primary.c revision 218045
1251881Speter/*-
2251881Speter * Copyright (c) 2009 The FreeBSD Foundation
3251881Speter * Copyright (c) 2010 Pawel Jakub Dawidek <pjd@FreeBSD.org>
4251881Speter * All rights reserved.
5251881Speter *
6251881Speter * This software was developed by Pawel Jakub Dawidek under sponsorship from
7251881Speter * the FreeBSD Foundation.
8251881Speter *
9251881Speter * Redistribution and use in source and binary forms, with or without
10251881Speter * modification, are permitted provided that the following conditions
11251881Speter * are met:
12251881Speter * 1. Redistributions of source code must retain the above copyright
13251881Speter *    notice, this list of conditions and the following disclaimer.
14251881Speter * 2. Redistributions in binary form must reproduce the above copyright
15251881Speter *    notice, this list of conditions and the following disclaimer in the
16251881Speter *    documentation and/or other materials provided with the distribution.
17251881Speter *
18251881Speter * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
19251881Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20251881Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21251881Speter * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
22251881Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23251881Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24251881Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25251881Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26251881Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27251881Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28251881Speter * SUCH DAMAGE.
29251881Speter */
30251881Speter
31251881Speter#include <sys/cdefs.h>
32251881Speter__FBSDID("$FreeBSD: head/sbin/hastd/primary.c 218045 2011-01-28 21:57:42Z pjd $");
33251881Speter
34251881Speter#include <sys/types.h>
35251881Speter#include <sys/time.h>
36251881Speter#include <sys/bio.h>
37251881Speter#include <sys/disk.h>
38251881Speter#include <sys/refcount.h>
39251881Speter#include <sys/stat.h>
40251881Speter
41251881Speter#include <geom/gate/g_gate.h>
42251881Speter
43251881Speter#include <assert.h>
44251881Speter#include <err.h>
45251881Speter#include <errno.h>
46251881Speter#include <fcntl.h>
47251881Speter#include <libgeom.h>
48251881Speter#include <pthread.h>
49251881Speter#include <signal.h>
50251881Speter#include <stdint.h>
51251881Speter#include <stdio.h>
52251881Speter#include <string.h>
53251881Speter#include <sysexits.h>
54251881Speter#include <unistd.h>
55251881Speter
56251881Speter#include <activemap.h>
57251881Speter#include <nv.h>
58251881Speter#include <rangelock.h>
59251881Speter
60251881Speter#include "control.h"
61251881Speter#include "event.h"
62251881Speter#include "hast.h"
63251881Speter#include "hast_proto.h"
64251881Speter#include "hastd.h"
65251881Speter#include "hooks.h"
66251881Speter#include "metadata.h"
67251881Speter#include "proto.h"
68251881Speter#include "pjdlog.h"
69251881Speter#include "subr.h"
70251881Speter#include "synch.h"
71251881Speter
72251881Speter/* The is only one remote component for now. */
73251881Speter#define	ISREMOTE(no)	((no) == 1)
74251881Speter
75251881Speterstruct hio {
76251881Speter	/*
77251881Speter	 * Number of components we are still waiting for.
78251881Speter	 * When this field goes to 0, we can send the request back to the
79251881Speter	 * kernel. Each component has to decrease this counter by one
80251881Speter	 * even on failure.
81251881Speter	 */
82251881Speter	unsigned int		 hio_countdown;
83251881Speter	/*
84251881Speter	 * Each component has a place to store its own error.
85251881Speter	 * Once the request is handled by all components we can decide if the
86251881Speter	 * request overall is successful or not.
87251881Speter	 */
88251881Speter	int			*hio_errors;
89251881Speter	/*
90251881Speter	 * Structure used to comunicate with GEOM Gate class.
91251881Speter	 */
92251881Speter	struct g_gate_ctl_io	 hio_ggio;
93251881Speter	TAILQ_ENTRY(hio)	*hio_next;
94251881Speter};
95251881Speter#define	hio_free_next	hio_next[0]
96251881Speter#define	hio_done_next	hio_next[0]
97251881Speter
98251881Speter/*
99251881Speter * Free list holds unused structures. When free list is empty, we have to wait
100251881Speter * until some in-progress requests are freed.
