943 crypto_free_hash(tconn->verify_tfm);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001944 tconn->verify_tfm = crypto.verify_tfm;
1945 crypto.verify_tfm = NULL;
Lars Ellenbergf3990022011-03-23 14:31:09 +01001946 }
1947
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001948 kfree(tconn->int_dig_in);
1949 tconn->int_dig_in = crypto.int_dig_in;
1950 kfree(tconn->int_dig_vv);
1951 tconn->int_dig_vv = crypto.int_dig_vv;
Andreas Gruenbacher8d412fc2011-04-27 20:59:18 +02001952 crypto_free_hash(tconn->integrity_tfm);
1953 tconn->integrity_tfm = crypto.integrity_tfm;
Philipp Reisnerd659f2a2011-05-16 17:38:45 +02001954 if (tconn->cstate >= C_WF_REPORT_PARAMS && tconn->agreed_pro_version >= 100)
Andreas Gruenbacher88104ca2011-04-28 21:47:21 +02001955 /* Do this without trying to take tconn->data.mutex again. */
Philipp Reisnerd659f2a2011-05-16 17:38:45 +02001956 __drbd_send_protocol(tconn, P_PROTOCOL_UPDATE);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001957
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001958 crypto_free_hash(tconn->cram_hmac_tfm);
1959 tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
1960
Philipp Reisnera0095502011-05-03 13:14:15 +02001961 mutex_unlock(&tconn->conf_update);
Andreas Gruenbacher88104ca2011-04-28 21:47:21 +02001962 mutex_unlock(&tconn->data.mutex);
Philipp Reisner91fd4da2011-04-20 17:47:29 +02001963 synchronize_rcu();
1964 kfree(old_conf);
1965
Lars Ellenbergf3990022011-03-23 14:31:09 +01001966 if (tconn->cstate >= C_WF_REPORT_PARAMS)
1967 drbd_send_sync_param(minor_to_mdev(conn_lowest_minor(tconn)));
1968
Philipp Reisner91fd4da2011-04-20 17:47:29 +02001969 goto done;
1970
Lars Ellenbergf3990022011-03-23 14:31:09 +01001971 fail:
Philipp Reisnera0095502011-05-03 13:14:15 +02001972 mutex_unlock(&tconn->conf_update);
Andreas Gruenbacher88104ca2011-04-28 21:47:21 +02001973 mutex_unlock(&tconn->data.mutex);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001974 free_crypto(&crypto);
Lars Ellenbergf3990022011-03-23 14:31:09 +01001975 kfree(new_conf);
Philipp Reisner91fd4da2011-04-20 17:47:29 +02001976 done:
Lars Ellenbergf3990022011-03-23 14:31:09 +01001977 conn_reconfig_done(tconn);
1978 out:
1979 drbd_adm_finish(info, retcode);
1980 return 0;
1981}
1982
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001983int drbd_adm_connect(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07001984{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001985 struct drbd_conf *mdev;
Philipp Reisner44ed1672011-04-19 17:10:19 +02001986 struct net_conf *old_conf, *new_conf = NULL;
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02001987 struct crypto crypto = { };
Philipp Reisner80883192011-02-18 14:56:45 +01001988 struct drbd_tconn *oconn;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001989 struct drbd_tconn *tconn;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001990 struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001991 enum drbd_ret_code retcode;
1992 int i;
1993 int err;
Philipp Reisnerb411b362009-09-25 16:07:19 -07001994
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001995 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
1996 if (!adm_ctx.reply_skb)
1997 return retcode;
1998 if (retcode != NO_ERROR)
1999 goto out;
2000
2001 tconn = adm_ctx.tconn;
Philipp Reisner80883192011-02-18 14:56:45 +01002002 conn_reconfig_start(tconn);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002003
Philipp Reisner80883192011-02-18 14:56:45 +01002004 if (tconn->cstate > C_STANDALONE) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07002005 retcode = ERR_NET_CONFIGURED;
2006 goto fail;
2007 }
2008
2009 /* allocation not in the IO path, cqueue thread context */
Lars Ellenberg5979e362011-04-27 21:09:55 +02002010 new_conf = kzalloc(sizeof(*new_conf), GFP_KERNEL);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002011 if (!new_conf) {
2012 retcode = ERR_NOMEM;
2013 goto fail;
2014 }
2015
Andreas Gruenbacherb966b5d2011-05-03 14:56:09 +02002016 set_net_conf_defaults(new_conf);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002017
Lars Ellenbergf3990022011-03-23 14:31:09 +01002018 err = net_conf_from_attrs(new_conf, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002019 if (err) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07002020 retcode = ERR_MANDATORY_TAG;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002021 drbd_msg_put_info(from_attrs_err_to_txt(err));
Philipp Reisnerb411b362009-09-25 16:07:19 -07002022 goto fail;
2023 }
2024
Philipp Reisnercd643972011-04-13 18:00:59 -07002025 retcode = check_net_options(tconn, new_conf);
2026 if (retcode != NO_ERROR)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002027 goto fail;
Philipp Reisner422028b2010-10-27 11:12:07 +02002028
Philipp Reisnerb411b362009-09-25 16:07:19 -07002029 retcode = NO_ERROR;
2030
2031 new_my_addr = (struct sockaddr *)&new_conf->my_addr;
2032 new_peer_addr = (struct sockaddr *)&new_conf->peer_addr;
Lars Ellenberg543cc102011-03-10 22:18:18 +01002033
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02002034 /* No need for _rcu here. All reconfiguration is
Lars Ellenberg543cc102011-03-10 22:18:18 +01002035 * strictly serialized on genl_lock(). We are protected against
2036 * concurrent reconfiguration/addition/deletion */
Philipp Reisner80883192011-02-18 14:56:45 +01002037 list_for_each_entry(oconn, &drbd_tconns, all_tconn) {
Philipp Reisner44ed1672011-04-19 17:10:19 +02002038 struct net_conf *nc;
Philipp Reisner80883192011-02-18 14:56:45 +01002039 if (oconn == tconn)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002040 continue;
Philipp Reisner44ed1672011-04-19 17:10:19 +02002041
2042 rcu_read_lock();
2043 nc = rcu_dereference(oconn->net_conf);
2044 if (nc) {
2045 taken_addr = (struct sockaddr *)&nc->my_addr;
2046 if (new_conf->my_addr_len == nc->my_addr_len &&
Philipp Reisnerb411b362009-09-25 16:07:19 -07002047 !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len))
2048 retcode = ERR_LOCAL_ADDR;
2049
Philipp Reisner44ed1672011-04-19 17:10:19 +02002050 taken_addr = (struct sockaddr *)&nc->peer_addr;
2051 if (new_conf->peer_addr_len == nc->peer_addr_len &&
Philipp Reisnerb411b362009-09-25 16:07:19 -07002052 !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len))
2053 retcode = ERR_PEER_ADDR;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002054 }
Philipp Reisner44ed1672011-04-19 17:10:19 +02002055 rcu_read_unlock();
2056 if (retcode != NO_ERROR)
2057 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002058 }
2059
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02002060 retcode = alloc_crypto(&crypto, new_conf);
2061 if (retcode != NO_ERROR)
2062 goto fail;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002063
Philipp Reisnerb411b362009-09-25 16:07:19 -07002064 ((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
2065
Philipp Reisner80883192011-02-18 14:56:45 +01002066 conn_flush_workqueue(tconn);
Philipp Reisner91fd4da2011-04-20 17:47:29 +02002067
Philipp Reisnera0095502011-05-03 13:14:15 +02002068 mutex_lock(&tconn->conf_update);
Philipp Reisner91fd4da2011-04-20 17:47:29 +02002069 old_conf = tconn->net_conf;
2070 if (old_conf) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07002071 retcode = ERR_NET_CONFIGURED;
Philipp Reisnera0095502011-05-03 13:14:15 +02002072 mutex_unlock(&tconn->conf_update);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002073 goto fail;
2074 }
Philipp Reisner44ed1672011-04-19 17:10:19 +02002075 rcu_assign_pointer(tconn->net_conf, new_conf);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002076
Philipp Reisner91fd4da2011-04-20 17:47:29 +02002077 conn_free_crypto(tconn);
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02002078 tconn->int_dig_in = crypto.int_dig_in;
2079 tconn->int_dig_vv = crypto.int_dig_vv;
2080 tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
