drbd_nl.c revision e525fd89d380c4a94c0d63913a1dd1a593ed25e7
1/*
2   drbd_nl.c
3
4   This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6   Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7   Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8   Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10   drbd is free software; you can redistribute it and/or modify
11   it under the terms of the GNU General Public License as published by
12   the Free Software Foundation; either version 2, or (at your option)
13   any later version.
14
15   drbd is distributed in the hope that it will be useful,
16   but WITHOUT ANY WARRANTY; without even the implied warranty of
17   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18   GNU General Public License for more details.
19
20   You should have received a copy of the GNU General Public License
21   along with drbd; see the file COPYING.  If not, write to
22   the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23
24 */
25
26#include <linux/module.h>
27#include <linux/drbd.h>
28#include <linux/in.h>
29#include <linux/fs.h>
30#include <linux/file.h>
31#include <linux/slab.h>
32#include <linux/connector.h>
33#include <linux/blkpg.h>
34#include <linux/cpumask.h>
35#include "drbd_int.h"
36#include "drbd_req.h"
37#include "drbd_wrappers.h"
38#include <asm/unaligned.h>
39#include <linux/drbd_tag_magic.h>
40#include <linux/drbd_limits.h>
41#include <linux/compiler.h>
42#include <linux/kthread.h>
43
44static unsigned short *tl_add_blob(unsigned short *, enum drbd_tags, const void *, int);
45static unsigned short *tl_add_str(unsigned short *, enum drbd_tags, const char *);
46static unsigned short *tl_add_int(unsigned short *, enum drbd_tags, const void *);
47
48/* see get_sb_bdev and bd_claim */
49static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
50
51/* Generate the tag_list to struct functions */
52#define NL_PACKET(name, number, fields) \
53static int name ## _from_tags(struct drbd_conf *mdev, \
54	unsigned short *tags, struct name *arg) __attribute__ ((unused)); \
55static int name ## _from_tags(struct drbd_conf *mdev, \
56	unsigned short *tags, struct name *arg) \
57{ \
58	int tag; \
59	int dlen; \
60	\
61	while ((tag = get_unaligned(tags++)) != TT_END) {	\
62		dlen = get_unaligned(tags++);			\
63		switch (tag_number(tag)) { \
64		fields \
65		default: \
66			if (tag & T_MANDATORY) { \
67				dev_err(DEV, "Unknown tag: %d\n", tag_number(tag)); \
68				return 0; \
69			} \
70		} \
71		tags = (unsigned short *)((char *)tags + dlen); \
72	} \
73	return 1; \
74}
75#define NL_INTEGER(pn, pr, member) \
76	case pn: /* D_ASSERT( tag_type(tag) == TT_INTEGER ); */ \
77		arg->member = get_unaligned((int *)(tags));	\
78		break;
79#define NL_INT64(pn, pr, member) \
80	case pn: /* D_ASSERT( tag_type(tag) == TT_INT64 ); */ \
81		arg->member = get_unaligned((u64 *)(tags));	\
82		break;
83#define NL_BIT(pn, pr, member) \
84	case pn: /* D_ASSERT( tag_type(tag) == TT_BIT ); */ \
85		arg->member = *(char *)(tags) ? 1 : 0; \
86		break;
87#define NL_STRING(pn, pr, member, len) \
88	case pn: /* D_ASSERT( tag_type(tag) == TT_STRING ); */ \
89		if (dlen > len) { \
90			dev_err(DEV, "arg too long: %s (%u wanted, max len: %u bytes)\n", \
91				#member, dlen, (unsigned int)len); \
92			return 0; \
93		} \
94		 arg->member ## _len = dlen; \
95		 memcpy(arg->member, tags, min_t(size_t, dlen, len)); \
96		 break;
97#include "linux/drbd_nl.h"
98
99/* Generate the struct to tag_list functions */
100#define NL_PACKET(name, number, fields) \
101static unsigned short* \
102name ## _to_tags(struct drbd_conf *mdev, \
103	struct name *arg, unsigned short *tags) __attribute__ ((unused)); \
104static unsigned short* \
105name ## _to_tags(struct drbd_conf *mdev, \
106	struct name *arg, unsigned short *tags) \
107{ \
108	fields \
109	return tags; \
110}
111
112#define NL_INTEGER(pn, pr, member) \
113	put_unaligned(pn | pr | TT_INTEGER, tags++);	\
114	put_unaligned(sizeof(int), tags++);		\
115	put_unaligned(arg->member, (int *)tags);	\
116	tags = (unsigned short *)((char *)tags+sizeof(int));
117#define NL_INT64(pn, pr, member) \
118	put_unaligned(pn | pr | TT_INT64, tags++);	\
119	put_unaligned(sizeof(u64), tags++);		\
120	put_unaligned(arg->member, (u64 *)tags);	\
121	tags = (unsigned short *)((char *)tags+sizeof(u64));
122#define NL_BIT(pn, pr, member) \
123	put_unaligned(pn | pr | TT_BIT, tags++);	\
124	put_unaligned(sizeof(char), tags++);		\
125	*(char *)tags = arg->member; \
126	tags = (unsigned short *)((char *)tags+sizeof(char));
127#define NL_STRING(pn, pr, member, len) \
128	put_unaligned(pn | pr | TT_STRING, tags++);	\
129	put_unaligned(arg->member ## _len, tags++);	\
130	memcpy(tags, arg->member, arg->member ## _len); \
131	tags = (unsigned short *)((char *)tags + arg->member ## _len);
132#include "linux/drbd_nl.h"
133
134void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name);
135void drbd_nl_send_reply(struct cn_msg *, int);
136
137int drbd_khelper(struct drbd_conf *mdev, char *cmd)
138{
139	char *envp[] = { "HOME=/",
140			"TERM=linux",
141			"PATH=/sbin:/usr/sbin:/bin:/usr/bin",
142			NULL, /* Will be set to address family */
143			NULL, /* Will be set to address */
144			NULL };
145
146	char mb[12], af[20], ad[60], *afs;
147	char *argv[] = {usermode_helper, cmd, mb, NULL };
148	int ret;
149
150	snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
151
152	if (get_net_conf(mdev)) {
153		switch (((struct sockaddr *)mdev->net_conf->peer_addr)->sa_family) {
154		case AF_INET6:
155			afs = "ipv6";
156			snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI6",
157				 &((struct sockaddr_in6 *)mdev->net_conf->peer_addr)->sin6_addr);
158			break;
159		case AF_INET:
160			afs = "ipv4";
161			snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
162				 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
163			break;
164		default:
165			afs = "ssocks";
166			snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
167				 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
168		}
169		snprintf(af, 20, "DRBD_PEER_AF=%s", afs);
170		envp[3]=af;
171		envp[4]=ad;
172		put_net_conf(mdev);
173	}
174
175	/* The helper may take some time.
176	 * write out any unsynced meta data changes now */
177	drbd_md_sync(mdev);
178
179	dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
180
181	drbd_bcast_ev_helper(mdev, cmd);
182	ret = call_usermodehelper(usermode_helper, argv, envp, 1);
183	if (ret)
184		dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
185				usermode_helper, cmd, mb,
186				(ret >> 8) & 0xff, ret);
187	else
188		dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
189				usermode_helper, cmd, mb,
190				(ret >> 8) & 0xff, ret);
191
192	if (ret < 0) /* Ignore any ERRNOs we got. */
193		ret = 0;
194
195	return ret;
196}
197
198enum drbd_disk_state drbd_try_outdate_peer(struct drbd_conf *mdev)
199{
200	char *ex_to_string;
201	int r;
202	enum drbd_disk_state nps;
203	enum drbd_fencing_p fp;
204
205	D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
206
207	if (get_ldev_if_state(mdev, D_CONSISTENT)) {
208		fp = mdev->ldev->dc.fencing;
209		put_ldev(mdev);
210	} else {
211		dev_warn(DEV, "Not fencing peer, I'm not even Consistent myself.\n");
212		nps = mdev->state.pdsk;
213		goto out;
214	}
215
216	r = drbd_khelper(mdev, "fence-peer");
217
218	switch ((r>>8) & 0xff) {
219	case 3: /* peer is inconsistent */
220		ex_to_string = "peer is inconsistent or worse";
221		nps = D_INCONSISTENT;
222		break;
223	case 4: /* peer got outdated, or was already outdated */
224		ex_to_string = "peer was fenced";
225		nps = D_OUTDATED;
226		break;
227	case 5: /* peer was down */
228		if (mdev->state.disk == D_UP_TO_DATE) {
229			/* we will(have) create(d) a new UUID anyways... */
230			ex_to_string = "peer is unreachable, assumed to be dead";
231			nps = D_OUTDATED;
232		} else {
233			ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
234			nps = mdev->state.pdsk;
235		}
236		break;
237	case 6: /* Peer is primary, voluntarily outdate myself.
238		 * This is useful when an unconnected R_SECONDARY is asked to
239		 * become R_PRIMARY, but finds the other peer being active. */
240		ex_to_string = "peer is active";
241		dev_warn(DEV, "Peer is primary, outdating myself.\n");
242		nps = D_UNKNOWN;
243		_drbd_request_state(mdev, NS(disk, D_OUTDATED), CS_WAIT_COMPLETE);
244		break;
245	case 7:
246		if (fp != FP_STONITH)
247			dev_err(DEV, "fence-peer() = 7 && fencing != Stonith !!!\n");
248		ex_to_string = "peer was stonithed";
249		nps = D_OUTDATED;
250		break;
251	default:
252		/* The script is broken ... */
253		nps = D_UNKNOWN;
254		dev_err(DEV, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
255		return nps;
256	}
257
258	dev_info(DEV, "fence-peer helper returned %d (%s)\n",
259			(r>>8) & 0xff, ex_to_string);
260
261out:
262	if (mdev->state.susp_fen && nps >= D_UNKNOWN) {
263		/* The handler was not successful... unfreeze here, the
264		   state engine can not unfreeze... */
265		_drbd_request_state(mdev, NS(susp_fen, 0), CS_VERBOSE);
266	}
267
268	return nps;
269}
270
271static int _try_outdate_peer_async(void *data)
272{
273	struct drbd_conf *mdev = (struct drbd_conf *)data;
274	enum drbd_disk_state nps;
275
276	nps = drbd_try_outdate_peer(mdev);
277	drbd_request_state(mdev, NS(pdsk, nps));
278
279	return 0;
280}
281
282void drbd_try_outdate_peer_async(struct drbd_conf *mdev)
283{
284	struct task_struct *opa;
285
286	opa = kthread_run(_try_outdate_peer_async, mdev, "drbd%d_a_helper", mdev_to_minor(mdev));
287	if (IS_ERR(opa))
288		dev_err(DEV, "out of mem, failed to invoke fence-peer helper\n");
289}
290
291int drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
292{
293	const int max_tries = 4;
294	int r = 0;
295	int try = 0;
296	int forced = 0;
297	union drbd_state mask, val;
298	enum drbd_disk_state nps;
299
300	if (new_role == R_PRIMARY)
301		request_ping(mdev); /* Detect a dead peer ASAP */
302
303	mutex_lock(&mdev->state_mutex);
304
305	mask.i = 0; mask.role = R_MASK;
306	val.i  = 0; val.role  = new_role;
307
308	while (try++ < max_tries) {
309		r = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
310
311		/* in case we first succeeded to outdate,
312		 * but now suddenly could establish a connection */
313		if (r == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
314			val.pdsk = 0;
315			mask.pdsk = 0;
316			continue;
317		}
318
319		if (r == SS_NO_UP_TO_DATE_DISK && force &&
320		    (mdev->state.disk < D_UP_TO_DATE &&
321		     mdev->state.disk >= D_INCONSISTENT)) {
322			mask.disk = D_MASK;
323			val.disk  = D_UP_TO_DATE;
324			forced = 1;
325			continue;
326		}
327
328		if (r == SS_NO_UP_TO_DATE_DISK &&
329		    mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
330			D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
331			nps = drbd_try_outdate_peer(mdev);
332
333			if (nps == D_OUTDATED || nps == D_INCONSISTENT) {
334				val.disk = D_UP_TO_DATE;
335				mask.disk = D_MASK;
336			}
337
338			val.pdsk = nps;
339			mask.pdsk = D_MASK;
340
341			continue;
342		}
343
344		if (r == SS_NOTHING_TO_DO)
345			goto fail;
346		if (r == SS_PRIMARY_NOP && mask.pdsk == 0) {
347			nps = drbd_try_outdate_peer(mdev);
348
349			if (force && nps > D_OUTDATED) {
350				dev_warn(DEV, "Forced into split brain situation!\n");
351				nps = D_OUTDATED;
352			}
353
354			mask.pdsk = D_MASK;
355			val.pdsk  = nps;
356
357			continue;
358		}
359		if (r == SS_TWO_PRIMARIES) {
360			/* Maybe the peer is detected as dead very soon...