101251881Speter */
102251881Speterstatic TAILQ_HEAD(, hio) hio_free_list;
103251881Speterstatic pthread_mutex_t hio_free_list_lock;
104251881Speterstatic pthread_cond_t hio_free_list_cond;
105251881Speter/*
106251881Speter * There is one send list for every component. One requests is placed on all
107251881Speter * send lists - each component gets the same request, but each component is
108251881Speter * responsible for managing his own send list.
109251881Speter */
110251881Speterstatic TAILQ_HEAD(, hio) *hio_send_list;
111251881Speterstatic pthread_mutex_t *hio_send_list_lock;
112251881Speterstatic pthread_cond_t *hio_send_list_cond;
113251881Speter/*
114251881Speter * There is one recv list for every component, although local components don't
115251881Speter * use recv lists as local requests are done synchronously.
116251881Speter */
117251881Speterstatic TAILQ_HEAD(, hio) *hio_recv_list;
118251881Speterstatic pthread_mutex_t *hio_recv_list_lock;
119251881Speterstatic pthread_cond_t *hio_recv_list_cond;
120251881Speter/*
121251881Speter * Request is placed on done list by the slowest component (the one that
122251881Speter * decreased hio_countdown from 1 to 0).
123251881Speter */
124251881Speterstatic TAILQ_HEAD(, hio) hio_done_list;
125251881Speterstatic pthread_mutex_t hio_done_list_lock;
126251881Speterstatic pthread_cond_t hio_done_list_cond;
127251881Speter/*
128251881Speter * Structure below are for interaction with sync thread.
129251881Speter */
130251881Speterstatic bool sync_inprogress;
131251881Speterstatic pthread_mutex_t sync_lock;
132251881Speterstatic pthread_cond_t sync_cond;
133251881Speter/*
134251881Speter * The lock below allows to synchornize access to remote connections.
135251881Speter */
136251881Speterstatic pthread_rwlock_t *hio_remote_lock;
137251881Speter
138251881Speter/*
139251881Speter * Lock to synchronize metadata updates. Also synchronize access to
140251881Speter * hr_primary_localcnt and hr_primary_remotecnt fields.
141251881Speter */
142251881Speterstatic pthread_mutex_t metadata_lock;
143251881Speter
144251881Speter/*
145251881Speter * Maximum number of outstanding I/O requests.
146251881Speter */
147251881Speter#define	HAST_HIO_MAX	256
148251881Speter/*
149251881Speter * Number of components. At this point there are only two components: local
150251881Speter * and remote, but in the future it might be possible to use multiple local
151251881Speter * and remote components.
152251881Speter */
153251881Speter#define	HAST_NCOMPONENTS	2
154251881Speter/*
155251881Speter * Number of seconds to sleep between reconnect retries or keepalive packets.
156251881Speter */
157251881Speter#define	RETRY_SLEEP		10
158251881Speter
159251881Speter#define	ISCONNECTED(res, no)	\
160251881Speter	((res)->hr_remotein != NULL && (res)->hr_remoteout != NULL)
161251881Speter
162251881Speter#define	QUEUE_INSERT1(hio, name, ncomp)	do {				\
163251881Speter	bool _wakeup;							\
164251881Speter									\
165251881Speter	mtx_lock(&hio_##name##_list_lock[(ncomp)]);			\
166251881Speter	_wakeup = TAILQ_EMPTY(&hio_##name##_list[(ncomp)]);		\
167251881Speter	TAILQ_INSERT_TAIL(&hio_##name##_list[(ncomp)], (hio),		\
168251881Speter	    hio_next[(ncomp)]);						\
169251881Speter	mtx_unlock(&hio_##name##_list_lock[ncomp]);			\
170251881Speter	if (_wakeup)							\
171251881Speter		cv_signal(&hio_##name##_list_cond[(ncomp)]);		\
172251881Speter} while (0)
173251881Speter#define	QUEUE_INSERT2(hio, name)	do {				\
174251881Speter	bool _wakeup;							\
175251881Speter									\
176251881Speter	mtx_lock(&hio_##name##_list_lock);				\
177251881Speter	_wakeup = TAILQ_EMPTY(&hio_##name##_list);			\
178251881Speter	TAILQ_INSERT_TAIL(&hio_##name##_list, (hio), hio_##name##_next);\
179251881Speter	mtx_unlock(&hio_##name##_list_lock);				\
180251881Speter	if (_wakeup)							\