Andreas Gruenbacher8d412fc2011-04-27 20:59:18 +02002081 tconn->integrity_tfm = crypto.integrity_tfm;
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02002082 tconn->csums_tfm = crypto.csums_tfm;
2083 tconn->verify_tfm = crypto.verify_tfm;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002084
Philipp Reisnera0095502011-05-03 13:14:15 +02002085 mutex_unlock(&tconn->conf_update);
Philipp Reisner91fd4da2011-04-20 17:47:29 +02002086
Philipp Reisner695d08f2011-04-11 22:53:32 -07002087 rcu_read_lock();
Philipp Reisner80883192011-02-18 14:56:45 +01002088 idr_for_each_entry(&tconn->volumes, mdev, i) {
2089 mdev->send_cnt = 0;
2090 mdev->recv_cnt = 0;
Philipp Reisner80883192011-02-18 14:56:45 +01002091 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07002092 rcu_read_unlock();
Lars Ellenberg5ee743e2011-04-26 16:22:25 +02002093
2094 retcode = conn_request_state(tconn, NS(conn, C_UNCONNECTED), CS_VERBOSE);
2095
Philipp Reisner80883192011-02-18 14:56:45 +01002096 conn_reconfig_done(tconn);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002097 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002098 return 0;
2099
2100fail:
Philipp Reisner0fd0ea02011-04-27 11:27:47 +02002101 free_crypto(&crypto);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002102 kfree(new_conf);
2103
Philipp Reisner80883192011-02-18 14:56:45 +01002104 conn_reconfig_done(tconn);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002105out:
2106 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002107 return 0;
2108}
2109
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002110static enum drbd_state_rv conn_try_disconnect(struct drbd_tconn *tconn, bool force)
2111{
2112 enum drbd_state_rv rv;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002113
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02002114 rv = conn_request_state(tconn, NS(conn, C_DISCONNECTING),
2115 force ? CS_HARD : 0);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002116
2117 switch (rv) {
2118 case SS_NOTHING_TO_DO:
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02002119 break;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002120 case SS_ALREADY_STANDALONE:
2121 return SS_SUCCESS;
2122 case SS_PRIMARY_NOP:
2123 /* Our state checking code wants to see the peer outdated. */
2124 rv = conn_request_state(tconn, NS2(conn, C_DISCONNECTING,
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02002125 pdsk, D_OUTDATED), CS_VERBOSE);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002126 break;
2127 case SS_CW_FAILED_BY_PEER:
2128 /* The peer probably wants to see us outdated. */
2129 rv = conn_request_state(tconn, NS2(conn, C_DISCONNECTING,
2130 disk, D_OUTDATED), 0);
2131 if (rv == SS_IS_DISKLESS || rv == SS_LOWER_THAN_OUTDATED) {
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02002132 rv = conn_request_state(tconn, NS(conn, C_DISCONNECTING),
2133 CS_HARD);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002134 }
2135 break;
2136 default:;
2137 /* no special handling necessary */
2138 }
2139
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02002140 if (rv >= SS_SUCCESS) {
2141 enum drbd_state_rv rv2;
2142 /* No one else can reconfigure the network while I am here.
2143 * The state handling only uses drbd_thread_stop_nowait(),
2144 * we want to really wait here until the receiver is no more.
2145 */
2146 drbd_thread_stop(&adm_ctx.tconn->receiver);
2147
2148 /* Race breaker. This additional state change request may be
2149 * necessary, if this was a forced disconnect during a receiver
2150 * restart. We may have "killed" the receiver thread just
2151 * after drbdd_init() returned. Typically, we should be
2152 * C_STANDALONE already, now, and this becomes a no-op.
2153 */
2154 rv2 = conn_request_state(tconn, NS(conn, C_STANDALONE),
2155 CS_VERBOSE | CS_HARD);
2156 if (rv2 < SS_SUCCESS)
2157 conn_err(tconn,
2158 "unexpected rv2=%d in conn_try_disconnect()\n",
2159 rv2);
2160 }
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002161 return rv;
2162}
2163
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002164int drbd_adm_disconnect(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002165{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002166 struct disconnect_parms parms;
2167 struct drbd_tconn *tconn;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002168 enum drbd_state_rv rv;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002169 enum drbd_ret_code retcode;
2170 int err;
Philipp Reisner2561b9c2010-12-03 15:22:48 +01002171
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002172 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
2173 if (!adm_ctx.reply_skb)
2174 return retcode;
2175 if (retcode != NO_ERROR)
Philipp Reisner2561b9c2010-12-03 15:22:48 +01002176 goto fail;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002177
2178 tconn = adm_ctx.tconn;
2179 memset(&parms, 0, sizeof(parms));
2180 if (info->attrs[DRBD_NLA_DISCONNECT_PARMS]) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01002181 err = disconnect_parms_from_attrs(&parms, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002182 if (err) {
2183 retcode = ERR_MANDATORY_TAG;
2184 drbd_msg_put_info(from_attrs_err_to_txt(err));
2185 goto fail;
2186 }
Philipp Reisner2561b9c2010-12-03 15:22:48 +01002187 }
2188
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01002189 rv = conn_try_disconnect(tconn, parms.force_disconnect);
2190 if (rv < SS_SUCCESS)
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02002191 retcode = rv; /* FIXME: Type mismatch. */
2192 else
2193 retcode = NO_ERROR;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002194 fail:
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002195 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002196 return 0;
2197}
2198
2199void resync_after_online_grow(struct drbd_conf *mdev)
2200{
2201 int iass; /* I am sync source */
2202
2203 dev_info(DEV, "Resync of new storage after online grow\n");
2204 if (mdev->state.role != mdev->state.peer)
2205 iass = (mdev->state.role == R_PRIMARY);
2206 else
Philipp Reisner25703f82011-02-07 14:35:25 +01002207 iass = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002208
2209 if (iass)
2210 drbd_start_resync(mdev, C_SYNC_SOURCE);
2211 else
2212 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
2213}
2214
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002215int drbd_adm_resize(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002216{
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02002217 struct disk_conf *old_disk_conf, *new_disk_conf = NULL;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002218 struct resize_parms rs;
2219 struct drbd_conf *mdev;
2220 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002221 enum determine_dev_size dd;
Philipp Reisner6495d2c2010-03-24 16:07:04 +01002222 enum dds_flags ddsf;
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02002223 sector_t u_size;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002224 int err;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002225
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002226 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2227 if (!adm_ctx.reply_skb)
2228 return retcode;
2229 if (retcode != NO_ERROR)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002230 goto fail;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002231
2232 memset(&rs, 0, sizeof(struct resize_parms));
2233 if (info->attrs[DRBD_NLA_RESIZE_PARMS]) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01002234 err = resize_parms_from_attrs(&rs, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002235 if (err) {
2236 retcode = ERR_MANDATORY_TAG;
2237 drbd_msg_put_info(from_attrs_err_to_txt(err));
2238 goto fail;
2239 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07002240 }
2241