361			   retry at most once more in this case. */
362			__set_current_state(TASK_INTERRUPTIBLE);
363			schedule_timeout((mdev->net_conf->ping_timeo+1)*HZ/10);
364			if (try < max_tries)
365				try = max_tries - 1;
366			continue;
367		}
368		if (r < SS_SUCCESS) {
369			r = _drbd_request_state(mdev, mask, val,
370						CS_VERBOSE + CS_WAIT_COMPLETE);
371			if (r < SS_SUCCESS)
372				goto fail;
373		}
374		break;
375	}
376
377	if (r < SS_SUCCESS)
378		goto fail;
379
380	if (forced)
381		dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
382
383	/* Wait until nothing is on the fly :) */
384	wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
385
386	if (new_role == R_SECONDARY) {
387		set_disk_ro(mdev->vdisk, TRUE);
388		if (get_ldev(mdev)) {
389			mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
390			put_ldev(mdev);
391		}
392	} else {
393		if (get_net_conf(mdev)) {
394			mdev->net_conf->want_lose = 0;
395			put_net_conf(mdev);
396		}
397		set_disk_ro(mdev->vdisk, FALSE);
398		if (get_ldev(mdev)) {
399			if (((mdev->state.conn < C_CONNECTED ||
400			       mdev->state.pdsk <= D_FAILED)
401			      && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
402				drbd_uuid_new_current(mdev);
403
404			mdev->ldev->md.uuid[UI_CURRENT] |=  (u64)1;
405			put_ldev(mdev);
406		}
407	}
408
409	if ((new_role == R_SECONDARY) && get_ldev(mdev)) {
410		drbd_al_to_on_disk_bm(mdev);
411		put_ldev(mdev);
412	}
413
414	if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
415		/* if this was forced, we should consider sync */
416		if (forced)
417			drbd_send_uuids(mdev);
418		drbd_send_state(mdev);
419	}
420
421	drbd_md_sync(mdev);
422
423	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
424 fail:
425	mutex_unlock(&mdev->state_mutex);
426	return r;
427}
428
429static struct drbd_conf *ensure_mdev(int minor, int create)
430{
431	struct drbd_conf *mdev;
432
433	if (minor >= minor_count)
434		return NULL;
435
436	mdev = minor_to_mdev(minor);
437
438	if (!mdev && create) {
439		struct gendisk *disk = NULL;
440		mdev = drbd_new_device(minor);
441
442		spin_lock_irq(&drbd_pp_lock);
443		if (minor_table[minor] == NULL) {
444			minor_table[minor] = mdev;
445			disk = mdev->vdisk;
446			mdev = NULL;
447		} /* else: we lost the race */
448		spin_unlock_irq(&drbd_pp_lock);
449
450		if (disk) /* we won the race above */
451			/* in case we ever add a drbd_delete_device(),
452			 * don't forget the del_gendisk! */
453			add_disk(disk);
454		else /* we lost the race above */
455			drbd_free_mdev(mdev);
456
457		mdev = minor_to_mdev(minor);
458	}
459
460	return mdev;
461}
462
463static int drbd_nl_primary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
464			   struct drbd_nl_cfg_reply *reply)
465{
466	struct primary primary_args;
467
468	memset(&primary_args, 0, sizeof(struct primary));
469	if (!primary_from_tags(mdev, nlp->tag_list, &primary_args)) {
470		reply->ret_code = ERR_MANDATORY_TAG;
471		return 0;
472	}
473
474	reply->ret_code =
475		drbd_set_role(mdev, R_PRIMARY, primary_args.primary_force);
476
477	return 0;
478}
479
480static int drbd_nl_secondary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
481			     struct drbd_nl_cfg_reply *reply)
482{
483	reply->ret_code = drbd_set_role(mdev, R_SECONDARY, 0);
484
485	return 0;
486}
487
488/* initializes the md.*_offset members, so we are able to find
489 * the on disk meta data */
490static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
491				       struct drbd_backing_dev *bdev)
492{
493	sector_t md_size_sect = 0;
494	switch (bdev->dc.meta_dev_idx) {
495	default:
496		/* v07 style fixed size indexed meta data */
497		bdev->md.md_size_sect = MD_RESERVED_SECT;
498		bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
499		bdev->md.al_offset = MD_AL_OFFSET;
500		bdev->md.bm_offset = MD_BM_OFFSET;
501		break;
502	case DRBD_MD_INDEX_FLEX_EXT:
503		/* just occupy the full device; unit: sectors */
504		bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
505		bdev->md.md_offset = 0;
506		bdev->md.al_offset = MD_AL_OFFSET;
507		bdev->md.bm_offset = MD_BM_OFFSET;
508		break;
509	case DRBD_MD_INDEX_INTERNAL:
510	case DRBD_MD_INDEX_FLEX_INT:
511		bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
512		/* al size is still fixed */
513		bdev->md.al_offset = -MD_AL_MAX_SIZE;
514		/* we need (slightly less than) ~ this much bitmap sectors: */
515		md_size_sect = drbd_get_capacity(bdev->backing_bdev);
516		md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
517		md_size_sect = BM_SECT_TO_EXT(md_size_sect);
518		md_size_sect = ALIGN(md_size_sect, 8);
519
520		/* plus the "drbd meta data super block",
521		 * and the activity log; */
522		md_size_sect += MD_BM_OFFSET;
523
524		bdev->md.md_size_sect = md_size_sect;
525		/* bitmap offset is adjusted by 'super' block size */
526		bdev->md.bm_offset   = -md_size_sect + MD_AL_OFFSET;
527		break;
528	}
529}
530
531char *ppsize(char *buf, unsigned long long size)
532{
533	/* Needs 9 bytes at max. */
534	static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
535	int base = 0;
536	while (size >= 10000) {
537		/* shift + round */
538		size = (size >> 10) + !!(size & (1<<9));
539		base++;
540	}
541	sprintf(buf, "%lu %cB", (long)size, units[base]);
542
543	return buf;
544}
545
546/* there is still a theoretical deadlock when called from receiver
547 * on an D_INCONSISTENT R_PRIMARY:
548 *  remote READ does inc_ap_bio, receiver would need to receive answer
549 *  packet from remote to dec_ap_bio again.
550 *  receiver receive_sizes(), comes here,
551 *  waits for ap_bio_cnt == 0. -> deadlock.
552 * but this cannot happen, actually, because:
553 *  R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
554 *  (not connected, or bad/no disk on peer):
555 *  see drbd_fail_request_early, ap_bio_cnt is zero.
556 *  R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
557 *  peer may not initiate a resize.
558 */
559void drbd_suspend_io(struct drbd_conf *mdev)
560{
561	set_bit(SUSPEND_IO, &mdev->flags);
562	if (is_susp(mdev->state))
563		return;
564	wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
565}
566
567void drbd_resume_io(struct drbd_conf *mdev)
568{
569	clear_bit(SUSPEND_IO, &mdev->flags);
570	wake_up(&mdev->misc_wait);
571}
572
573/**
574 * drbd_determine_dev_size() -  Sets the right device size obeying all constraints
575 * @mdev:	DRBD device.
576 *
577 * Returns 0 on success, negative return values indicate errors.
578 * You should call drbd_md_sync() after calling this function.
579 */
580enum determine_dev_size drbd_determin_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local)
581{
582	sector_t prev_first_sect, prev_size; /* previous meta location */
583	sector_t la_size;
584	sector_t size;
585	char ppb[10];
586
587	int md_moved, la_size_changed;
588	enum determine_dev_size rv = unchanged;
589
590	/* race:
591	 * application request passes inc_ap_bio,
592	 * but then cannot get an AL-reference.
593	 * this function later may wait on ap_bio_cnt == 0. -> deadlock.
594	 *
595	 * to avoid that:
596	 * Suspend IO right here.
597	 * still lock the act_log to not trigger ASSERTs there.
598	 */
599	drbd_suspend_io(mdev);
600
601	/* no wait necessary anymore, actually we could assert that */
602	wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
603
604	prev_first_sect = drbd_md_first_sector(mdev->ldev);
605	prev_size = mdev->ldev->md.md_size_sect;
606	la_size = mdev->ldev->md.la_size_sect;
607
608	/* TODO: should only be some assert here, not (re)init... */
609	drbd_md_set_sector_offsets(mdev, mdev->ldev);
610
611	size = drbd_new_dev_size(mdev, mdev->ldev, flags & DDSF_FORCED);
612
613	if (drbd_get_capacity(mdev->this_bdev) != size ||
614	    drbd_bm_capacity(mdev) != size) {
615		int err;
616		err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC));
617		if (unlikely(err)) {
618			/* currently there is only one error: ENOMEM! */
619			size = drbd_bm_capacity(mdev)>>1;
620			if (size == 0) {
621				dev_err(DEV, "OUT OF MEMORY! "
622				    "Could not allocate bitmap!\n");
623			} else {
624				dev_err(DEV, "BM resizing failed. "
625				    "Leaving size unchanged at size = %lu KB\n",
626				    (unsigned long)size);
627			}
628			rv = dev_size_error;
629		}
630		/* racy, see comments above. */
631		drbd_set_my_capacity(mdev, size);
632		mdev->ldev->md.la_size_sect = size;
633		dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
634		     (unsigned long long)size>>1);
635	}
636	if (rv == dev_size_error)
637		goto out;
638
639	la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
640
641	md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
642		|| prev_size	   != mdev->ldev->md.md_size_sect;
643
644	if (la_size_changed || md_moved) {
645		drbd_al_shrink(mdev); /* All extents inactive. */
646		dev_info(DEV, "Writing the whole bitmap, %s\n",
647			 la_size_changed && md_moved ? "size changed and md moved" :
648			 la_size_changed ? "size changed" : "md moved");
649		rv = drbd_bitmap_io(mdev, &drbd_bm_write, "size changed"); /* does drbd_resume_io() ! */
650		drbd_md_mark_dirty(mdev);
651	}
652
653	if (size > la_size)
654		rv = grew;
655	if (size < la_size)
656		rv = shrunk;
657out:
658	lc_unlock(mdev->act_log);
659	wake_up(&mdev->al_wait);
660	drbd_resume_io(mdev);
661
662	return rv;
663}
664
665sector_t
666drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev, int assume_peer_has_space)
667{
668	sector_t p_size = mdev->p_size;   /* partner's disk size. */
669	sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
670	sector_t m_size; /* my size */
671	sector_t u_size = bdev->dc.disk_size; /* size requested by user. */
672	sector_t size = 0;
673
674	m_size = drbd_get_max_capacity(bdev);
675
676	if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
677		dev_warn(DEV, "Resize while not connected was forced by the user!\n");
678		p_size = m_size;
679	}
680
681	if (p_size && m_size) {
682		size = min_t(sector_t, p_size, m_size);
683	} else {
684		if (la_size) {
685			size = la_size;
686			if (m_size && m_size < size)
687				size = m_size;
688			if (p_size && p_size < size)
689				size = p_size;
690		} else {
691			if (m_size)
692				size = m_size;
693			if (p_size)
694				size = p_size;
695		}
696	}
697
698	if (size == 0)
699		dev_err(DEV, "Both nodes diskless!\n");
700
701	if (u_size) {
702		if (u_size > size)
703			dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
704			    (unsigned long)u_size>>1, (unsigned long)size>>1);
705		else
706			size = u_size;
707	}
708
709	return size;
710}
711
712/**
713 * drbd_check_al_size() - Ensures that the AL is of the right size
714 * @mdev:	DRBD device.