181251881Speter		cv_signal(&hio_##name##_list_cond);			\
182251881Speter} while (0)
183251881Speter#define	QUEUE_TAKE1(hio, name, ncomp, timeout)	do {			\
184251881Speter	bool _last;							\
185251881Speter									\
186251881Speter	mtx_lock(&hio_##name##_list_lock[(ncomp)]);			\
187251881Speter	_last = false;							\
188251881Speter	while (((hio) = TAILQ_FIRST(&hio_##name##_list[(ncomp)])) == NULL && !_last) { \
189251881Speter		cv_timedwait(&hio_##name##_list_cond[(ncomp)],		\
190251881Speter		    &hio_##name##_list_lock[(ncomp)], (timeout));	\
191251881Speter		if ((timeout) != 0) 					\
192251881Speter			_last = true;					\
193251881Speter	}								\
194251881Speter	if (hio != NULL) {						\
195251881Speter		TAILQ_REMOVE(&hio_##name##_list[(ncomp)], (hio),	\
196251881Speter		    hio_next[(ncomp)]);					\
197251881Speter	}								\
198251881Speter	mtx_unlock(&hio_##name##_list_lock[(ncomp)]);			\
199251881Speter} while (0)
200251881Speter#define	QUEUE_TAKE2(hio, name)	do {					\
201251881Speter	mtx_lock(&hio_##name##_list_lock);				\
202251881Speter	while (((hio) = TAILQ_FIRST(&hio_##name##_list)) == NULL) {	\
203251881Speter		cv_wait(&hio_##name##_list_cond,			\
204251881Speter		    &hio_##name##_list_lock);				\
205251881Speter	}								\
206251881Speter	TAILQ_REMOVE(&hio_##name##_list, (hio), hio_##name##_next);	\
207251881Speter	mtx_unlock(&hio_##name##_list_lock);				\
208251881Speter} while (0)
209251881Speter
210251881Speter#define	SYNCREQ(hio)		do {					\
211251881Speter	(hio)->hio_ggio.gctl_unit = -1;					\
212251881Speter	(hio)->hio_ggio.gctl_seq = 1;					\
213251881Speter} while (0)
214251881Speter#define	ISSYNCREQ(hio)		((hio)->hio_ggio.gctl_unit == -1)
215251881Speter#define	SYNCREQDONE(hio)	do { (hio)->hio_ggio.gctl_unit = -2; } while (0)
216251881Speter#define	ISSYNCREQDONE(hio)	((hio)->hio_ggio.gctl_unit == -2)
217251881Speter
218251881Speterstatic struct hast_resource *gres;
219251881Speter
220251881Speterstatic pthread_mutex_t range_lock;
221251881Speterstatic struct rangelocks *range_regular;
222251881Speterstatic bool range_regular_wait;
223251881Speterstatic pthread_cond_t range_regular_cond;
224251881Speterstatic struct rangelocks *range_sync;
225251881Speterstatic bool range_sync_wait;
226251881Speterstatic pthread_cond_t range_sync_cond;
227251881Speter
228251881Speterstatic void *ggate_recv_thread(void *arg);
229251881Speterstatic void *local_send_thread(void *arg);
230251881Speterstatic void *remote_send_thread(void *arg);
231251881Speterstatic void *remote_recv_thread(void *arg);
232251881Speterstatic void *ggate_send_thread(void *arg);
233251881Speterstatic void *sync_thread(void *arg);
234251881Speterstatic void *guard_thread(void *arg);
235251881Speter
236251881Speterstatic void
237251881Spetercleanup(struct hast_resource *res)
238251881Speter{
239251881Speter	int rerrno;
240251881Speter
241251881Speter	/* Remember errno. */
242251881Speter	rerrno = errno;
243251881Speter
244251881Speter	/* Destroy ggate provider if we created one. */
245251881Speter	if (res->hr_ggateunit >= 0) {
246251881Speter		struct g_gate_ctl_destroy ggiod;
247251881Speter
248251881Speter		bzero(&ggiod, sizeof(ggiod));
249251881Speter		ggiod.gctl_version = G_GATE_VERSION;
250251881Speter		ggiod.gctl_unit = res->hr_ggateunit;
251251881Speter		ggiod.gctl_force = 1;
252251881Speter		if (ioctl(res->hr_ggatefd, G_GATE_CMD_DESTROY, &ggiod) < 0) {
253251881Speter			pjdlog_errno(LOG_WARNING,
254251881Speter			    "Unable to destroy hast/%s device",
255251881Speter			    res->hr_provname);
256251881Speter		}
257251881Speter		res->hr_ggateunit = -1;
258251881Speter	}
259251881Speter
260251881Speter	/* Restore errno. */
261251881Speter	errno = rerrno;
262251881Speter}
263251881Speter
264251881Speterstatic __dead2 void
265251881Speterprimary_exit(int exitcode, const char *fmt, ...)