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002242 mdev = adm_ctx.mdev;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002243 if (mdev->state.conn > C_CONNECTED) {
2244 retcode = ERR_RESIZE_RESYNC;
2245 goto fail;
2246 }
2247
2248 if (mdev->state.role == R_SECONDARY &&
2249 mdev->state.peer == R_SECONDARY) {
2250 retcode = ERR_NO_PRIMARY;
2251 goto fail;
2252 }
2253
2254 if (!get_ldev(mdev)) {
2255 retcode = ERR_NO_DISK;
2256 goto fail;
2257 }
2258
Philipp Reisner31890f42011-01-19 14:12:51 +01002259 if (rs.no_resync && mdev->tconn->agreed_pro_version < 93) {
Philipp Reisner6495d2c2010-03-24 16:07:04 +01002260 retcode = ERR_NEED_APV_93;
2261 goto fail;
2262 }
2263
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02002264 rcu_read_lock();
2265 u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
2266 rcu_read_unlock();
2267 if (u_size != (sector_t)rs.resize_size) {
2268 new_disk_conf = kmalloc(sizeof(struct disk_conf), GFP_KERNEL);
2269 if (!new_disk_conf) {
2270 retcode = ERR_NOMEM;
2271 goto fail;
2272 }
2273 }
2274
Philipp Reisner087c2492010-03-26 13:49:56 +01002275 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev))
Philipp Reisnerb411b362009-09-25 16:07:19 -07002276 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002277
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02002278 if (new_disk_conf) {
2279 mutex_lock(&mdev->tconn->conf_update);
2280 old_disk_conf = mdev->ldev->disk_conf;
2281 *new_disk_conf = *old_disk_conf;
2282 new_disk_conf->disk_size = (sector_t)rs.resize_size;
2283 rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
2284 mutex_unlock(&mdev->tconn->conf_update);
2285 synchronize_rcu();
2286 kfree(old_disk_conf);
2287 }
2288
Philipp Reisner6495d2c2010-03-24 16:07:04 +01002289 ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0);
Bart Van Assche24c48302011-05-21 18:32:29 +02002290 dd = drbd_determine_dev_size(mdev, ddsf);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002291 drbd_md_sync(mdev);
2292 put_ldev(mdev);
2293 if (dd == dev_size_error) {
2294 retcode = ERR_NOMEM_BITMAP;
2295 goto fail;
2296 }
2297
Philipp Reisner087c2492010-03-26 13:49:56 +01002298 if (mdev->state.conn == C_CONNECTED) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07002299 if (dd == grew)
2300 set_bit(RESIZE_PENDING, &mdev->flags);
2301
2302 drbd_send_uuids(mdev);
Philipp Reisner6495d2c2010-03-24 16:07:04 +01002303 drbd_send_sizes(mdev, 1, ddsf);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002304 }
2305
2306 fail:
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002307 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002308 return 0;
2309}
2310
Andreas Gruenbacherb966b5d2011-05-03 14:56:09 +02002311void drbd_set_res_opts_defaults(struct res_opts *r)
2312{
2313 return set_res_opts_defaults(r);
2314}
2315
Lars Ellenbergf3990022011-03-23 14:31:09 +01002316int drbd_adm_resource_opts(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002317{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002318 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002319 cpumask_var_t new_cpu_mask;
Lars Ellenbergf3990022011-03-23 14:31:09 +01002320 struct drbd_tconn *tconn;
Lars Ellenbergb57a1e22011-04-27 21:17:33 +02002321 struct res_opts res_opts;
Lars Ellenbergf3990022011-03-23 14:31:09 +01002322 int err;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002323
Lars Ellenbergf3990022011-03-23 14:31:09 +01002324 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002325 if (!adm_ctx.reply_skb)
2326 return retcode;
2327 if (retcode != NO_ERROR)
2328 goto fail;
Lars Ellenbergf3990022011-03-23 14:31:09 +01002329 tconn = adm_ctx.tconn;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002330
Philipp Reisnerb411b362009-09-25 16:07:19 -07002331 if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) {
2332 retcode = ERR_NOMEM;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002333 drbd_msg_put_info("unable to allocate cpumask");
Philipp Reisnerb411b362009-09-25 16:07:19 -07002334 goto fail;
2335 }
2336
Lars Ellenbergb57a1e22011-04-27 21:17:33 +02002337 res_opts = tconn->res_opts;
Lars Ellenberg5979e362011-04-27 21:09:55 +02002338 if (should_set_defaults(info))
Andreas Gruenbacherb966b5d2011-05-03 14:56:09 +02002339 set_res_opts_defaults(&res_opts);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002340
Lars Ellenbergb57a1e22011-04-27 21:17:33 +02002341 err = res_opts_from_attrs(&res_opts, info);
Andreas Gruenbacherc75b9b12011-05-24 14:18:31 +02002342 if (err && err != -ENOMSG) {
Philipp Reisnerb411b362009-09-25 16:07:19 -07002343 retcode = ERR_MANDATORY_TAG;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002344 drbd_msg_put_info(from_attrs_err_to_txt(err));
Philipp Reisnerb411b362009-09-25 16:07:19 -07002345 goto fail;
2346 }
2347
Philipp Reisnerb411b362009-09-25 16:07:19 -07002348 /* silently ignore cpu mask on UP kernel */
Lars Ellenbergb57a1e22011-04-27 21:17:33 +02002349 if (nr_cpu_ids > 1 && res_opts.cpu_mask[0] != 0) {
2350 err = __bitmap_parse(res_opts.cpu_mask, 32, 0,
Philipp Reisnerb411b362009-09-25 16:07:19 -07002351 cpumask_bits(new_cpu_mask), nr_cpu_ids);
2352 if (err) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01002353 conn_warn(tconn, "__bitmap_parse() failed with %d\n", err);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002354 retcode = ERR_CPU_MASK_PARSE;
2355 goto fail;
2356 }
2357 }
2358
Lars Ellenberg7ad651b2011-02-21 13:21:03 +01002359
Lars Ellenbergb57a1e22011-04-27 21:17:33 +02002360 tconn->res_opts = res_opts;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002361
Lars Ellenbergf3990022011-03-23 14:31:09 +01002362 if (!cpumask_equal(tconn->cpu_mask, new_cpu_mask)) {
2363 cpumask_copy(tconn->cpu_mask, new_cpu_mask);
2364 drbd_calc_cpu_mask(tconn);
2365 tconn->receiver.reset_cpu_mask = 1;
2366 tconn->asender.reset_cpu_mask = 1;
2367 tconn->worker.reset_cpu_mask = 1;
Philipp Reisner778f2712010-07-06 11:14:00 +02002368 }
2369
Philipp Reisnerb411b362009-09-25 16:07:19 -07002370fail:
2371 free_cpumask_var(new_cpu_mask);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002372
2373 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002374 return 0;
2375}
2376
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002377int drbd_adm_invalidate(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002378{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002379 struct drbd_conf *mdev;
2380 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
2381
2382 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2383 if (!adm_ctx.reply_skb)
2384 return retcode;
2385 if (retcode != NO_ERROR)
2386 goto out;
2387
2388 mdev = adm_ctx.mdev;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002389
Lars Ellenberg194bfb32011-01-18 10:38:01 +01002390 /* If there is still bitmap IO pending, probably because of a previous
2391 * resync just being finished, wait for it before requesting a new resync. */
2392 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
2393
Philipp Reisnerb411b362009-09-25 16:07:19 -07002394 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
2395
2396 if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
2397 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
2398
2399 while (retcode == SS_NEED_CONNECTION) {
Philipp Reisner87eeee42011-01-19 14:16:30 +01002400 spin_lock_irq(&mdev->tconn->req_lock);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002401 if (mdev->state.conn < C_CONNECTED)
2402 retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
Philipp Reisner87eeee42011-01-19 14:16:30 +01002403 spin_unlock_irq(&mdev->tconn->req_lock);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002404
2405 if (retcode != SS_NEED_CONNECTION)
2406 break;
2407
2408 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
2409 }
2410
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002411out:
2412 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002413 return 0;