715 *
716 * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
717 * failed, and 0 on success. You should call drbd_md_sync() after you called
718 * this function.
719 */
720static int drbd_check_al_size(struct drbd_conf *mdev)
721{
722	struct lru_cache *n, *t;
723	struct lc_element *e;
724	unsigned int in_use;
725	int i;
726
727	ERR_IF(mdev->sync_conf.al_extents < 7)
728		mdev->sync_conf.al_extents = 127;
729
730	if (mdev->act_log &&
731	    mdev->act_log->nr_elements == mdev->sync_conf.al_extents)
732		return 0;
733
734	in_use = 0;
735	t = mdev->act_log;
736	n = lc_create("act_log", drbd_al_ext_cache,
737		mdev->sync_conf.al_extents, sizeof(struct lc_element), 0);
738
739	if (n == NULL) {
740		dev_err(DEV, "Cannot allocate act_log lru!\n");
741		return -ENOMEM;
742	}
743	spin_lock_irq(&mdev->al_lock);
744	if (t) {
745		for (i = 0; i < t->nr_elements; i++) {
746			e = lc_element_by_index(t, i);
747			if (e->refcnt)
748				dev_err(DEV, "refcnt(%d)==%d\n",
749				    e->lc_number, e->refcnt);
750			in_use += e->refcnt;
751		}
752	}
753	if (!in_use)
754		mdev->act_log = n;
755	spin_unlock_irq(&mdev->al_lock);
756	if (in_use) {
757		dev_err(DEV, "Activity log still in use!\n");
758		lc_destroy(n);
759		return -EBUSY;
760	} else {
761		if (t)
762			lc_destroy(t);
763	}
764	drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
765	return 0;
766}
767
768void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_seg_s) __must_hold(local)
769{
770	struct request_queue * const q = mdev->rq_queue;
771	struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
772	int max_segments = mdev->ldev->dc.max_bio_bvecs;
773
774	max_seg_s = min(queue_max_sectors(b) * queue_logical_block_size(b), max_seg_s);
775
776	blk_queue_max_hw_sectors(q, max_seg_s >> 9);
777	blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
778	blk_queue_max_segment_size(q, max_seg_s);
779	blk_queue_logical_block_size(q, 512);
780	blk_queue_segment_boundary(q, PAGE_SIZE-1);
781	blk_stack_limits(&q->limits, &b->limits, 0);
782
783	dev_info(DEV, "max_segment_size ( = BIO size ) = %u\n", queue_max_segment_size(q));
784
785	if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
786		dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
787		     q->backing_dev_info.ra_pages,
788		     b->backing_dev_info.ra_pages);
789		q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
790	}
791}
792
793/* serialize deconfig (worker exiting, doing cleanup)
794 * and reconfig (drbdsetup disk, drbdsetup net)
795 *
796 * Wait for a potentially exiting worker, then restart it,
797 * or start a new one.  Flush any pending work, there may still be an
798 * after_state_change queued.
799 */
800static void drbd_reconfig_start(struct drbd_conf *mdev)
801{
802	wait_event(mdev->state_wait, !test_and_set_bit(CONFIG_PENDING, &mdev->flags));
803	wait_event(mdev->state_wait, !test_bit(DEVICE_DYING, &mdev->flags));
804	drbd_thread_start(&mdev->worker);
805	drbd_flush_workqueue(mdev);
806}
807
808/* if still unconfigured, stops worker again.
809 * if configured now, clears CONFIG_PENDING.
810 * wakes potential waiters */
811static void drbd_reconfig_done(struct drbd_conf *mdev)
812{
813	spin_lock_irq(&mdev->req_lock);
814	if (mdev->state.disk == D_DISKLESS &&
815	    mdev->state.conn == C_STANDALONE &&
816	    mdev->state.role == R_SECONDARY) {
817		set_bit(DEVICE_DYING, &mdev->flags);
818		drbd_thread_stop_nowait(&mdev->worker);
819	} else
820		clear_bit(CONFIG_PENDING, &mdev->flags);
821	spin_unlock_irq(&mdev->req_lock);
822	wake_up(&mdev->state_wait);
823}
824
825/* Make sure IO is suspended before calling this function(). */
826static void drbd_suspend_al(struct drbd_conf *mdev)
827{
828	int s = 0;
829
830	if (lc_try_lock(mdev->act_log)) {
831		drbd_al_shrink(mdev);
832		lc_unlock(mdev->act_log);
833	} else {
834		dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n");
835		return;
836	}
837
838	spin_lock_irq(&mdev->req_lock);
839	if (mdev->state.conn < C_CONNECTED)
840		s = !test_and_set_bit(AL_SUSPENDED, &mdev->flags);
841
842	spin_unlock_irq(&mdev->req_lock);
843
844	if (s)
845		dev_info(DEV, "Suspended AL updates\n");
846}
847
848/* does always return 0;
849 * interesting return code is in reply->ret_code */
850static int drbd_nl_disk_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
851			     struct drbd_nl_cfg_reply *reply)
852{
853	enum drbd_ret_codes retcode;
854	enum determine_dev_size dd;
855	sector_t max_possible_sectors;
856	sector_t min_md_device_sectors;
857	struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
858	struct block_device *bdev;
859	struct lru_cache *resync_lru = NULL;
860	union drbd_state ns, os;
861	unsigned int max_seg_s;
862	int rv;
863	int cp_discovered = 0;
864	int logical_block_size;
865
866	drbd_reconfig_start(mdev);
867
868	/* if you want to reconfigure, please tear down first */
869	if (mdev->state.disk > D_DISKLESS) {
870		retcode = ERR_DISK_CONFIGURED;
871		goto fail;
872	}
873
874	/* allocation not in the IO path, cqueue thread context */
875	nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
876	if (!nbc) {
877		retcode = ERR_NOMEM;
878		goto fail;
879	}
880
881	nbc->dc.disk_size     = DRBD_DISK_SIZE_SECT_DEF;
882	nbc->dc.on_io_error   = DRBD_ON_IO_ERROR_DEF;
883	nbc->dc.fencing       = DRBD_FENCING_DEF;
884	nbc->dc.max_bio_bvecs = DRBD_MAX_BIO_BVECS_DEF;
885
886	if (!disk_conf_from_tags(mdev, nlp->tag_list, &nbc->dc)) {
887		retcode = ERR_MANDATORY_TAG;
888		goto fail;
889	}
890
891	if (nbc->dc.meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
892		retcode = ERR_MD_IDX_INVALID;
893		goto fail;
894	}
895
896	if (get_net_conf(mdev)) {
897		int prot = mdev->net_conf->wire_protocol;
898		put_net_conf(mdev);
899		if (nbc->dc.fencing == FP_STONITH && prot == DRBD_PROT_A) {
900			retcode = ERR_STONITH_AND_PROT_A;
901			goto fail;
902		}
903	}
904
905	bdev = open_bdev_exclusive(nbc->dc.backing_dev,
906				   FMODE_READ | FMODE_WRITE, mdev);
907	if (IS_ERR(bdev)) {
908		dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.backing_dev,
909			PTR_ERR(bdev));
910		retcode = ERR_OPEN_DISK;
911		goto fail;
912	}
913	nbc->backing_bdev = bdev;
914
915	/*
916	 * meta_dev_idx >= 0: external fixed size, possibly multiple
917	 * drbd sharing one meta device.  TODO in that case, paranoia
918	 * check that [md_bdev, meta_dev_idx] is not yet used by some
919	 * other drbd minor!  (if you use drbd.conf + drbdadm, that
920	 * should check it for you already; but if you don't, or
921	 * someone fooled it, we need to double check here)
922	 */
923	bdev = open_bdev_exclusive(nbc->dc.meta_dev,
924				   FMODE_READ | FMODE_WRITE,
925				   (nbc->dc.meta_dev_idx < 0) ?