266251881Speter{
267251881Speter	va_list ap;
268251881Speter
269251881Speter	assert(exitcode != EX_OK);
270251881Speter	va_start(ap, fmt);
271251881Speter	pjdlogv_errno(LOG_ERR, fmt, ap);
272251881Speter	va_end(ap);
273251881Speter	cleanup(gres);
274251881Speter	exit(exitcode);
275251881Speter}
276251881Speter
277251881Speterstatic __dead2 void
278251881Speterprimary_exitx(int exitcode, const char *fmt, ...)
279251881Speter{
280251881Speter	va_list ap;
281251881Speter
282251881Speter	va_start(ap, fmt);
283251881Speter	pjdlogv(exitcode == EX_OK ? LOG_INFO : LOG_ERR, fmt, ap);
284251881Speter	va_end(ap);
285251881Speter	cleanup(gres);
286251881Speter	exit(exitcode);
287251881Speter}
288251881Speter
289251881Speterstatic int
290251881Speterhast_activemap_flush(struct hast_resource *res)
291251881Speter{
292251881Speter	const unsigned char *buf;
293251881Speter	size_t size;
294251881Speter
295251881Speter	buf = activemap_bitmap(res->hr_amp, &size);
296251881Speter	assert(buf != NULL);
297251881Speter	assert((size % res->hr_local_sectorsize) == 0);
298251881Speter	if (pwrite(res->hr_localfd, buf, size, METADATA_SIZE) !=
299251881Speter	    (ssize_t)size) {
300251881Speter		KEEP_ERRNO(pjdlog_errno(LOG_ERR,
301251881Speter		    "Unable to flush activemap to disk"));
302251881Speter		return (-1);
303251881Speter	}
304251881Speter	return (0);
305251881Speter}
306251881Speter
307251881Speterstatic bool
308251881Speterreal_remote(const struct hast_resource *res)
309251881Speter{
310251881Speter
311251881Speter	return (strcmp(res->hr_remoteaddr, "none") != 0);
312251881Speter}
313251881Speter
314251881Speterstatic void
315251881Speterinit_environment(struct hast_resource *res __unused)
316251881Speter{
317251881Speter	struct hio *hio;
318251881Speter	unsigned int ii, ncomps;
319251881Speter
320251881Speter	/*
321251881Speter	 * In the future it might be per-resource value.
322251881Speter	 */
323251881Speter	ncomps = HAST_NCOMPONENTS;
324251881Speter
325251881Speter	/*
326251881Speter	 * Allocate memory needed by lists.