2414}
2415
Philipp Reisner07782862010-08-31 12:00:50 +02002416static int drbd_bmio_set_susp_al(struct drbd_conf *mdev)
2417{
2418 int rv;
2419
2420 rv = drbd_bmio_set_n_write(mdev);
2421 drbd_suspend_al(mdev);
2422 return rv;
2423}
2424
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002425static int drbd_adm_simple_request_state(struct sk_buff *skb, struct genl_info *info,
2426 union drbd_state mask, union drbd_state val)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002427{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002428 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002429
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002430 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2431 if (!adm_ctx.reply_skb)
2432 return retcode;
2433 if (retcode != NO_ERROR)
2434 goto out;
Lars Ellenberg194bfb32011-01-18 10:38:01 +01002435
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002436 retcode = drbd_request_state(adm_ctx.mdev, mask, val);
2437out:
2438 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002439 return 0;
2440}
2441
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002442int drbd_adm_invalidate_peer(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002443{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002444 return drbd_adm_simple_request_state(skb, info, NS(conn, C_STARTING_SYNC_S));
2445}
Philipp Reisnerb411b362009-09-25 16:07:19 -07002446
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002447int drbd_adm_pause_sync(struct sk_buff *skb, struct genl_info *info)
2448{
2449 enum drbd_ret_code retcode;
2450
2451 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2452 if (!adm_ctx.reply_skb)
2453 return retcode;
2454 if (retcode != NO_ERROR)
2455 goto out;
2456
2457 if (drbd_request_state(adm_ctx.mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002458 retcode = ERR_PAUSE_IS_SET;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002459out:
2460 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002461 return 0;
2462}
2463
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002464int drbd_adm_resume_sync(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002465{
Philipp Reisnerda9fbc22011-03-29 10:52:01 +02002466 union drbd_dev_state s;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002467 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002468
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002469 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2470 if (!adm_ctx.reply_skb)
2471 return retcode;
2472 if (retcode != NO_ERROR)
2473 goto out;
2474
2475 if (drbd_request_state(adm_ctx.mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO) {
2476 s = adm_ctx.mdev->state;
Philipp Reisnercd88d032011-01-20 11:46:41 +01002477 if (s.conn == C_PAUSED_SYNC_S || s.conn == C_PAUSED_SYNC_T) {
2478 retcode = s.aftr_isp ? ERR_PIC_AFTER_DEP :
2479 s.peer_isp ? ERR_PIC_PEER_DEP : ERR_PAUSE_IS_CLEAR;
2480 } else {
2481 retcode = ERR_PAUSE_IS_CLEAR;
2482 }
2483 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07002484
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002485out:
2486 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002487 return 0;
2488}
2489
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002490int drbd_adm_suspend_io(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002491{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002492 return drbd_adm_simple_request_state(skb, info, NS(susp, 1));
Philipp Reisnerb411b362009-09-25 16:07:19 -07002493}
2494
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002495int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002496{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002497 struct drbd_conf *mdev;
2498 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
2499
2500 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2501 if (!adm_ctx.reply_skb)
2502 return retcode;
2503 if (retcode != NO_ERROR)
2504 goto out;
2505
2506 mdev = adm_ctx.mdev;
Philipp Reisner43a51822010-06-11 11:26:34 +02002507 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
2508 drbd_uuid_new_current(mdev);
2509 clear_bit(NEW_CUR_UUID, &mdev->flags);
Philipp Reisner43a51822010-06-11 11:26:34 +02002510 }
Philipp Reisner265be2d2010-05-31 10:14:17 +02002511 drbd_suspend_io(mdev);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002512 retcode = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0));
2513 if (retcode == SS_SUCCESS) {
Philipp Reisner265be2d2010-05-31 10:14:17 +02002514 if (mdev->state.conn < C_CONNECTED)
Philipp Reisner2f5cdd02011-02-21 14:29:27 +01002515 tl_clear(mdev->tconn);
Philipp Reisner265be2d2010-05-31 10:14:17 +02002516 if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED)
Philipp Reisner2f5cdd02011-02-21 14:29:27 +01002517 tl_restart(mdev->tconn, FAIL_FROZEN_DISK_IO);
Philipp Reisner265be2d2010-05-31 10:14:17 +02002518 }
2519 drbd_resume_io(mdev);
2520
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002521out:
2522 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002523 return 0;
2524}
2525
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002526int drbd_adm_outdate(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002527{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002528 return drbd_adm_simple_request_state(skb, info, NS(disk, D_OUTDATED));
Philipp Reisnerb411b362009-09-25 16:07:19 -07002529}
2530
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002531int nla_put_drbd_cfg_context(struct sk_buff *skb, const char *resource_name, unsigned vnr)
Lars Ellenberg543cc102011-03-10 22:18:18 +01002532{
2533 struct nlattr *nla;
2534 nla = nla_nest_start(skb, DRBD_NLA_CFG_CONTEXT);
2535 if (!nla)
2536 goto nla_put_failure;
2537 if (vnr != VOLUME_UNSPECIFIED)
2538 NLA_PUT_U32(skb, T_ctx_volume, vnr);
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002539 NLA_PUT_STRING(skb, T_ctx_resource_name, resource_name);
Lars Ellenberg543cc102011-03-10 22:18:18 +01002540 nla_nest_end(skb, nla);
2541 return 0;
2542
2543nla_put_failure:
2544 if (nla)
2545 nla_nest_cancel(skb, nla);
2546 return -EMSGSIZE;
2547}
2548
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002549int nla_put_status_info(struct sk_buff *skb, struct drbd_conf *mdev,
2550 const struct sib_info *sib)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002551{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002552 struct state_info *si = NULL; /* for sizeof(si->member); */
Philipp Reisner44ed1672011-04-19 17:10:19 +02002553 struct net_conf *nc;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002554 struct nlattr *nla;
2555 int got_ldev;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002556 int err = 0;
2557 int exclude_sensitive;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002558
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002559 /* If sib != NULL, this is drbd_bcast_event, which anyone can listen
2560 * to. So we better exclude_sensitive information.
2561 *
2562 * If sib == NULL, this is drbd_adm_get_status, executed synchronously
2563 * in the context of the requesting user process. Exclude sensitive
2564 * information, unless current has superuser.
2565 *
2566 * NOTE: for drbd_adm_get_status_all(), this is a netlink dump, and
2567 * relies on the current implementation of netlink_dump(), which
2568 * executes the dump callback successively from netlink_recvmsg(),
2569 * always in the context of the receiving process */
2570 exclude_sensitive = sib || !capable(CAP_SYS_ADMIN);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002571
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002572 got_ldev = get_ldev(mdev);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002573
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002574 /* We need to add connection name and volume number information still.