926				   (void *)mdev : (void *)drbd_m_holder);
927	if (IS_ERR(bdev)) {
928		dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.meta_dev,
929			PTR_ERR(bdev));
930		retcode = ERR_OPEN_MD_DISK;
931		goto fail;
932	}
933	nbc->md_bdev = bdev;
934
935	if ((nbc->backing_bdev == nbc->md_bdev) !=
936	    (nbc->dc.meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
937	     nbc->dc.meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
938		retcode = ERR_MD_IDX_INVALID;
939		goto fail;
940	}
941
942	resync_lru = lc_create("resync", drbd_bm_ext_cache,
943			61, sizeof(struct bm_extent),
944			offsetof(struct bm_extent, lce));
945	if (!resync_lru) {
946		retcode = ERR_NOMEM;
947		goto fail;
948	}
949
950	/* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
951	drbd_md_set_sector_offsets(mdev, nbc);
952
953	if (drbd_get_max_capacity(nbc) < nbc->dc.disk_size) {
954		dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
955			(unsigned long long) drbd_get_max_capacity(nbc),
956			(unsigned long long) nbc->dc.disk_size);
957		retcode = ERR_DISK_TO_SMALL;
958		goto fail;
959	}
960
961	if (nbc->dc.meta_dev_idx < 0) {
962		max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
963		/* at least one MB, otherwise it does not make sense */
964		min_md_device_sectors = (2<<10);
965	} else {
966		max_possible_sectors = DRBD_MAX_SECTORS;
967		min_md_device_sectors = MD_RESERVED_SECT * (nbc->dc.meta_dev_idx + 1);
968	}
969
970	if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
971		retcode = ERR_MD_DISK_TO_SMALL;
972		dev_warn(DEV, "refusing attach: md-device too small, "
973		     "at least %llu sectors needed for this meta-disk type\n",
974		     (unsigned long long) min_md_device_sectors);
975		goto fail;
976	}
977
978	/* Make sure the new disk is big enough
979	 * (we may currently be R_PRIMARY with no local disk...) */
980	if (drbd_get_max_capacity(nbc) <
981	    drbd_get_capacity(mdev->this_bdev)) {
982		retcode = ERR_DISK_TO_SMALL;
983		goto fail;
984	}
985
986	nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
987
988	if (nbc->known_size > max_possible_sectors) {
989		dev_warn(DEV, "==> truncating very big lower level device "
990			"to currently maximum possible %llu sectors <==\n",
991			(unsigned long long) max_possible_sectors);
992		if (nbc->dc.meta_dev_idx >= 0)
993			dev_warn(DEV, "==>> using internal or flexible "
994				      "meta data may help <<==\n");
995	}
996
997	drbd_suspend_io(mdev);
998	/* also wait for the last barrier ack. */
999	wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || is_susp(mdev->state));
1000	/* and for any other previously queued work */
1001	drbd_flush_workqueue(mdev);
1002
1003	retcode = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
1004	drbd_resume_io(mdev);
1005	if (retcode < SS_SUCCESS)
1006		goto fail;
1007
1008	if (!get_ldev_if_state(mdev, D_ATTACHING))
1009		goto force_diskless;
1010
1011	drbd_md_set_sector_offsets(mdev, nbc);
1012
1013	/* allocate a second IO page if logical_block_size != 512 */
1014	logical_block_size = bdev_logical_block_size(nbc->md_bdev);
1015	if (logical_block_size == 0)
1016		logical_block_size = MD_SECTOR_SIZE;
1017
1018	if (logical_block_size != MD_SECTOR_SIZE) {
1019		if (!mdev->md_io_tmpp) {
1020			struct page *page = alloc_page(GFP_NOIO);
1021			if (!page)
1022				goto force_diskless_dec;
1023
1024			dev_warn(DEV, "Meta data's bdev logical_block_size = %d != %d\n",
1025			     logical_block_size, MD_SECTOR_SIZE);
1026			dev_warn(DEV, "Workaround engaged (has performance impact).\n");
1027
1028			mdev->md_io_tmpp = page;
1029		}
1030	}
1031
1032	if (!mdev->bitmap) {
1033		if (drbd_bm_init(mdev)) {
1034			retcode = ERR_NOMEM;
1035			goto force_diskless_dec;
1036		}
1037	}
1038
1039	retcode = drbd_md_read(mdev, nbc);
1040	if (retcode != NO_ERROR)
1041		goto force_diskless_dec;
1042
1043	if (mdev->state.conn < C_CONNECTED &&
1044	    mdev->state.role == R_PRIMARY &&
1045	    (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
1046		dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
1047		    (unsigned long long)mdev->ed_uuid);
1048		retcode = ERR_DATA_NOT_CURRENT;
1049		goto force_diskless_dec;
1050	}
1051
1052	/* Since we are diskless, fix the activity log first... */
1053	if (drbd_check_al_size(mdev)) {
1054		retcode = ERR_NOMEM;
1055		goto force_diskless_dec;
1056	}
1057
1058	/* Prevent shrinking of consistent devices ! */
1059	if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
1060	    drbd_new_dev_size(mdev, nbc, 0) < nbc->md.la_size_sect) {
1061		dev_warn(DEV, "refusing to truncate a consistent device\n");
1062		retcode = ERR_DISK_TO_SMALL;
1063		goto force_diskless_dec;
1064	}
1065
1066	if (!drbd_al_read_log(mdev, nbc)) {
1067		retcode = ERR_IO_MD_DISK;
1068		goto force_diskless_dec;
1069	}
1070
1071	/* Reset the "barriers don't work" bits here, then force meta data to
1072	 * be written, to ensure we determine if barriers are supported. */
1073	if (nbc->dc.no_md_flush)
1074		set_bit(MD_NO_BARRIER, &mdev->flags);
1075	else
1076		clear_bit(MD_NO_BARRIER, &mdev->flags);
1077
1078	/* Point of no return reached.
1079	 * Devices and memory are no longer released by error cleanup below.
1080	 * now mdev takes over responsibility, and the state engine should
1081	 * clean it up somewhere.  */
1082	D_ASSERT(mdev->ldev == NULL);
1083	mdev->ldev = nbc;
1084	mdev->resync = resync_lru;
1085	nbc = NULL;
1086	resync_lru = NULL;
1087
1088	mdev->write_ordering = WO_bio_barrier;
1089	drbd_bump_write_ordering(mdev, WO_bio_barrier);
1090
1091	if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
1092		set_bit(CRASHED_PRIMARY, &mdev->flags);
1093	else
1094		clear_bit(CRASHED_PRIMARY, &mdev->flags);
1095
1096	if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1097	    !(mdev->state.role == R_PRIMARY && mdev->state.susp_nod)) {
1098		set_bit(CRASHED_PRIMARY, &mdev->flags);
1099		cp_discovered = 1;
1100	}
1101
1102	mdev->send_cnt = 0;
1103	mdev->recv_cnt = 0;
1104	mdev->read_cnt = 0;
1105	mdev->writ_cnt = 0;
1106
1107	max_seg_s = DRBD_MAX_SEGMENT_SIZE;
1108	if (mdev->state.conn == C_CONNECTED) {
1109		/* We are Primary, Connected, and now attach a new local
1110		 * backing store. We must not increase the user visible maximum
1111		 * bio size on this device to something the peer may not be
1112		 * able to handle. */
1113		if (mdev->agreed_pro_version < 94)
1114			max_seg_s = queue_max_segment_size(mdev->rq_queue);
1115		else if (mdev->agreed_pro_version == 94)
1116			max_seg_s = DRBD_MAX_SIZE_H80_PACKET;
1117		/* else: drbd 8.3.9 and later, stay with default */
1118	}
1119
1120	drbd_setup_queue_param(mdev, max_seg_s);
1121
1122	/* If I am currently not R_PRIMARY,
1123	 * but meta data primary indicator is set,
1124	 * I just now recover from a hard crash,
1125	 * and have been R_PRIMARY before that crash.
1126	 *
1127	 * Now, if I had no connection before that crash
1128	 * (have been degraded R_PRIMARY), chances are that
1129	 * I won't find my peer now either.
1130	 *
1131	 * In that case, and _only_ in that case,
1132	 * we use the degr-wfc-timeout instead of the default,
1133	 * so we can automatically recover from a crash of a
1134	 * degraded but active "cluster" after a certain timeout.
1135	 */
1136	clear_bit(USE_DEGR_WFC_T, &mdev->flags);
1137	if (mdev->state.role != R_PRIMARY &&
1138	     drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1139	    !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
1140		set_bit(USE_DEGR_WFC_T, &mdev->flags);
1141
1142	dd = drbd_determin_dev_size(mdev, 0);
1143	if (dd == dev_size_error) {
1144		retcode = ERR_NOMEM_BITMAP;
1145		goto force_diskless_dec;
1146	} else if (dd == grew)
1147		set_bit(RESYNC_AFTER_NEG, &mdev->flags);
1148
1149	if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) {
1150		dev_info(DEV, "Assuming that all blocks are out of sync "
1151		     "(aka FullSync)\n");
1152		if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from attaching")) {
1153			retcode = ERR_IO_MD_DISK;
1154			goto force_diskless_dec;
1155		}
1156	} else {
1157		if (drbd_bitmap_io(mdev, &drbd_bm_read, "read from attaching") < 0) {
1158			retcode = ERR_IO_MD_DISK;
1159			goto force_diskless_dec;
1160		}
1161	}
1162
1163	if (cp_discovered) {
1164		drbd_al_apply_to_bm(mdev);
1165		drbd_al_to_on_disk_bm(mdev);
1166	}
1167
1168	if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev))
1169		drbd_suspend_al(mdev); /* IO is still suspended here... */
1170
1171	spin_lock_irq(&mdev->req_lock);
1172	os = mdev->state;
1173	ns.i = os.i;
1174	/* If MDF_CONSISTENT is not set go into inconsistent state,
1175	   otherwise investigate MDF_WasUpToDate...
1176	   If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
1177	   otherwise into D_CONSISTENT state.
1178	*/
1179	if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
1180		if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
1181			ns.disk = D_CONSISTENT;
1182		else
1183			ns.disk = D_OUTDATED;
1184	} else {
1185		ns.disk = D_INCONSISTENT;
1186	}
1187
1188	if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
1189		ns.pdsk = D_OUTDATED;
1190
1191	if ( ns.disk == D_CONSISTENT &&
1192	    (ns.pdsk == D_OUTDATED || mdev->ldev->dc.fencing == FP_DONT_CARE))
1193		ns.disk = D_UP_TO_DATE;
1194
1195	/* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
1196	   MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
1197	   this point, because drbd_request_state() modifies these
1198	   flags. */
1199
1200	/* In case we are C_CONNECTED postpone any decision on the new disk
1201	   state after the negotiation phase. */
1202	if (mdev->state.conn == C_CONNECTED) {
1203		mdev->new_state_tmp.i = ns.i;
1204		ns.i = os.i;
1205		ns.disk = D_NEGOTIATING;
1206
1207		/* We expect to receive up-to-date UUIDs soon.