327251881Speter	 */
328251881Speter	hio_send_list = malloc(sizeof(hio_send_list[0]) * ncomps);
329251881Speter	if (hio_send_list == NULL) {
330251881Speter		primary_exitx(EX_TEMPFAIL,
331251881Speter		    "Unable to allocate %zu bytes of memory for send lists.",
332251881Speter		    sizeof(hio_send_list[0]) * ncomps);
333251881Speter	}
334251881Speter	hio_send_list_lock = malloc(sizeof(hio_send_list_lock[0]) * ncomps);
335251881Speter	if (hio_send_list_lock == NULL) {
336251881Speter		primary_exitx(EX_TEMPFAIL,
337251881Speter		    "Unable to allocate %zu bytes of memory for send list locks.",
338251881Speter		    sizeof(hio_send_list_lock[0]) * ncomps);
339251881Speter	}
340251881Speter	hio_send_list_cond = malloc(sizeof(hio_send_list_cond[0]) * ncomps);
341251881Speter	if (hio_send_list_cond == NULL) {
342251881Speter		primary_exitx(EX_TEMPFAIL,
343251881Speter		    "Unable to allocate %zu bytes of memory for send list condition variables.",
344251881Speter		    sizeof(hio_send_list_cond[0]) * ncomps);
345251881Speter	}
346251881Speter	hio_recv_list = malloc(sizeof(hio_recv_list[0]) * ncomps);
347251881Speter	if (hio_recv_list == NULL) {
348251881Speter		primary_exitx(EX_TEMPFAIL,
349251881Speter		    "Unable to allocate %zu bytes of memory for recv lists.",
350251881Speter		    sizeof(hio_recv_list[0]) * ncomps);
351251881Speter	}
352251881Speter	hio_recv_list_lock = malloc(sizeof(hio_recv_list_lock[0]) * ncomps);
353251881Speter	if (hio_recv_list_lock == NULL) {
354251881Speter		primary_exitx(EX_TEMPFAIL,
355251881Speter		    "Unable to allocate %zu bytes of memory for recv list locks.",
356251881Speter		    sizeof(hio_recv_list_lock[0]) * ncomps);
357251881Speter	}
358251881Speter	hio_recv_list_cond = malloc(sizeof(hio_recv_list_cond[0]) * ncomps);
359251881Speter	if (hio_recv_list_cond == NULL) {
360251881Speter		primary_exitx(EX_TEMPFAIL,
361251881Speter		    "Unable to allocate %zu bytes of memory for recv list condition variables.",
362251881Speter		    sizeof(hio_recv_list_cond[0]) * ncomps);
363251881Speter	}
364251881Speter	hio_remote_lock = malloc(sizeof(hio_remote_lock[0]) * ncomps);
365251881Speter	if (hio_remote_lock == NULL) {
366251881Speter		primary_exitx(EX_TEMPFAIL,
367251881Speter		    "Unable to allocate %zu bytes of memory for remote connections locks.",
368251881Speter		    sizeof(hio_remote_lock[0]) * ncomps);
369251881Speter	}
370251881Speter
371251881Speter	/*
372251881Speter	 * Initialize lists, their locks and theirs condition variables.
373251881Speter	 */
374251881Speter	TAILQ_INIT(&hio_free_list);
375251881Speter	mtx_init(&hio_free_list_lock);
376251881Speter	cv_init(&hio_free_list_cond);
377251881Speter	for (ii = 0; ii < HAST_NCOMPONENTS; ii++) {
378251881Speter		TAILQ_INIT(&hio_send_list[ii]);
379251881Speter		mtx_init(&hio_send_list_lock[ii]);
380251881Speter		cv_init(&hio_send_list_cond[ii]);
381251881Speter		TAILQ_INIT(&hio_recv_list[ii]);
382251881Speter		mtx_init(&hio_recv_list_lock[ii]);
383251881Speter		cv_init(&hio_recv_list_cond[ii]);
384251881Speter		rw_init(&hio_remote_lock[ii]);
385251881Speter	}
386251881Speter	TAILQ_INIT(&hio_done_list);
387251881Speter	mtx_init(&hio_done_list_lock);
388251881Speter	cv_init(&hio_done_list_cond);
389251881Speter	mtx_init(&metadata_lock);
390251881Speter
391251881Speter	/*
392251881Speter	 * Allocate requests pool and initialize requests.