2575 * Minor number is in drbd_genlmsghdr. */
Lars Ellenberg543cc102011-03-10 22:18:18 +01002576 if (nla_put_drbd_cfg_context(skb, mdev->tconn->name, mdev->vnr))
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002577 goto nla_put_failure;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002578
Lars Ellenbergf3990022011-03-23 14:31:09 +01002579 if (res_opts_to_skb(skb, &mdev->tconn->res_opts, exclude_sensitive))
2580 goto nla_put_failure;
2581
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02002582 rcu_read_lock();
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002583 if (got_ldev)
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02002584 if (disk_conf_to_skb(skb, rcu_dereference(mdev->ldev->disk_conf), exclude_sensitive))
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002585 goto nla_put_failure;
Philipp Reisner44ed1672011-04-19 17:10:19 +02002586
Philipp Reisner44ed1672011-04-19 17:10:19 +02002587 nc = rcu_dereference(mdev->tconn->net_conf);
2588 if (nc)
2589 err = net_conf_to_skb(skb, nc, exclude_sensitive);
2590 rcu_read_unlock();
2591 if (err)
2592 goto nla_put_failure;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002593
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002594 nla = nla_nest_start(skb, DRBD_NLA_STATE_INFO);
2595 if (!nla)
2596 goto nla_put_failure;
2597 NLA_PUT_U32(skb, T_sib_reason, sib ? sib->sib_reason : SIB_GET_STATUS_REPLY);
2598 NLA_PUT_U32(skb, T_current_state, mdev->state.i);
2599 NLA_PUT_U64(skb, T_ed_uuid, mdev->ed_uuid);
2600 NLA_PUT_U64(skb, T_capacity, drbd_get_capacity(mdev->this_bdev));
Philipp Reisnerb411b362009-09-25 16:07:19 -07002601
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002602 if (got_ldev) {
2603 NLA_PUT_U32(skb, T_disk_flags, mdev->ldev->md.flags);
2604 NLA_PUT(skb, T_uuids, sizeof(si->uuids), mdev->ldev->md.uuid);
2605 NLA_PUT_U64(skb, T_bits_total, drbd_bm_bits(mdev));
2606 NLA_PUT_U64(skb, T_bits_oos, drbd_bm_total_weight(mdev));
2607 if (C_SYNC_SOURCE <= mdev->state.conn &&
2608 C_PAUSED_SYNC_T >= mdev->state.conn) {
2609 NLA_PUT_U64(skb, T_bits_rs_total, mdev->rs_total);
2610 NLA_PUT_U64(skb, T_bits_rs_failed, mdev->rs_failed);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002611 }
2612 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07002613
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002614 if (sib) {
2615 switch(sib->sib_reason) {
2616 case SIB_SYNC_PROGRESS:
2617 case SIB_GET_STATUS_REPLY:
2618 break;
2619 case SIB_STATE_CHANGE:
2620 NLA_PUT_U32(skb, T_prev_state, sib->os.i);
2621 NLA_PUT_U32(skb, T_new_state, sib->ns.i);
2622 break;
2623 case SIB_HELPER_POST:
2624 NLA_PUT_U32(skb,
2625 T_helper_exit_code, sib->helper_exit_code);
2626 /* fall through */
2627 case SIB_HELPER_PRE:
2628 NLA_PUT_STRING(skb, T_helper, sib->helper_name);
2629 break;
2630 }
2631 }
2632 nla_nest_end(skb, nla);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002633
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002634 if (0)
2635nla_put_failure:
2636 err = -EMSGSIZE;
2637 if (got_ldev)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002638 put_ldev(mdev);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002639 return err;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002640}
2641
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002642int drbd_adm_get_status(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002643{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002644 enum drbd_ret_code retcode;
2645 int err;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002646
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002647 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2648 if (!adm_ctx.reply_skb)
2649 return retcode;
2650 if (retcode != NO_ERROR)
2651 goto out;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002652
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002653 err = nla_put_status_info(adm_ctx.reply_skb, adm_ctx.mdev, NULL);
2654 if (err) {
2655 nlmsg_free(adm_ctx.reply_skb);
2656 return err;
2657 }
2658out:
2659 drbd_adm_finish(info, retcode);
2660 return 0;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002661}
2662
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002663int get_one_status(struct sk_buff *skb, struct netlink_callback *cb)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002664{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002665 struct drbd_conf *mdev;
2666 struct drbd_genlmsghdr *dh;
Lars Ellenberg543cc102011-03-10 22:18:18 +01002667 struct drbd_tconn *pos = (struct drbd_tconn*)cb->args[0];
2668 struct drbd_tconn *tconn = NULL;
2669 struct drbd_tconn *tmp;
2670 unsigned volume = cb->args[1];
Philipp Reisnerb411b362009-09-25 16:07:19 -07002671
Lars Ellenberg543cc102011-03-10 22:18:18 +01002672 /* Open coded, deferred, iteration:
2673 * list_for_each_entry_safe(tconn, tmp, &drbd_tconns, all_tconn) {
2674 * idr_for_each_entry(&tconn->volumes, mdev, i) {
2675 * ...
2676 * }
2677 * }
2678 * where tconn is cb->args[0];
2679 * and i is cb->args[1];
2680 *
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002681 * cb->args[2] indicates if we shall loop over all resources,
2682 * or just dump all volumes of a single resource.
2683 *
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002684 * This may miss entries inserted after this dump started,
2685 * or entries deleted before they are reached.
Lars Ellenberg543cc102011-03-10 22:18:18 +01002686 *
2687 * We need to make sure the mdev won't disappear while
2688 * we are looking at it, and revalidate our iterators
2689 * on each iteration.
2690 */
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002691
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +02002692 /* synchronize with conn_create()/conn_destroy() */
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02002693 rcu_read_lock();
Lars Ellenberg543cc102011-03-10 22:18:18 +01002694 /* revalidate iterator position */
Philipp Reisnerec0bddb2011-05-04 15:47:01 +02002695 list_for_each_entry_rcu(tmp, &drbd_tconns, all_tconn) {
Lars Ellenberg543cc102011-03-10 22:18:18 +01002696 if (pos == NULL) {
2697 /* first iteration */
2698 pos = tmp;
2699 tconn = pos;
2700 break;
2701 }
2702 if (tmp == pos) {
2703 tconn = pos;
2704 break;
2705 }
2706 }
2707 if (tconn) {
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002708next_tconn:
Lars Ellenberg543cc102011-03-10 22:18:18 +01002709 mdev = idr_get_next(&tconn->volumes, &volume);
2710 if (!mdev) {
2711 /* No more volumes to dump on this tconn.
2712 * Advance tconn iterator. */
Philipp Reisnerec0bddb2011-05-04 15:47:01 +02002713 pos = list_entry_rcu(tconn->all_tconn.next,
2714 struct drbd_tconn, all_tconn);
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002715 /* Did we dump any volume on this tconn yet? */
Lars Ellenberg543cc102011-03-10 22:18:18 +01002716 if (volume != 0) {
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002717 /* If we reached the end of the list,
2718 * or only a single resource dump was requested,
2719 * we are done. */
2720 if (&pos->all_tconn == &drbd_tconns || cb->args[2])
2721 goto out;
Lars Ellenberg543cc102011-03-10 22:18:18 +01002722 volume = 0;
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002723 tconn = pos;
Lars Ellenberg543cc102011-03-10 22:18:18 +01002724 goto next_tconn;
2725 }
2726 }
2727
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002728 dh = genlmsg_put(skb, NETLINK_CB(cb->skb).pid,
2729 cb->nlh->nlmsg_seq, &drbd_genl_family,
2730 NLM_F_MULTI, DRBD_ADM_GET_STATUS);
2731 if (!dh)
Lars Ellenberg543cc102011-03-10 22:18:18 +01002732 goto out;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002733
Lars Ellenberg543cc102011-03-10 22:18:18 +01002734 if (!mdev) {
2735 /* this is a tconn without a single volume */
2736 dh->minor = -1U;
2737 dh->ret_code = NO_ERROR;
2738 if (nla_put_drbd_cfg_context(skb, tconn->name, VOLUME_UNSPECIFIED))
2739 genlmsg_cancel(skb, dh);
2740 else
2741 genlmsg_end(skb, dh);
2742 goto out;
2743 }
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002744
Lars Ellenberg543cc102011-03-10 22:18:18 +01002745 D_ASSERT(mdev->vnr == volume);
2746 D_ASSERT(mdev->tconn == tconn);
2747
2748 dh->minor = mdev_to_minor(mdev);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002749 dh->ret_code = NO_ERROR;
2750
2751 if (nla_put_status_info(skb, mdev, NULL)) {
2752 genlmsg_cancel(skb, dh);
Lars Ellenberg543cc102011-03-10 22:18:18 +01002753 goto out;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002754 }
2755 genlmsg_end(skb, dh);
2756 }
2757
Lars Ellenberg543cc102011-03-10 22:18:18 +01002758out:
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02002759 rcu_read_unlock();
Lars Ellenberg543cc102011-03-10 22:18:18 +01002760 /* where to start the next iteration */
2761 cb->args[0] = (long)pos;
2762 cb->args[1] = (pos == tconn) ? volume + 1 : 0;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002763
Lars Ellenberg543cc102011-03-10 22:18:18 +01002764 /* No more tconns/volumes/minors found results in an empty skb.