1208		   To avoid a race in receive_state, free p_uuid while
1209		   holding req_lock. I.e. atomic with the state change */
1210		kfree(mdev->p_uuid);
1211		mdev->p_uuid = NULL;
1212	}
1213
1214	rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
1215	ns = mdev->state;
1216	spin_unlock_irq(&mdev->req_lock);
1217
1218	if (rv < SS_SUCCESS)
1219		goto force_diskless_dec;
1220
1221	if (mdev->state.role == R_PRIMARY)
1222		mdev->ldev->md.uuid[UI_CURRENT] |=  (u64)1;
1223	else
1224		mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
1225
1226	drbd_md_mark_dirty(mdev);
1227	drbd_md_sync(mdev);
1228
1229	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1230	put_ldev(mdev);
1231	reply->ret_code = retcode;
1232	drbd_reconfig_done(mdev);
1233	return 0;
1234
1235 force_diskless_dec:
1236	put_ldev(mdev);
1237 force_diskless:
1238	drbd_force_state(mdev, NS(disk, D_DISKLESS));
1239	drbd_md_sync(mdev);
1240 fail:
1241	if (nbc) {
1242		if (nbc->backing_bdev)
1243			blkdev_put(nbc->backing_bdev,
1244				   FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1245		if (nbc->md_bdev)
1246			blkdev_put(nbc->md_bdev,
1247				   FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1248		kfree(nbc);
1249	}
1250	lc_destroy(resync_lru);
1251
1252	reply->ret_code = retcode;
1253	drbd_reconfig_done(mdev);
1254	return 0;
1255}
1256
1257static int drbd_nl_detach(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1258			  struct drbd_nl_cfg_reply *reply)
1259{
1260	reply->ret_code = drbd_request_state(mdev, NS(disk, D_DISKLESS));
1261	return 0;
1262}
1263
1264static int drbd_nl_net_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1265			    struct drbd_nl_cfg_reply *reply)
1266{
1267	int i, ns;
1268	enum drbd_ret_codes retcode;
1269	struct net_conf *new_conf = NULL;
1270	struct crypto_hash *tfm = NULL;
1271	struct crypto_hash *integrity_w_tfm = NULL;
1272	struct crypto_hash *integrity_r_tfm = NULL;
1273	struct hlist_head *new_tl_hash = NULL;
1274	struct hlist_head *new_ee_hash = NULL;
1275	struct drbd_conf *odev;
1276	char hmac_name[CRYPTO_MAX_ALG_NAME];
1277	void *int_dig_out = NULL;
1278	void *int_dig_in = NULL;
1279	void *int_dig_vv = NULL;
1280	struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr;
1281
1282	drbd_reconfig_start(mdev);
1283
1284	if (mdev->state.conn > C_STANDALONE) {
1285		retcode = ERR_NET_CONFIGURED;
1286		goto fail;
1287	}
1288
1289	/* allocation not in the IO path, cqueue thread context */
1290	new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
1291	if (!new_conf) {
1292		retcode = ERR_NOMEM;
1293		goto fail;
1294	}
1295
1296	new_conf->timeout	   = DRBD_TIMEOUT_DEF;
1297	new_conf->try_connect_int  = DRBD_CONNECT_INT_DEF;
1298	new_conf->ping_int	   = DRBD_PING_INT_DEF;
1299	new_conf->max_epoch_size   = DRBD_MAX_EPOCH_SIZE_DEF;
1300	new_conf->max_buffers	   = DRBD_MAX_BUFFERS_DEF;
1301	new_conf->unplug_watermark = DRBD_UNPLUG_WATERMARK_DEF;
1302	new_conf->sndbuf_size	   = DRBD_SNDBUF_SIZE_DEF;
1303	new_conf->rcvbuf_size	   = DRBD_RCVBUF_SIZE_DEF;
1304	new_conf->ko_count	   = DRBD_KO_COUNT_DEF;
1305	new_conf->after_sb_0p	   = DRBD_AFTER_SB_0P_DEF;
1306	new_conf->after_sb_1p	   = DRBD_AFTER_SB_1P_DEF;
1307	new_conf->after_sb_2p	   = DRBD_AFTER_SB_2P_DEF;
1308	new_conf->want_lose	   = 0;
1309	new_conf->two_primaries    = 0;
1310	new_conf->wire_protocol    = DRBD_PROT_C;
1311	new_conf->ping_timeo	   = DRBD_PING_TIMEO_DEF;
1312	new_conf->rr_conflict	   = DRBD_RR_CONFLICT_DEF;
1313
1314	if (!net_conf_from_tags(mdev, nlp->tag_list, new_conf)) {
1315		retcode = ERR_MANDATORY_TAG;
1316		goto fail;
1317	}
1318
1319	if (new_conf->two_primaries
1320	    && (new_conf->wire_protocol != DRBD_PROT_C)) {
1321		retcode = ERR_NOT_PROTO_C;
1322		goto fail;
1323	}
1324
1325	if (get_ldev(mdev)) {
1326		enum drbd_fencing_p fp = mdev->ldev->dc.fencing;
1327		put_ldev(mdev);
1328		if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH) {
1329			retcode = ERR_STONITH_AND_PROT_A;
1330			goto fail;
1331		}
1332	}
1333
1334	if (mdev->state.role == R_PRIMARY && new_conf->want_lose) {
1335		retcode = ERR_DISCARD;
1336		goto fail;
1337	}
1338
1339	retcode = NO_ERROR;
1340
1341	new_my_addr = (struct sockaddr *)&new_conf->my_addr;
1342	new_peer_addr = (struct sockaddr *)&new_conf->peer_addr;
1343	for (i = 0; i < minor_count; i++) {
1344		odev = minor_to_mdev(i);
1345		if (!odev || odev == mdev)
1346			continue;
1347		if (get_net_conf(odev)) {
1348			taken_addr = (struct sockaddr *)&odev->net_conf->my_addr;
1349			if (new_conf->my_addr_len == odev->net_conf->my_addr_len &&
1350			    !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len))
1351				retcode = ERR_LOCAL_ADDR;
1352
1353			taken_addr = (struct sockaddr *)&odev->net_conf->peer_addr;
1354			if (new_conf->peer_addr_len == odev->net_conf->peer_addr_len &&
1355			    !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len))
1356				retcode = ERR_PEER_ADDR;
1357
1358			put_net_conf(odev);
1359			if (retcode != NO_ERROR)
1360				goto fail;
1361		}
1362	}
1363
1364	if (new_conf->cram_hmac_alg[0] != 0) {
1365		snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
1366			new_conf->cram_hmac_alg);
1367		tfm = crypto_alloc_hash(hmac_name, 0, CRYPTO_ALG_ASYNC);
1368		if (IS_ERR(tfm)) {
1369			tfm = NULL;
1370			retcode = ERR_AUTH_ALG;
1371			goto fail;
1372		}
1373
1374		if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
1375			retcode = ERR_AUTH_ALG_ND;
1376			goto fail;
1377		}
1378	}
1379
1380	if (new_conf->integrity_alg[0]) {
1381		integrity_w_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
1382		if (IS_ERR(integrity_w_tfm)) {
1383			integrity_w_tfm = NULL;
1384			retcode=ERR_INTEGRITY_ALG;
1385			goto fail;
1386		}
1387
1388		if (!drbd_crypto_is_hash(crypto_hash_tfm(integrity_w_tfm))) {
1389			retcode=ERR_INTEGRITY_ALG_ND;
1390			goto fail;
1391		}
1392
1393		integrity_r_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
1394		if (IS_ERR(integrity_r_tfm)) {
1395			integrity_r_tfm = NULL;
1396			retcode=ERR_INTEGRITY_ALG;
1397			goto fail;
1398		}
1399	}
1400
1401	ns = new_conf->max_epoch_size/8;
1402	if (mdev->tl_hash_s != ns) {
1403		new_tl_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
1404		if (!new_tl_hash) {
1405			retcode = ERR_NOMEM;
1406			goto fail;
1407		}
1408	}
1409
1410	ns = new_conf->max_buffers/8;
1411	if (new_conf->two_primaries && (mdev->ee_hash_s != ns)) {
1412		new_ee_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
1413		if (!new_ee_hash) {
1414			retcode = ERR_NOMEM;
1415			goto fail;
1416		}
1417	}
1418
1419	((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
1420
1421	if (integrity_w_tfm) {
1422		i = crypto_hash_digestsize(integrity_w_tfm);
1423		int_dig_out = kmalloc(i, GFP_KERNEL);
1424		if (!int_dig_out) {
1425			retcode = ERR_NOMEM;
1426			goto fail;
1427		}
1428		int_dig_in = kmalloc(i, GFP_KERNEL);
1429		if (!int_dig_in) {
1430			retcode = ERR_NOMEM;
1431			goto fail;
1432		}
1433		int_dig_vv = kmalloc(i, GFP_KERNEL);
1434		if (!int_dig_vv) {
1435			retcode = ERR_NOMEM;
1436			goto fail;
1437		}
1438	}
1439
1440	if (!mdev->bitmap) {
1441		if(drbd_bm_init(mdev)) {
1442			retcode = ERR_NOMEM;
1443			goto fail;
1444		}
1445	}
1446
1447	drbd_flush_workqueue(mdev);
1448	spin_lock_irq(&mdev->req_lock);
1449	if (mdev->net_conf != NULL) {
1450		retcode = ERR_NET_CONFIGURED;
1451		spin_unlock_irq(&mdev->req_lock);
1452		goto fail;
1453	}
1454	mdev->net_conf = new_conf;
1455
1456	mdev->send_cnt = 0;
1457	mdev->recv_cnt = 0;
1458
1459	if (new_tl_hash) {
1460		kfree(mdev->tl_hash);
1461		mdev->tl_hash_s = mdev->net_conf->max_epoch_size/8;
1462		mdev->tl_hash = new_tl_hash;
1463	}
1464
1465	if (new_ee_hash) {
1466		kfree(mdev->ee_hash);
1467		mdev->ee_hash_s = mdev->net_conf->max_buffers/8;
1468		mdev->ee_hash = new_ee_hash;
1469	}
1470
1471	crypto_free_hash(mdev->cram_hmac_tfm);
1472	mdev->cram_hmac_tfm = tfm;
1473
1474	crypto_free_hash(mdev->integrity_w_tfm);
1475	mdev->integrity_w_tfm = integrity_w_tfm;
1476
1477	crypto_free_hash(mdev->integrity_r_tfm);
1478	mdev->integrity_r_tfm = integrity_r_tfm;
1479
1480	kfree(mdev->int_dig_out);
1481	kfree(mdev->int_dig_in);
1482	kfree(mdev->int_dig_vv);
1483	mdev->int_dig_out=int_dig_out;
1484	mdev->int_dig_in=int_dig_in;
1485	mdev->int_dig_vv=int_dig_vv;
1486	retcode = _drbd_set_state(_NS(mdev, conn, C_UNCONNECTED), CS_VERBOSE, NULL);
1487	spin_unlock_irq(&mdev->req_lock);
1488
1489	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1490	reply->ret_code = retcode;
1491	drbd_reconfig_done(mdev);
1492	return 0;
1493
1494fail:
1495	kfree(int_dig_out);
1496	kfree(int_dig_in);
1497	kfree(int_dig_vv);
1498	crypto_free_hash(tfm);
1499	crypto_free_hash(integrity_w_tfm);
1500	crypto_free_hash(integrity_r_tfm);
1501	kfree(new_tl_hash);
1502	kfree(new_ee_hash);
1503	kfree(new_conf);
1504
1505	reply->ret_code = retcode;
1506	drbd_reconfig_done(mdev);
1507	return 0;
1508}
1509
1510static int drbd_nl_disconnect(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1511			      struct drbd_nl_cfg_reply *reply)
1512{
1513	int retcode;
1514
1515	retcode = _drbd_request_state(mdev, NS(conn, C_DISCONNECTING), CS_ORDERED);
1516
1517	if (retcode == SS_NOTHING_TO_DO)
1518		goto done;
1519	else if (retcode == SS_ALREADY_STANDALONE)
1520		goto done;
1521	else if (retcode == SS_PRIMARY_NOP) {
1522		/* Our statche checking code wants to see the peer outdated. */
1523		retcode = drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
1524						      pdsk, D_OUTDATED));
1525	} else if (retcode == SS_CW_FAILED_BY_PEER) {
1526		/* The peer probably wants to see us outdated. */
1527		retcode = _drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
1528							disk, D_OUTDATED),
1529					      CS_ORDERED);
1530		if (retcode == SS_IS_DISKLESS || retcode == SS_LOWER_THAN_OUTDATED) {
1531			drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
1532			retcode = SS_SUCCESS;
1533		}
1534	}
1535
1536	if (retcode < SS_SUCCESS)
1537		goto fail;
1538
1539	if (wait_event_interruptible(mdev->state_wait,
1540				     mdev->state.conn != C_DISCONNECTING)) {