393251881Speter	 */
394251881Speter	for (ii = 0; ii < HAST_HIO_MAX; ii++) {
395251881Speter		hio = malloc(sizeof(*hio));
396251881Speter		if (hio == NULL) {
397251881Speter			primary_exitx(EX_TEMPFAIL,
398251881Speter			    "Unable to allocate %zu bytes of memory for hio request.",
399251881Speter			    sizeof(*hio));
400251881Speter		}
401251881Speter		hio->hio_countdown = 0;
402251881Speter		hio->hio_errors = malloc(sizeof(hio->hio_errors[0]) * ncomps);
403251881Speter		if (hio->hio_errors == NULL) {
404251881Speter			primary_exitx(EX_TEMPFAIL,
405251881Speter			    "Unable allocate %zu bytes of memory for hio errors.",
406251881Speter			    sizeof(hio->hio_errors[0]) * ncomps);
407251881Speter		}
408251881Speter		hio->hio_next = malloc(sizeof(hio->hio_next[0]) * ncomps);
409251881Speter		if (hio->hio_next == NULL) {
410251881Speter			primary_exitx(EX_TEMPFAIL,
411251881Speter			    "Unable allocate %zu bytes of memory for hio_next field.",
412251881Speter			    sizeof(hio->hio_next[0]) * ncomps);
413251881Speter		}
414251881Speter		hio->hio_ggio.gctl_version = G_GATE_VERSION;
415251881Speter		hio->hio_ggio.gctl_data = malloc(MAXPHYS);
416251881Speter		if (hio->hio_ggio.gctl_data == NULL) {
417251881Speter			primary_exitx(EX_TEMPFAIL,
418251881Speter			    "Unable to allocate %zu bytes of memory for gctl_data.",
419251881Speter			    MAXPHYS);
420251881Speter		}
421251881Speter		hio->hio_ggio.gctl_length = MAXPHYS;
422251881Speter		hio->hio_ggio.gctl_error = 0;
423251881Speter		TAILQ_INSERT_HEAD(&hio_free_list, hio, hio_free_next);
424251881Speter	}
425251881Speter}
426251881Speter
427251881Speterstatic bool
428251881Speterinit_resuid(struct hast_resource *res)
429251881Speter{
430251881Speter
431251881Speter	mtx_lock(&metadata_lock);
432251881Speter	if (res->hr_resuid != 0) {
433251881Speter		mtx_unlock(&metadata_lock);
434251881Speter		return (false);
435251881Speter	} else {
436251881Speter		/* Initialize unique resource identifier. */
437251881Speter		arc4random_buf(&res->hr_resuid, sizeof(res->hr_resuid));
438251881Speter		mtx_unlock(&metadata_lock);
439251881Speter		if (metadata_write(res) < 0)
440251881Speter			exit(EX_NOINPUT);
441251881Speter		return (true);
442251881Speter	}
443251881Speter}
444251881Speter
445251881Speterstatic void
446251881Speterinit_local(struct hast_resource *res)
447251881Speter{
448251881Speter	unsigned char *buf;
449251881Speter	size_t mapsize;
450251881Speter
451251881Speter	if (metadata_read(res, true) < 0)
452251881Speter		exit(EX_NOINPUT);
453251881Speter	mtx_init(&res->hr_amp_lock);
454251881Speter	if (activemap_init(&res->hr_amp, res->hr_datasize, res->hr_extentsize,
455251881Speter	    res->hr_local_sectorsize, res->hr_keepdirty) < 0) {
456251881Speter		primary_exit(EX_TEMPFAIL, "Unable to create activemap");
457251881Speter	}
458251881Speter	mtx_init(&range_lock);
459251881Speter	cv_init(&range_regular_cond);
460251881Speter	if (rangelock_init(&range_regular) < 0)
461251881Speter		primary_exit(EX_TEMPFAIL, "Unable to create regular range lock");
462251881Speter	cv_init(&range_sync_cond);
463251881Speter	if (rangelock_init(&range_sync) < 0)
464251881Speter		primary_exit(EX_TEMPFAIL, "Unable to create sync range lock");
465251881Speter	mapsize = activemap_ondisk_size(res->hr_amp);
466251881Speter	buf = calloc(1, mapsize);
467251881Speter	if (buf == NULL) {
468251881Speter		primary_exitx(EX_TEMPFAIL,
469251881Speter		    "Unable to allocate buffer for activemap.");
470251881Speter	}
471251881Speter	if (pread(res->hr_localfd, buf, mapsize, METADATA_SIZE) !=
472251881Speter	    (ssize_t)mapsize) {
473251881Speter		primary_exit(EX_NOINPUT, "Unable to read activemap");
474251881Speter	}
475251881Speter	activemap_copyin(res->hr_amp, buf, mapsize);
476251881Speter	free(buf);
477251881Speter	if (res->hr_resuid != 0)
478251881Speter		return;
479251881Speter	/*
480251881Speter	 * We're using provider for the first time. Initialize local and remote
481251881Speter	 * counters. We don't initialize resuid here, as we want to do it just
482251881Speter	 * in time. The reason for this is that we want to inform secondary
483251881Speter	 * that there were no writes yet, so there is no need to synchronize
484251881Speter	 * anything.