2765 * Which will terminate the dump. */
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002766 return skb->len;
2767}
2768
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002769/*
2770 * Request status of all resources, or of all volumes within a single resource.
2771 *
2772 * This is a dump, as the answer may not fit in a single reply skb otherwise.
2773 * Which means we cannot use the family->attrbuf or other such members, because
2774 * dump is NOT protected by the genl_lock(). During dump, we only have access
2775 * to the incoming skb, and need to opencode "parsing" of the nlattr payload.
2776 *
2777 * Once things are setup properly, we call into get_one_status().
2778 */
2779int drbd_adm_get_status_all(struct sk_buff *skb, struct netlink_callback *cb)
2780{
2781 const unsigned hdrlen = GENL_HDRLEN + GENL_MAGIC_FAMILY_HDRSZ;
2782 struct nlattr *nla;
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002783 const char *resource_name;
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002784 struct drbd_tconn *tconn;
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002785 int maxtype;
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002786
2787 /* Is this a followup call? */
2788 if (cb->args[0]) {
2789 /* ... of a single resource dump,
2790 * and the resource iterator has been advanced already? */
2791 if (cb->args[2] && cb->args[2] != cb->args[0])
2792 return 0; /* DONE. */
2793 goto dump;
2794 }
2795
2796 /* First call (from netlink_dump_start). We need to figure out
2797 * which resource(s) the user wants us to dump. */
2798 nla = nla_find(nlmsg_attrdata(cb->nlh, hdrlen),
2799 nlmsg_attrlen(cb->nlh, hdrlen),
2800 DRBD_NLA_CFG_CONTEXT);
2801
2802 /* No explicit context given. Dump all. */
2803 if (!nla)
2804 goto dump;
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002805 maxtype = ARRAY_SIZE(drbd_cfg_context_nl_policy) - 1;
2806 nla = drbd_nla_find_nested(maxtype, nla, __nla_type(T_ctx_resource_name));
2807 if (IS_ERR(nla))
2808 return PTR_ERR(nla);
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002809 /* context given, but no name present? */
2810 if (!nla)
2811 return -EINVAL;
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002812 resource_name = nla_data(nla);
2813 tconn = conn_get_by_name(resource_name);
Philipp Reisner0ace9df2011-04-24 10:53:19 +02002814
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002815 if (!tconn)
2816 return -ENODEV;
2817
Philipp Reisner0ace9df2011-04-24 10:53:19 +02002818 kref_put(&tconn->kref, &conn_destroy); /* get_one_status() (re)validates tconn by itself */
2819
Lars Ellenberg71932ef2011-04-18 09:43:25 +02002820 /* prime iterators, and set "filter" mode mark:
2821 * only dump this tconn. */
2822 cb->args[0] = (long)tconn;
2823 /* cb->args[1] = 0; passed in this way. */
2824 cb->args[2] = (long)tconn;
2825
2826dump:
2827 return get_one_status(skb, cb);
2828}
2829
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002830int drbd_adm_get_timeout_type(struct sk_buff *skb, struct genl_info *info)
2831{
2832 enum drbd_ret_code retcode;
2833 struct timeout_parms tp;
2834 int err;
2835
2836 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2837 if (!adm_ctx.reply_skb)
2838 return retcode;
2839 if (retcode != NO_ERROR)
2840 goto out;
2841
2842 tp.timeout_type =
2843 adm_ctx.mdev->state.pdsk == D_OUTDATED ? UT_PEER_OUTDATED :
2844 test_bit(USE_DEGR_WFC_T, &adm_ctx.mdev->flags) ? UT_DEGRADED :
2845 UT_DEFAULT;
2846
2847 err = timeout_parms_to_priv_skb(adm_ctx.reply_skb, &tp);
2848 if (err) {
2849 nlmsg_free(adm_ctx.reply_skb);
2850 return err;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002851 }
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002852out:
2853 drbd_adm_finish(info, retcode);
2854 return 0;
2855}
Lars Ellenberg873b0d52011-01-21 22:53:48 +01002856
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002857int drbd_adm_start_ov(struct sk_buff *skb, struct genl_info *info)
2858{
2859 struct drbd_conf *mdev;
2860 enum drbd_ret_code retcode;
2861
2862 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2863 if (!adm_ctx.reply_skb)
2864 return retcode;
2865 if (retcode != NO_ERROR)
2866 goto out;
2867
2868 mdev = adm_ctx.mdev;
2869 if (info->attrs[DRBD_NLA_START_OV_PARMS]) {
2870 /* resume from last known position, if possible */
2871 struct start_ov_parms parms =
2872 { .ov_start_sector = mdev->ov_start_sector };
Lars Ellenbergf3990022011-03-23 14:31:09 +01002873 int err = start_ov_parms_from_attrs(&parms, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002874 if (err) {
2875 retcode = ERR_MANDATORY_TAG;
2876 drbd_msg_put_info(from_attrs_err_to_txt(err));
2877 goto out;
2878 }
2879 /* w_make_ov_request expects position to be aligned */
2880 mdev->ov_start_sector = parms.ov_start_sector & ~BM_SECT_PER_BIT;
2881 }
Lars Ellenberg873b0d52011-01-21 22:53:48 +01002882 /* If there is still bitmap IO pending, e.g. previous resync or verify
2883 * just being finished, wait for it before requesting a new resync. */
2884 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002885 retcode = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
2886out:
2887 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002888 return 0;
2889}
2890
2891
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002892int drbd_adm_new_c_uuid(struct sk_buff *skb, struct genl_info *info)
Philipp Reisnerb411b362009-09-25 16:07:19 -07002893{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002894 struct drbd_conf *mdev;
2895 enum drbd_ret_code retcode;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002896 int skip_initial_sync = 0;
2897 int err;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002898 struct new_c_uuid_parms args;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002899
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002900 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2901 if (!adm_ctx.reply_skb)
2902 return retcode;
2903 if (retcode != NO_ERROR)
2904 goto out_nolock;
Philipp Reisnerb411b362009-09-25 16:07:19 -07002905
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002906 mdev = adm_ctx.mdev;
2907 memset(&args, 0, sizeof(args));
2908 if (info->attrs[DRBD_NLA_NEW_C_UUID_PARMS]) {
Lars Ellenbergf3990022011-03-23 14:31:09 +01002909 err = new_c_uuid_parms_from_attrs(&args, info);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002910 if (err) {
2911 retcode = ERR_MANDATORY_TAG;
2912 drbd_msg_put_info(from_attrs_err_to_txt(err));
2913 goto out_nolock;
2914 }
Philipp Reisnerb411b362009-09-25 16:07:19 -07002915 }
2916