1541		/* Do not test for mdev->state.conn == C_STANDALONE, since
1542		   someone else might connect us in the mean time! */
1543		retcode = ERR_INTR;
1544		goto fail;
1545	}
1546
1547 done:
1548	retcode = NO_ERROR;
1549 fail:
1550	drbd_md_sync(mdev);
1551	reply->ret_code = retcode;
1552	return 0;
1553}
1554
1555void resync_after_online_grow(struct drbd_conf *mdev)
1556{
1557	int iass; /* I am sync source */
1558
1559	dev_info(DEV, "Resync of new storage after online grow\n");
1560	if (mdev->state.role != mdev->state.peer)
1561		iass = (mdev->state.role == R_PRIMARY);
1562	else
1563		iass = test_bit(DISCARD_CONCURRENT, &mdev->flags);
1564
1565	if (iass)
1566		drbd_start_resync(mdev, C_SYNC_SOURCE);
1567	else
1568		_drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
1569}
1570
1571static int drbd_nl_resize(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1572			  struct drbd_nl_cfg_reply *reply)
1573{
1574	struct resize rs;
1575	int retcode = NO_ERROR;
1576	enum determine_dev_size dd;
1577	enum dds_flags ddsf;
1578
1579	memset(&rs, 0, sizeof(struct resize));
1580	if (!resize_from_tags(mdev, nlp->tag_list, &rs)) {
1581		retcode = ERR_MANDATORY_TAG;
1582		goto fail;
1583	}
1584
1585	if (mdev->state.conn > C_CONNECTED) {
1586		retcode = ERR_RESIZE_RESYNC;
1587		goto fail;
1588	}
1589
1590	if (mdev->state.role == R_SECONDARY &&
1591	    mdev->state.peer == R_SECONDARY) {
1592		retcode = ERR_NO_PRIMARY;
1593		goto fail;
1594	}
1595
1596	if (!get_ldev(mdev)) {
1597		retcode = ERR_NO_DISK;
1598		goto fail;
1599	}
1600
1601	if (rs.no_resync && mdev->agreed_pro_version < 93) {
1602		retcode = ERR_NEED_APV_93;
1603		goto fail;
1604	}
1605
1606	if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev))
1607		mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
1608
1609	mdev->ldev->dc.disk_size = (sector_t)rs.resize_size;
1610	ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0);
1611	dd = drbd_determin_dev_size(mdev, ddsf);
1612	drbd_md_sync(mdev);
1613	put_ldev(mdev);
1614	if (dd == dev_size_error) {
1615		retcode = ERR_NOMEM_BITMAP;
1616		goto fail;
1617	}
1618
1619	if (mdev->state.conn == C_CONNECTED) {
1620		if (dd == grew)
1621			set_bit(RESIZE_PENDING, &mdev->flags);
1622
1623		drbd_send_uuids(mdev);
1624		drbd_send_sizes(mdev, 1, ddsf);
1625	}
1626
1627 fail:
1628	reply->ret_code = retcode;
1629	return 0;
1630}
1631
1632static int drbd_nl_syncer_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1633			       struct drbd_nl_cfg_reply *reply)
1634{
1635	int retcode = NO_ERROR;
1636	int err;
1637	int ovr; /* online verify running */
1638	int rsr; /* re-sync running */
1639	struct crypto_hash *verify_tfm = NULL;
1640	struct crypto_hash *csums_tfm = NULL;
1641	struct syncer_conf sc;
1642	cpumask_var_t new_cpu_mask;
1643	int *rs_plan_s = NULL;
1644	int fifo_size;
1645
1646	if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) {
1647		retcode = ERR_NOMEM;
1648		goto fail;
1649	}
1650
1651	if (nlp->flags & DRBD_NL_SET_DEFAULTS) {
1652		memset(&sc, 0, sizeof(struct syncer_conf));
1653		sc.rate       = DRBD_RATE_DEF;
1654		sc.after      = DRBD_AFTER_DEF;
1655		sc.al_extents = DRBD_AL_EXTENTS_DEF;
1656		sc.on_no_data  = DRBD_ON_NO_DATA_DEF;
1657		sc.c_plan_ahead = DRBD_C_PLAN_AHEAD_DEF;
1658		sc.c_delay_target = DRBD_C_DELAY_TARGET_DEF;
1659		sc.c_fill_target = DRBD_C_FILL_TARGET_DEF;
1660		sc.c_max_rate = DRBD_C_MAX_RATE_DEF;
1661		sc.c_min_rate = DRBD_C_MIN_RATE_DEF;
1662	} else
1663		memcpy(&sc, &mdev->sync_conf, sizeof(struct syncer_conf));
1664
1665	if (!syncer_conf_from_tags(mdev, nlp->tag_list, &sc)) {
1666		retcode = ERR_MANDATORY_TAG;
1667		goto fail;
1668	}
1669
1670	/* re-sync running */
1671	rsr = (	mdev->state.conn == C_SYNC_SOURCE ||
1672		mdev->state.conn == C_SYNC_TARGET ||
1673		mdev->state.conn == C_PAUSED_SYNC_S ||
1674		mdev->state.conn == C_PAUSED_SYNC_T );
1675
1676	if (rsr && strcmp(sc.csums_alg, mdev->sync_conf.csums_alg)) {
1677		retcode = ERR_CSUMS_RESYNC_RUNNING;
1678		goto fail;
1679	}
1680
1681	if (!rsr && sc.csums_alg[0]) {
1682		csums_tfm = crypto_alloc_hash(sc.csums_alg, 0, CRYPTO_ALG_ASYNC);
1683		if (IS_ERR(csums_tfm)) {
1684			csums_tfm = NULL;
1685			retcode = ERR_CSUMS_ALG;
1686			goto fail;
1687		}
1688
1689		if (!drbd_crypto_is_hash(crypto_hash_tfm(csums_tfm))) {
1690			retcode = ERR_CSUMS_ALG_ND;
1691			goto fail;
1692		}
1693	}
1694
1695	/* online verify running */
1696	ovr = (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T);
1697
1698	if (ovr) {
1699		if (strcmp(sc.verify_alg, mdev->sync_conf.verify_alg)) {
1700			retcode = ERR_VERIFY_RUNNING;
1701			goto fail;
1702		}
1703	}
1704
1705	if (!ovr && sc.verify_alg[0]) {
1706		verify_tfm = crypto_alloc_hash(sc.verify_alg, 0, CRYPTO_ALG_ASYNC);
1707		if (IS_ERR(verify_tfm)) {
1708			verify_tfm = NULL;
1709			retcode = ERR_VERIFY_ALG;
1710			goto fail;
1711		}
1712
1713		if (!drbd_crypto_is_hash(crypto_hash_tfm(verify_tfm))) {
1714			retcode = ERR_VERIFY_ALG_ND;
1715			goto fail;
1716		}
1717	}
1718
1719	/* silently ignore cpu mask on UP kernel */
1720	if (nr_cpu_ids > 1 && sc.cpu_mask[0] != 0) {
1721		err = __bitmap_parse(sc.cpu_mask, 32, 0,
1722				cpumask_bits(new_cpu_mask), nr_cpu_ids);
1723		if (err) {
1724			dev_warn(DEV, "__bitmap_parse() failed with %d\n", err);
1725			retcode = ERR_CPU_MASK_PARSE;
1726			goto fail;
1727		}
1728	}
1729
1730	ERR_IF (sc.rate < 1) sc.rate = 1;
1731	ERR_IF (sc.al_extents < 7) sc.al_extents = 127; /* arbitrary minimum */
1732#define AL_MAX ((MD_AL_MAX_SIZE-1) * AL_EXTENTS_PT)
1733	if (sc.al_extents > AL_MAX) {
1734		dev_err(DEV, "sc.al_extents > %d\n", AL_MAX);
1735		sc.al_extents = AL_MAX;
1736	}
1737#undef AL_MAX
1738
1739	/* to avoid spurious errors when configuring minors before configuring
1740	 * the minors they depend on: if necessary, first create the minor we
1741	 * depend on */
1742	if (sc.after >= 0)
1743		ensure_mdev(sc.after, 1);
1744
1745	/* most sanity checks done, try to assign the new sync-after
1746	 * dependency.  need to hold the global lock in there,
1747	 * to avoid a race in the dependency loop check. */
1748	retcode = drbd_alter_sa(mdev, sc.after);
1749	if (retcode != NO_ERROR)
1750		goto fail;
1751
1752	fifo_size = (sc.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
1753	if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
1754		rs_plan_s   = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
1755		if (!rs_plan_s) {
1756			dev_err(DEV, "kmalloc of fifo_buffer failed");
1757			retcode = ERR_NOMEM;
1758			goto fail;
1759		}
1760	}
1761
1762	/* ok, assign the rest of it as well.
1763	 * lock against receive_SyncParam() */
1764	spin_lock(&mdev->peer_seq_lock);
1765	mdev->sync_conf = sc;
1766
1767	if (!rsr) {
1768		crypto_free_hash(mdev->csums_tfm);
1769		mdev->csums_tfm = csums_tfm;
1770		csums_tfm = NULL;
1771	}
1772
1773	if (!ovr) {
1774		crypto_free_hash(mdev->verify_tfm);
1775		mdev->verify_tfm = verify_tfm;
1776		verify_tfm = NULL;
1777	}
1778
1779	if (fifo_size != mdev->rs_plan_s.size) {
1780		kfree(mdev->rs_plan_s.values);
1781		mdev->rs_plan_s.values = rs_plan_s;
1782		mdev->rs_plan_s.size   = fifo_size;
1783		mdev->rs_planed = 0;
1784		rs_plan_s = NULL;
1785	}
1786
1787	spin_unlock(&mdev->peer_seq_lock);
1788
1789	if (get_ldev(mdev)) {
1790		wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
1791		drbd_al_shrink(mdev);
1792		err = drbd_check_al_size(mdev);
1793		lc_unlock(mdev->act_log);
1794		wake_up(&mdev->al_wait);
1795
1796		put_ldev(mdev);
1797		drbd_md_sync(mdev);
1798
1799		if (err) {
1800			retcode = ERR_NOMEM;
1801			goto fail;
1802		}
1803	}
1804
1805	if (mdev->state.conn >= C_CONNECTED)
1806		drbd_send_sync_param(mdev, &sc);
1807
1808	if (!cpumask_equal(mdev->cpu_mask, new_cpu_mask)) {
1809		cpumask_copy(mdev->cpu_mask, new_cpu_mask);
1810		drbd_calc_cpu_mask(mdev);
1811		mdev->receiver.reset_cpu_mask = 1;
1812		mdev->asender.reset_cpu_mask = 1;
1813		mdev->worker.reset_cpu_mask = 1;
1814	}
1815
1816	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1817fail:
1818	kfree(rs_plan_s);
1819	free_cpumask_var(new_cpu_mask);
1820	crypto_free_hash(csums_tfm);
1821	crypto_free_hash(verify_tfm);
1822	reply->ret_code = retcode;
1823	return 0;
1824}
1825
1826static int drbd_nl_invalidate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1827			      struct drbd_nl_cfg_reply *reply)
1828{
1829	int retcode;
1830
1831	retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
1832
1833	if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
1834		retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
1835
1836	while (retcode == SS_NEED_CONNECTION) {
1837		spin_lock_irq(&mdev->req_lock);
1838		if (mdev->state.conn < C_CONNECTED)
1839			retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
1840		spin_unlock_irq(&mdev->req_lock);
1841
1842		if (retcode != SS_NEED_CONNECTION)
1843			break;
1844
1845		retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
1846	}
1847
1848	reply->ret_code = retcode;
1849	return 0;
1850}
1851
1852static int drbd_bmio_set_susp_al(struct drbd_conf *mdev)
1853{
1854	int rv;
1855
1856	rv = drbd_bmio_set_n_write(mdev);
1857	drbd_suspend_al(mdev);
1858	return rv;
1859}
1860
1861static int drbd_nl_invalidate_peer(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1862				   struct drbd_nl_cfg_reply *reply)
1863{
1864	int retcode;
1865
1866	retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S), CS_ORDERED);
1867
1868	if (retcode < SS_SUCCESS) {
1869		if (retcode == SS_NEED_CONNECTION && mdev->state.role == R_PRIMARY) {
1870			/* The peer will get a resync upon connect anyways. Just make that
1871			   into a full resync. */
1872			retcode = drbd_request_state(mdev, NS(pdsk, D_INCONSISTENT));
1873			if (retcode >= SS_SUCCESS) {
1874				/* open coded drbd_bitmap_io() */
1875				if (drbd_bitmap_io(mdev, &drbd_bmio_set_susp_al,
1876						   "set_n_write from invalidate_peer"))
1877					retcode = ERR_IO_MD_DISK;
1878			}
1879		} else
1880			retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S));
1881	}
1882
1883	reply->ret_code = retcode;
1884	return 0;
1885}
1886
1887static int drbd_nl_pause_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1888			      struct drbd_nl_cfg_reply *reply)
1889{
1890	int retcode = NO_ERROR;
1891
1892	if (drbd_request_state(mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
1893		retcode = ERR_PAUSE_IS_SET;
1894
1895	reply->ret_code = retcode;
1896	return 0;
1897}
1898
1899static int drbd_nl_resume_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1900			       struct drbd_nl_cfg_reply *reply)
1901{
1902	int retcode = NO_ERROR;
1903
1904	if (drbd_request_state(mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO)
1905		retcode = ERR_PAUSE_IS_CLEAR;
1906
1907	reply->ret_code = retcode;
1908	return 0;
1909}
1910
1911static int drbd_nl_suspend_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1912			      struct drbd_nl_cfg_reply *reply)
1913{
1914	reply->ret_code = drbd_request_state(mdev, NS(susp, 1));
1915
1916	return 0;
1917}
1918
1919static int drbd_nl_resume_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1920			     struct drbd_nl_cfg_reply *reply)
1921{
1922	if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
1923		drbd_uuid_new_current(mdev);
1924		clear_bit(NEW_CUR_UUID, &mdev->flags);
1925		drbd_md_sync(mdev);
1926	}
1927	drbd_suspend_io(mdev);
1928	reply->ret_code = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0));
1929	if (reply->ret_code == SS_SUCCESS) {
1930		if (mdev->state.conn < C_CONNECTED)
1931			tl_clear(mdev);
1932		if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED)
1933			tl_restart(mdev, fail_frozen_disk_io);
1934	}
1935	drbd_resume_io(mdev);
1936
1937	return 0;
1938}
1939
1940static int drbd_nl_outdate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1941			   struct drbd_nl_cfg_reply *reply)
1942{
1943	reply->ret_code = drbd_request_state(mdev, NS(disk, D_OUTDATED));
1944	return 0;
1945}
1946
1947static int drbd_nl_get_config(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1948			   struct drbd_nl_cfg_reply *reply)
1949{
1950	unsigned short *tl;
1951
1952	tl = reply->tag_list;
1953
1954	if (get_ldev(mdev)) {
1955		tl = disk_conf_to_tags(mdev, &mdev->ldev->dc, tl);
1956		put_ldev(mdev);
1957	}
1958
1959	if (get_net_conf(mdev)) {
1960		tl = net_conf_to_tags(mdev, mdev->net_conf, tl);
1961		put_net_conf(mdev);
1962	}
1963	tl = syncer_conf_to_tags(mdev, &mdev->sync_conf, tl);
1964
1965	put_unaligned(TT_END, tl++); /* Close the tag list */
1966
1967	return (int)((char *)tl - (char *)reply->tag_list);
1968}
1969
1970static int drbd_nl_get_state(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1971			     struct drbd_nl_cfg_reply *reply)
1972{
1973	unsigned short *tl = reply->tag_list;
1974	union drbd_state s = mdev->state;
1975	unsigned long rs_left;
1976	unsigned int res;
1977
1978	tl = get_state_to_tags(mdev, (struct get_state *)&s, tl);
1979
1980	/* no local ref, no bitmap, no syncer progress. */
1981	if (s.conn >= C_SYNC_SOURCE && s.conn <= C_PAUSED_SYNC_T) {
1982		if (get_ldev(mdev)) {
1983			drbd_get_syncer_progress(mdev, &rs_left, &res);
1984			tl = tl_add_int(tl, T_sync_progress, &res);
1985			put_ldev(mdev);
1986		}
1987	}
1988	put_unaligned(TT_END, tl++); /* Close the tag list */
1989
1990	return (int)((char *)tl - (char *)reply->tag_list);
1991}
1992
1993static int drbd_nl_get_uuids(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1994			     struct drbd_nl_cfg_reply *reply)
1995{
1996	unsigned short *tl;
1997
1998	tl = reply->tag_list;
1999
2000	if (get_ldev(mdev)) {
2001		tl = tl_add_blob(tl, T_uuids, mdev->ldev->md.uuid, UI_SIZE*sizeof(u64));
2002		tl = tl_add_int(tl, T_uuids_flags, &mdev->ldev->md.flags);
2003		put_ldev(mdev);
2004	}
2005	put_unaligned(TT_END, tl++); /* Close the tag list */
2006
2007	return (int)((char *)tl - (char *)reply->tag_list);
2008}
2009
2010/**
2011 * drbd_nl_get_timeout_flag() - Used by drbdsetup to find out which timeout value to use
2012 * @mdev:	DRBD device.
2013 * @nlp:	Netlink/connector packet from drbdsetup
2014 * @reply:	Reply packet for drbdsetup
2015 */
2016static int drbd_nl_get_timeout_flag(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2017				    struct drbd_nl_cfg_reply *reply)
2018{
2019	unsigned short *tl;
2020	char rv;
2021
2022	tl = reply->tag_list;
2023
2024	rv = mdev->state.pdsk == D_OUTDATED        ? UT_PEER_OUTDATED :
2025	  test_bit(USE_DEGR_WFC_T, &mdev->flags) ? UT_DEGRADED : UT_DEFAULT;
2026
2027	tl = tl_add_blob(tl, T_use_degraded, &rv, sizeof(rv));
2028	put_unaligned(TT_END, tl++); /* Close the tag list */
2029
2030	return (int)((char *)tl - (char *)reply->tag_list);
2031}
2032
2033static int drbd_nl_start_ov(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2034				    struct drbd_nl_cfg_reply *reply)
2035{
2036	/* default to resume from last known position, if possible */
2037	struct start_ov args =
2038		{ .start_sector = mdev->ov_start_sector };
2039
2040	if (!start_ov_from_tags(mdev, nlp->tag_list, &args)) {
2041		reply->ret_code = ERR_MANDATORY_TAG;
2042		return 0;
2043	}
2044	/* w_make_ov_request expects position to be aligned */
2045	mdev->ov_start_sector = args.start_sector & ~BM_SECT_PER_BIT;
2046	reply->ret_code = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
2047	return 0;
2048}
2049
2050
2051static int drbd_nl_new_c_uuid(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2052			      struct drbd_nl_cfg_reply *reply)
2053{
2054	int retcode = NO_ERROR;
2055	int skip_initial_sync = 0;
2056	int err;
2057
2058	struct new_c_uuid args;
2059
2060	memset(&args, 0, sizeof(struct new_c_uuid));
2061	if (!new_c_uuid_from_tags(mdev, nlp->tag_list, &args)) {
2062		reply->ret_code = ERR_MANDATORY_TAG;
2063		return 0;
2064	}
2065
2066	mutex_lock(&mdev->state_mutex); /* Protects us against serialized state changes. */
2067
2068	if (!get_ldev(mdev)) {
2069		retcode = ERR_NO_DISK;
2070		goto out;
2071	}
2072
2073	/* this is "skip initial sync", assume to be clean */
2074	if (mdev->state.conn == C_CONNECTED && mdev->agreed_pro_version >= 90 &&
2075	    mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
2076		dev_info(DEV, "Preparing to skip initial sync\n");
2077		skip_initial_sync = 1;
2078	} else if (mdev->state.conn != C_STANDALONE) {
2079		retcode = ERR_CONNECTED;
2080		goto out_dec;
2081	}
2082
2083	drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
2084	drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
2085
2086	if (args.clear_bm) {
2087		err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write, "clear_n_write from new_c_uuid");
2088		if (err) {
2089			dev_err(DEV, "Writing bitmap failed with %d\n",err);
2090			retcode = ERR_IO_MD_DISK;
2091		}
2092		if (skip_initial_sync) {
2093			drbd_send_uuids_skip_initial_sync(mdev);
2094			_drbd_uuid_set(mdev, UI_BITMAP, 0);
2095			spin_lock_irq(&mdev->req_lock);
2096			_drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
2097					CS_VERBOSE, NULL);
2098			spin_unlock_irq(&mdev->req_lock);
2099		}
2100	}
2101
2102	drbd_md_sync(mdev);
2103out_dec:
2104	put_ldev(mdev);
2105out:
2106	mutex_unlock(&mdev->state_mutex);
2107
2108	reply->ret_code = retcode;
2109	return 0;
2110}
2111
2112struct cn_handler_struct {
2113	int (*function)(struct drbd_conf *,
2114			 struct drbd_nl_cfg_req *,
2115			 struct drbd_nl_cfg_reply *);
2116	int reply_body_size;
2117};
2118
2119static struct cn_handler_struct cnd_table[] = {
2120	[ P_primary ]		= { &drbd_nl_primary,		0 },
2121	[ P_secondary ]		= { &drbd_nl_secondary,		0 },
2122	[ P_disk_conf ]		= { &drbd_nl_disk_conf,		0 },
2123	[ P_detach ]		= { &drbd_nl_detach,		0 },
2124	[ P_net_conf ]		= { &drbd_nl_net_conf,		0 },
2125	[ P_disconnect ]	= { &drbd_nl_disconnect,	0 },
2126	[ P_resize ]		= { &drbd_nl_resize,		0 },
2127	[ P_syncer_conf ]	= { &drbd_nl_syncer_conf,	0 },
2128	[ P_invalidate ]	= { &drbd_nl_invalidate,	0 },
2129	[ P_invalidate_peer ]	= { &drbd_nl_invalidate_peer,	0 },
2130	[ P_pause_sync ]	= { &drbd_nl_pause_sync,	0 },
2131	[ P_resume_sync ]	= { &drbd_nl_resume_sync,	0 },
2132	[ P_suspend_io ]	= { &drbd_nl_suspend_io,	0 },
2133	[ P_resume_io ]		= { &drbd_nl_resume_io,		0 },
2134	[ P_outdate ]		= { &drbd_nl_outdate,		0 },
2135	[ P_get_config ]	= { &drbd_nl_get_config,
2136				    sizeof(struct syncer_conf_tag_len_struct) +
2137				    sizeof(struct disk_conf_tag_len_struct) +
2138				    sizeof(struct net_conf_tag_len_struct) },
2139	[ P_get_state ]		= { &drbd_nl_get_state,
2140				    sizeof(struct get_state_tag_len_struct) +
2141				    sizeof(struct sync_progress_tag_len_struct)	},
2142	[ P_get_uuids ]		= { &drbd_nl_get_uuids,
2143				    sizeof(struct get_uuids_tag_len_struct) },
2144	[ P_get_timeout_flag ]	= { &drbd_nl_get_timeout_flag,
2145				    sizeof(struct get_timeout_flag_tag_len_struct)},
2146	[ P_start_ov ]		= { &drbd_nl_start_ov,		0 },
2147	[ P_new_c_uuid ]	= { &drbd_nl_new_c_uuid,	0 },
2148};
2149
2150static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms *nsp)
2151{
2152	struct drbd_nl_cfg_req *nlp = (struct drbd_nl_cfg_req *)req->data;
2153	struct cn_handler_struct *cm;
2154	struct cn_msg *cn_reply;
2155	struct drbd_nl_cfg_reply *reply;
2156	struct drbd_conf *mdev;
2157	int retcode, rr;
2158	int reply_size = sizeof(struct cn_msg)
2159		+ sizeof(struct drbd_nl_cfg_reply)
2160		+ sizeof(short int);
2161
2162	if (!try_module_get(THIS_MODULE)) {
2163		printk(KERN_ERR "drbd: try_module_get() failed!\n");
2164		return;
2165	}
2166
2167	if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN)) {
2168		retcode = ERR_PERM;
2169		goto fail;
2170	}
2171
2172	mdev = ensure_mdev(nlp->drbd_minor,
2173			(nlp->flags & DRBD_NL_CREATE_DEVICE));
2174	if (!mdev) {
2175		retcode = ERR_MINOR_INVALID;
2176		goto fail;
2177	}
2178
2179	if (nlp->packet_type >= P_nl_after_last_packet) {
2180		retcode = ERR_PACKET_NR;
2181		goto fail;
2182	}
2183
2184	cm = cnd_table + nlp->packet_type;
2185
2186	/* This may happen if packet number is 0: */
2187	if (cm->function == NULL) {
2188		retcode = ERR_PACKET_NR;
2189		goto fail;
2190	}
2191
2192	reply_size += cm->reply_body_size;
2193
2194	/* allocation not in the IO path, cqueue thread context */