Philipp Reisner8410da82011-02-11 20:11:10 +01002917 mutex_lock(mdev->state_mutex); /* Protects us against serialized state changes. */
Philipp Reisnerb411b362009-09-25 16:07:19 -07002918
2919 if (!get_ldev(mdev)) {
2920 retcode = ERR_NO_DISK;
2921 goto out;
2922 }
2923
2924 /* this is "skip initial sync", assume to be clean */
Philipp Reisner31890f42011-01-19 14:12:51 +01002925 if (mdev->state.conn == C_CONNECTED && mdev->tconn->agreed_pro_version >= 90 &&
Philipp Reisnerb411b362009-09-25 16:07:19 -07002926 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
2927 dev_info(DEV, "Preparing to skip initial sync\n");
2928 skip_initial_sync = 1;
2929 } else if (mdev->state.conn != C_STANDALONE) {
2930 retcode = ERR_CONNECTED;
2931 goto out_dec;
2932 }
2933
2934 drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
2935 drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
2936
2937 if (args.clear_bm) {
Lars Ellenberg20ceb2b2011-01-21 10:56:44 +01002938 err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
2939 "clear_n_write from new_c_uuid", BM_LOCKED_MASK);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002940 if (err) {
2941 dev_err(DEV, "Writing bitmap failed with %d\n",err);
2942 retcode = ERR_IO_MD_DISK;
2943 }
2944 if (skip_initial_sync) {
2945 drbd_send_uuids_skip_initial_sync(mdev);
2946 _drbd_uuid_set(mdev, UI_BITMAP, 0);
Lars Ellenberg62b0da32011-01-20 13:25:21 +01002947 drbd_print_uuids(mdev, "cleared bitmap UUID");
Philipp Reisner87eeee42011-01-19 14:16:30 +01002948 spin_lock_irq(&mdev->tconn->req_lock);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002949 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
2950 CS_VERBOSE, NULL);
Philipp Reisner87eeee42011-01-19 14:16:30 +01002951 spin_unlock_irq(&mdev->tconn->req_lock);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002952 }
2953 }
2954
2955 drbd_md_sync(mdev);
2956out_dec:
2957 put_ldev(mdev);
2958out:
Philipp Reisner8410da82011-02-11 20:11:10 +01002959 mutex_unlock(mdev->state_mutex);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002960out_nolock:
2961 drbd_adm_finish(info, retcode);
Philipp Reisnerb411b362009-09-25 16:07:19 -07002962 return 0;
2963}
2964
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002965static enum drbd_ret_code
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002966drbd_check_resource_name(const char *name)
Philipp Reisner774b3052011-02-22 02:07:03 -05002967{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002968 if (!name || !name[0]) {
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002969 drbd_msg_put_info("resource name missing");
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002970 return ERR_MANDATORY_TAG;
2971 }
2972 /* if we want to use these in sysfs/configfs/debugfs some day,
2973 * we must not allow slashes */
2974 if (strchr(name, '/')) {
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002975 drbd_msg_put_info("invalid resource name");
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002976 return ERR_INVALID_REQUEST;
2977 }
2978 return NO_ERROR;
2979}
Philipp Reisner774b3052011-02-22 02:07:03 -05002980
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +02002981int drbd_adm_new_resource(struct sk_buff *skb, struct genl_info *info)
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002982{
2983 enum drbd_ret_code retcode;
2984
2985 retcode = drbd_adm_prepare(skb, info, 0);
2986 if (!adm_ctx.reply_skb)
2987 return retcode;
2988 if (retcode != NO_ERROR)
2989 goto out;
2990
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02002991 retcode = drbd_check_resource_name(adm_ctx.resource_name);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01002992 if (retcode != NO_ERROR)
2993 goto out;
2994
2995 if (adm_ctx.tconn) {
Lars Ellenberg38f19612011-03-14 13:22:35 +01002996 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL) {
2997 retcode = ERR_INVALID_REQUEST;
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +02002998 drbd_msg_put_info("resource exists");
Lars Ellenberg38f19612011-03-14 13:22:35 +01002999 }
3000 /* else: still NO_ERROR */
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003001 goto out;
Philipp Reisner774b3052011-02-22 02:07:03 -05003002 }
3003
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02003004 if (!conn_create(adm_ctx.resource_name))
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003005 retcode = ERR_NOMEM;
3006out:
3007 drbd_adm_finish(info, retcode);
Philipp Reisner774b3052011-02-22 02:07:03 -05003008 return 0;
3009}
3010
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003011int drbd_adm_add_minor(struct sk_buff *skb, struct genl_info *info)
Philipp Reisner774b3052011-02-22 02:07:03 -05003012{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003013 struct drbd_genlmsghdr *dh = info->userhdr;
3014 enum drbd_ret_code retcode;
Philipp Reisner774b3052011-02-22 02:07:03 -05003015
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003016 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
3017 if (!adm_ctx.reply_skb)
3018 return retcode;
3019 if (retcode != NO_ERROR)
3020 goto out;
Philipp Reisner774b3052011-02-22 02:07:03 -05003021
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003022 /* FIXME drop minor_count parameter, limit to MINORMASK */
3023 if (dh->minor >= minor_count) {
3024 drbd_msg_put_info("requested minor out of range");
3025 retcode = ERR_INVALID_REQUEST;
3026 goto out;
3027 }
Andreas Gruenbacher0c8e36d2011-03-30 16:00:17 +02003028 if (adm_ctx.volume > DRBD_VOLUME_MAX) {
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003029 drbd_msg_put_info("requested volume id out of range");
3030 retcode = ERR_INVALID_REQUEST;
3031 goto out;
Philipp Reisner774b3052011-02-22 02:07:03 -05003032 }
3033
Lars Ellenberg38f19612011-03-14 13:22:35 +01003034 /* drbd_adm_prepare made sure already
3035 * that mdev->tconn and mdev->vnr match the request. */
3036 if (adm_ctx.mdev) {
3037 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL)
3038 retcode = ERR_MINOR_EXISTS;
3039 /* else: still NO_ERROR */
3040 goto out;
3041 }
3042
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003043 retcode = conn_new_minor(adm_ctx.tconn, dh->minor, adm_ctx.volume);
3044out:
3045 drbd_adm_finish(info, retcode);
Philipp Reisner774b3052011-02-22 02:07:03 -05003046 return 0;
3047}
3048
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003049static enum drbd_ret_code adm_delete_minor(struct drbd_conf *mdev)
3050{
3051 if (mdev->state.disk == D_DISKLESS &&
3052 /* no need to be mdev->state.conn == C_STANDALONE &&
3053 * we may want to delete a minor from a live replication group.