2195	cn_reply = kmalloc(reply_size, GFP_KERNEL);
2196	if (!cn_reply) {
2197		retcode = ERR_NOMEM;
2198		goto fail;
2199	}
2200	reply = (struct drbd_nl_cfg_reply *) cn_reply->data;
2201
2202	reply->packet_type =
2203		cm->reply_body_size ? nlp->packet_type : P_nl_after_last_packet;
2204	reply->minor = nlp->drbd_minor;
2205	reply->ret_code = NO_ERROR; /* Might by modified by cm->function. */
2206	/* reply->tag_list; might be modified by cm->function. */
2207
2208	rr = cm->function(mdev, nlp, reply);
2209
2210	cn_reply->id = req->id;
2211	cn_reply->seq = req->seq;
2212	cn_reply->ack = req->ack  + 1;
2213	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + rr;
2214	cn_reply->flags = 0;
2215
2216	rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_KERNEL);
2217	if (rr && rr != -ESRCH)
2218		printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
2219
2220	kfree(cn_reply);
2221	module_put(THIS_MODULE);
2222	return;
2223 fail:
2224	drbd_nl_send_reply(req, retcode);
2225	module_put(THIS_MODULE);
2226}
2227
2228static atomic_t drbd_nl_seq = ATOMIC_INIT(2); /* two. */
2229
2230static unsigned short *
2231__tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data,
2232	unsigned short len, int nul_terminated)
2233{
2234	unsigned short l = tag_descriptions[tag_number(tag)].max_len;
2235	len = (len < l) ? len :  l;
2236	put_unaligned(tag, tl++);
2237	put_unaligned(len, tl++);
2238	memcpy(tl, data, len);
2239	tl = (unsigned short*)((char*)tl + len);
2240	if (nul_terminated)
2241		*((char*)tl - 1) = 0;
2242	return tl;
2243}
2244
2245static unsigned short *
2246tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data, int len)
2247{
2248	return __tl_add_blob(tl, tag, data, len, 0);
2249}
2250
2251static unsigned short *
2252tl_add_str(unsigned short *tl, enum drbd_tags tag, const char *str)
2253{
2254	return __tl_add_blob(tl, tag, str, strlen(str)+1, 0);
2255}
2256
2257static unsigned short *
2258tl_add_int(unsigned short *tl, enum drbd_tags tag, const void *val)
2259{
2260	put_unaligned(tag, tl++);
2261	switch(tag_type(tag)) {
2262	case TT_INTEGER:
2263		put_unaligned(sizeof(int), tl++);
2264		put_unaligned(*(int *)val, (int *)tl);
2265		tl = (unsigned short*)((char*)tl+sizeof(int));
2266		break;
2267	case TT_INT64:
2268		put_unaligned(sizeof(u64), tl++);
2269		put_unaligned(*(u64 *)val, (u64 *)tl);
2270		tl = (unsigned short*)((char*)tl+sizeof(u64));
2271		break;
2272	default:
2273		/* someone did something stupid. */
2274		;
2275	}
2276	return tl;
2277}
2278
2279void drbd_bcast_state(struct drbd_conf *mdev, union drbd_state state)
2280{
2281	char buffer[sizeof(struct cn_msg)+
2282		    sizeof(struct drbd_nl_cfg_reply)+
2283		    sizeof(struct get_state_tag_len_struct)+
2284		    sizeof(short int)];
2285	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2286	struct drbd_nl_cfg_reply *reply =
2287		(struct drbd_nl_cfg_reply *)cn_reply->data;
2288	unsigned short *tl = reply->tag_list;
2289
2290	/* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
2291
2292	tl = get_state_to_tags(mdev, (struct get_state *)&state, tl);
2293
2294	put_unaligned(TT_END, tl++); /* Close the tag list */
2295
2296	cn_reply->id.idx = CN_IDX_DRBD;
2297	cn_reply->id.val = CN_VAL_DRBD;
2298
2299	cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2300	cn_reply->ack = 0; /* not used here. */
2301	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2302		(int)((char *)tl - (char *)reply->tag_list);
2303	cn_reply->flags = 0;
2304
2305	reply->packet_type = P_get_state;
2306	reply->minor = mdev_to_minor(mdev);
2307	reply->ret_code = NO_ERROR;
2308
2309	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2310}
2311
2312void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name)
2313{
2314	char buffer[sizeof(struct cn_msg)+
2315		    sizeof(struct drbd_nl_cfg_reply)+
2316		    sizeof(struct call_helper_tag_len_struct)+
2317		    sizeof(short int)];
2318	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2319	struct drbd_nl_cfg_reply *reply =
2320		(struct drbd_nl_cfg_reply *)cn_reply->data;
2321	unsigned short *tl = reply->tag_list;
2322
2323	/* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
2324
2325	tl = tl_add_str(tl, T_helper, helper_name);
2326	put_unaligned(TT_END, tl++); /* Close the tag list */
2327
2328	cn_reply->id.idx = CN_IDX_DRBD;
2329	cn_reply->id.val = CN_VAL_DRBD;
2330
2331	cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2332	cn_reply->ack = 0; /* not used here. */
2333	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2334		(int)((char *)tl - (char *)reply->tag_list);
2335	cn_reply->flags = 0;
2336
2337	reply->packet_type = P_call_helper;
2338	reply->minor = mdev_to_minor(mdev);
2339	reply->ret_code = NO_ERROR;
2340
2341	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2342}
2343
2344void drbd_bcast_ee(struct drbd_conf *mdev,
2345		const char *reason, const int dgs,
2346		const char* seen_hash, const char* calc_hash,
2347		const struct drbd_epoch_entry* e)
2348{
2349	struct cn_msg *cn_reply;
2350	struct drbd_nl_cfg_reply *reply;
2351	unsigned short *tl;
2352	struct page *page;
2353	unsigned len;
2354
2355	if (!e)
2356		return;
2357	if (!reason || !reason[0])
2358		return;
2359
2360	/* apparently we have to memcpy twice, first to prepare the data for the
2361	 * struct cn_msg, then within cn_netlink_send from the cn_msg to the
2362	 * netlink skb. */
2363	/* receiver thread context, which is not in the writeout path (of this node),
2364	 * but may be in the writeout path of the _other_ node.
2365	 * GFP_NOIO to avoid potential "distributed deadlock". */
2366	cn_reply = kmalloc(
2367		sizeof(struct cn_msg)+
2368		sizeof(struct drbd_nl_cfg_reply)+
2369		sizeof(struct dump_ee_tag_len_struct)+
2370		sizeof(short int),
2371		GFP_NOIO);
2372
2373	if (!cn_reply) {
2374		dev_err(DEV, "could not kmalloc buffer for drbd_bcast_ee, sector %llu, size %u\n",
2375				(unsigned long long)e->sector, e->size);
2376		return;
2377	}
2378
2379	reply = (struct drbd_nl_cfg_reply*)cn_reply->data;
2380	tl = reply->tag_list;
2381
2382	tl = tl_add_str(tl, T_dump_ee_reason, reason);
2383	tl = tl_add_blob(tl, T_seen_digest, seen_hash, dgs);
2384	tl = tl_add_blob(tl, T_calc_digest, calc_hash, dgs);
2385	tl = tl_add_int(tl, T_ee_sector, &e->sector);
2386	tl = tl_add_int(tl, T_ee_block_id, &e->block_id);
2387
2388	put_unaligned(T_ee_data, tl++);
2389	put_unaligned(e->size, tl++);
2390
2391	len = e->size;
2392	page = e->pages;
2393	page_chain_for_each(page) {
2394		void *d = kmap_atomic(page, KM_USER0);
2395		unsigned l = min_t(unsigned, len, PAGE_SIZE);
2396		memcpy(tl, d, l);
2397		kunmap_atomic(d, KM_USER0);
2398		tl = (unsigned short*)((char*)tl + l);
2399		len -= l;
2400	}
2401	put_unaligned(TT_END, tl++); /* Close the tag list */
2402
2403	cn_reply->id.idx = CN_IDX_DRBD;
2404	cn_reply->id.val = CN_VAL_DRBD;
2405
2406	cn_reply->seq = atomic_add_return(1,&drbd_nl_seq);
2407	cn_reply->ack = 0; // not used here.
2408	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2409		(int)((char*)tl - (char*)reply->tag_list);
2410	cn_reply->flags = 0;
2411
2412	reply->packet_type = P_dump_ee;
2413	reply->minor = mdev_to_minor(mdev);
2414	reply->ret_code = NO_ERROR;
2415
2416	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2417	kfree(cn_reply);
2418}
2419
2420void drbd_bcast_sync_progress(struct drbd_conf *mdev)
2421{
2422	char buffer[sizeof(struct cn_msg)+
2423		    sizeof(struct drbd_nl_cfg_reply)+
2424		    sizeof(struct sync_progress_tag_len_struct)+
2425		    sizeof(short int)];
2426	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2427	struct drbd_nl_cfg_reply *reply =
2428		(struct drbd_nl_cfg_reply *)cn_reply->data;
2429	unsigned short *tl = reply->tag_list;
2430	unsigned long rs_left;
2431	unsigned int res;
2432
2433	/* no local ref, no bitmap, no syncer progress, no broadcast. */
2434	if (!get_ldev(mdev))
2435		return;
2436	drbd_get_syncer_progress(mdev, &rs_left, &res);
2437	put_ldev(mdev);
2438
2439	tl = tl_add_int(tl, T_sync_progress, &res);
2440	put_unaligned(TT_END, tl++); /* Close the tag list */
2441
2442	cn_reply->id.idx = CN_IDX_DRBD;
2443	cn_reply->id.val = CN_VAL_DRBD;
2444
2445	cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2446	cn_reply->ack = 0; /* not used here. */
2447	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2448		(int)((char *)tl - (char *)reply->tag_list);
2449	cn_reply->flags = 0;
2450
2451	reply->packet_type = P_sync_progress;
2452	reply->minor = mdev_to_minor(mdev);
2453	reply->ret_code = NO_ERROR;
2454
2455	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2456}
2457
2458int __init drbd_nl_init(void)
2459{
2460	static struct cb_id cn_id_drbd;
2461	int err, try=10;
2462
2463	cn_id_drbd.val = CN_VAL_DRBD;
2464	do {
2465		cn_id_drbd.idx = cn_idx;
2466		err = cn_add_callback(&cn_id_drbd, "cn_drbd", &drbd_connector_callback);
2467		if (!err)
2468			break;
2469		cn_idx = (cn_idx + CN_IDX_STEP);
2470	} while (try--);
2471
2472	if (err) {
2473		printk(KERN_ERR "drbd: cn_drbd failed to register\n");
2474		return err;
2475	}
2476
2477	return 0;
2478}
2479
2480void drbd_nl_cleanup(void)
2481{
2482	static struct cb_id cn_id_drbd;
2483
2484	cn_id_drbd.idx = cn_idx;
2485	cn_id_drbd.val = CN_VAL_DRBD;
2486
2487	cn_del_callback(&cn_id_drbd);
2488}
2489
2490void drbd_nl_send_reply(struct cn_msg *req, int ret_code)
2491{
2492	char buffer[sizeof(struct cn_msg)+sizeof(struct drbd_nl_cfg_reply)];
2493	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2494	struct drbd_nl_cfg_reply *reply =
2495		(struct drbd_nl_cfg_reply *)cn_reply->data;
2496	int rr;
2497
2498	cn_reply->id = req->id;
2499
2500	cn_reply->seq = req->seq;
2501	cn_reply->ack = req->ack  + 1;
2502	cn_reply->len = sizeof(struct drbd_nl_cfg_reply);
2503	cn_reply->flags = 0;
2504
2505	reply->minor = ((struct drbd_nl_cfg_req *)req->data)->drbd_minor;
2506	reply->ret_code = ret_code;
2507
2508	rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2509	if (rr && rr != -ESRCH)
2510		printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
2511}
2512
2513