3054 */
3055 mdev->state.role == R_SECONDARY) {
Philipp Reisner81fa2e62011-05-04 15:10:30 +02003056 idr_remove(&mdev->tconn->volumes, mdev->vnr);
3057 idr_remove(&minors, mdev_to_minor(mdev));
3058 del_gendisk(mdev->vdisk);
3059 synchronize_rcu();
3060 kref_put(&mdev->kref, &drbd_minor_destroy);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003061 return NO_ERROR;
3062 } else
3063 return ERR_MINOR_CONFIGURED;
3064}
3065
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003066int drbd_adm_delete_minor(struct sk_buff *skb, struct genl_info *info)
Philipp Reisner774b3052011-02-22 02:07:03 -05003067{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003068 enum drbd_ret_code retcode;
3069
3070 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
3071 if (!adm_ctx.reply_skb)
3072 return retcode;
3073 if (retcode != NO_ERROR)
3074 goto out;
3075
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003076 retcode = adm_delete_minor(adm_ctx.mdev);
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003077out:
3078 drbd_adm_finish(info, retcode);
3079 return 0;
3080}
3081
3082int drbd_adm_down(struct sk_buff *skb, struct genl_info *info)
3083{
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02003084 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003085 struct drbd_conf *mdev;
3086 unsigned i;
3087
3088 retcode = drbd_adm_prepare(skb, info, 0);
3089 if (!adm_ctx.reply_skb)
3090 return retcode;
3091 if (retcode != NO_ERROR)
3092 goto out;
3093
3094 if (!adm_ctx.tconn) {
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +02003095 retcode = ERR_RES_NOT_KNOWN;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003096 goto out;
3097 }
3098
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003099 /* demote */
3100 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
3101 retcode = drbd_set_role(mdev, R_SECONDARY, 0);
3102 if (retcode < SS_SUCCESS) {
3103 drbd_msg_put_info("failed to demote");
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02003104 goto out;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003105 }
3106 }
3107
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02003108 retcode = conn_try_disconnect(adm_ctx.tconn, 0);
3109 if (retcode < SS_SUCCESS) {
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003110 drbd_msg_put_info("failed to disconnect");
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02003111 goto out;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003112 }
3113
3114 /* detach */
3115 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02003116 retcode = adm_detach(mdev);
3117 if (retcode < SS_SUCCESS) {
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003118 drbd_msg_put_info("failed to detach");
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02003119 goto out;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003120 }
3121 }
3122
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02003123 /* If we reach this, all volumes (of this tconn) are Secondary,
3124 * Disconnected, Diskless, aka Unconfigured. Make sure all threads have
Philipp Reisnerc141ebd2011-05-05 16:13:10 +02003125 * actually stopped, state handling only does drbd_thread_stop_nowait(). */
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02003126 drbd_thread_stop(&adm_ctx.tconn->worker);
3127
3128 /* Now, nothing can fail anymore */
3129
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003130 /* delete volumes */
3131 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
3132 retcode = adm_delete_minor(mdev);
3133 if (retcode != NO_ERROR) {
3134 /* "can not happen" */
3135 drbd_msg_put_info("failed to delete volume");
Philipp Reisneref356262011-04-13 14:21:29 -07003136 goto out;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003137 }
3138 }
3139
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003140 /* delete connection */
3141 if (conn_lowest_minor(adm_ctx.tconn) < 0) {
Philipp Reisnerec0bddb2011-05-04 15:47:01 +02003142 list_del_rcu(&adm_ctx.tconn->all_tconn);
3143 synchronize_rcu();
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +02003144 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
3145
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003146 retcode = NO_ERROR;
3147 } else {
3148 /* "can not happen" */
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +02003149 retcode = ERR_RES_IN_USE;
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003150 drbd_msg_put_info("failed to delete connection");
Lars Ellenberg85f75dd72011-03-15 16:26:37 +01003151 }
Philipp Reisneref356262011-04-13 14:21:29 -07003152 goto out;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003153out:
3154 drbd_adm_finish(info, retcode);
Philipp Reisner774b3052011-02-22 02:07:03 -05003155 return 0;
3156}
3157
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +02003158int drbd_adm_del_resource(struct sk_buff *skb, struct genl_info *info)
Philipp Reisner774b3052011-02-22 02:07:03 -05003159{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003160 enum drbd_ret_code retcode;
3161
3162 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
3163 if (!adm_ctx.reply_skb)
3164 return retcode;
3165 if (retcode != NO_ERROR)
3166 goto out;
3167
3168 if (conn_lowest_minor(adm_ctx.tconn) < 0) {
Philipp Reisnerec0bddb2011-05-04 15:47:01 +02003169 list_del_rcu(&adm_ctx.tconn->all_tconn);
3170 synchronize_rcu();
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +02003171 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
3172
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003173 retcode = NO_ERROR;
Philipp Reisner774b3052011-02-22 02:07:03 -05003174 } else {
Andreas Gruenbacher789c1b62011-06-06 16:16:44 +02003175 retcode = ERR_RES_IN_USE;
Philipp Reisner774b3052011-02-22 02:07:03 -05003176 }
3177
Lars Ellenberg992d6e92011-05-02 11:47:18 +02003178 if (retcode == NO_ERROR)
3179 drbd_thread_stop(&adm_ctx.tconn->worker);
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003180out:
3181 drbd_adm_finish(info, retcode);
Philipp Reisner774b3052011-02-22 02:07:03 -05003182 return 0;
3183}
3184
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003185void drbd_bcast_event(struct drbd_conf *mdev, const struct sib_info *sib)
Philipp Reisnerb411b362009-09-25 16:07:19 -07003186{
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003187 static atomic_t drbd_genl_seq = ATOMIC_INIT(2); /* two. */
3188 struct sk_buff *msg;
3189 struct drbd_genlmsghdr *d_out;
3190 unsigned seq;
3191 int err = -ENOMEM;
Philipp Reisnerb411b362009-09-25 16:07:19 -07003192
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003193 seq = atomic_inc_return(&drbd_genl_seq);
3194 msg = genlmsg_new(NLMSG_GOODSIZE, GFP_NOIO);
3195 if (!msg)
3196 goto failed;
Philipp Reisnerb411b362009-09-25 16:07:19 -07003197
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003198 err = -EMSGSIZE;
3199 d_out = genlmsg_put(msg, 0, seq, &drbd_genl_family, 0, DRBD_EVENT);
3200 if (!d_out) /* cannot happen, but anyways. */
3201 goto nla_put_failure;
3202 d_out->minor = mdev_to_minor(mdev);
Andreas Gruenbacher6f9b5f82011-05-06 01:03:32 +02003203 d_out->ret_code = NO_ERROR;
Philipp Reisner9f5180e2009-10-06 09:30:14 +02003204
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003205 if (nla_put_status_info(msg, mdev, sib))
3206 goto nla_put_failure;
3207 genlmsg_end(msg, d_out);
3208 err = drbd_genl_multicast_events(msg, 0);
3209 /* msg has been consumed or freed in netlink_broadcast() */
3210 if (err && err != -ESRCH)
3211 goto failed;
Philipp Reisnerb411b362009-09-25 16:07:19 -07003212
Philipp Reisnerb411b362009-09-25 16:07:19 -07003213 return;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01003214
3215nla_put_failure:
3216 nlmsg_free(msg);
3217failed:
3218 dev_err(DEV, "Error %d while broadcasting event. "
3219 "Event seq:%u sib_reason:%u\n",
3220 err, seq, sib->sib_reason);
Philipp Reisnerb411b362009-09-25 16:07:19 -07003221}
Andreas Gruenbacher7c3063c2011-06-09 17:52:12 +02003222
3223int drbd_nla_check_mandatory(int maxtype, struct nlattr *nla)
3224{
3225 struct nlattr *head = nla_data(nla);
3226 int len = nla_len(nla);
3227 int rem;
3228
3229 /*
3230 * validate_nla (called from nla_parse_nested) ignores attributes
3231 * beyond maxtype, and does not understand the DRBD_GENLA_F_MANDATORY flag.
3232 * In order to have it validate attributes with the DRBD_GENLA_F_MANDATORY
3233 * flag set also, check and remove that flag before calling
3234 * nla_parse_nested.
3235 */
3236
3237 nla_for_each_attr(nla, head, len, rem) {
3238 if (nla->nla_type & DRBD_GENLA_F_MANDATORY) {
3239 nla->nla_type &= ~DRBD_GENLA_F_MANDATORY;
3240 if (nla_type(nla) > maxtype)
3241 return -EOPNOTSUPP;
3242 }
3243 }
3244 return 0;
3245}
3246
3247int drbd_nla_parse_nested(struct nlattr *tb[], int maxtype, struct nlattr *nla,
3248 const struct nla_policy *policy)
3249{
3250 int err;
3251
3252 err = drbd_nla_check_mandatory(maxtype, nla);
3253 if (!err)
3254 err = nla_parse_nested(tb, maxtype, nla, policy);
3255
3256 return err;
3257}
3258
3259struct nlattr *drbd_nla_find_nested(int maxtype, struct nlattr *nla, int attrtype)
3260{
3261 int err;
3262 /*
3263 * If any nested attribute has the DRBD_GENLA_F_MANDATORY flag set and
3264 * we don't know about that attribute, reject all the nested
3265 * attributes.
3266 */
3267 err = drbd_nla_check_mandatory(maxtype, nla);
3268 if (err)
3269 return ERR_PTR(err);
3270 return nla_find_nested(nla, attrtype);
3271}