485251881Speter	 */
486251881Speter	res->hr_primary_localcnt = 1;
487251881Speter	res->hr_primary_remotecnt = 0;
488251881Speter	if (metadata_write(res) < 0)
489251881Speter		exit(EX_NOINPUT);
490251881Speter}
491251881Speter
492251881Speterstatic bool
493251881Speterinit_remote(struct hast_resource *res, struct proto_conn **inp,
494251881Speter    struct proto_conn **outp)
495251881Speter{
496251881Speter	struct proto_conn *in, *out;
497251881Speter	struct nv *nvout, *nvin;
498251881Speter	const unsigned char *token;
499251881Speter	unsigned char *map;
500251881Speter	const char *errmsg;
501251881Speter	int32_t extentsize;
502251881Speter	int64_t datasize;
503251881Speter	uint32_t mapsize;
504251881Speter	size_t size;
505251881Speter
506251881Speter	assert((inp == NULL && outp == NULL) || (inp != NULL && outp != NULL));
507251881Speter	assert(real_remote(res));
508251881Speter
509362181Sdim	in = out = NULL;
510251881Speter	errmsg = NULL;
511251881Speter
512251881Speter	/* Prepare outgoing connection with remote node. */
513251881Speter	if (proto_client(res->hr_remoteaddr, &out) < 0) {
514251881Speter		primary_exit(EX_TEMPFAIL,
515251881Speter		    "Unable to create outgoing connection to %s",
516251881Speter		    res->hr_remoteaddr);
517251881Speter	}
518251881Speter	/* Try to connect, but accept failure. */
519251881Speter	if (proto_connect(out) < 0) {
520251881Speter		pjdlog_errno(LOG_WARNING, "Unable to connect to %s",
521251881Speter		    res->hr_remoteaddr);
522251881Speter		goto close;
523251881Speter	}
524251881Speter	/* Error in setting timeout is not critical, but why should it fail? */
525251881Speter	if (proto_timeout(out, res->hr_timeout) < 0)
526251881Speter		pjdlog_errno(LOG_WARNING, "Unable to set connection timeout");
527251881Speter	/*
528251881Speter	 * First handshake step.
529251881Speter	 * Setup outgoing connection with remote node.
530251881Speter	 */
531251881Speter	nvout = nv_alloc();
532251881Speter	nv_add_string(nvout, res->hr_name, "resource");
533251881Speter	if (nv_error(nvout) != 0) {
534251881Speter		pjdlog_common(LOG_WARNING, 0, nv_error(nvout),
535251881Speter		    "Unable to allocate header for connection with %s",
536251881Speter		    res->hr_remoteaddr);
537251881Speter		nv_free(nvout);
538251881Speter		goto close;
539251881Speter	}
540251881Speter	if (hast_proto_send(res, out, nvout, NULL, 0) < 0) {
541251881Speter		pjdlog_errno(LOG_WARNING,
542251881Speter		    "Unable to send handshake header to %s",
543251881Speter		    res->hr_remoteaddr);
544251881Speter		nv_free(nvout);
545251881Speter		goto close;
546251881Speter	}
547251881Speter	nv_free(nvout);
548251881Speter	if (hast_proto_recv_hdr(out, &nvin) < 0) {
549251881Speter		pjdlog_errno(LOG_WARNING,
550251881Speter		    "Unable to receive handshake header from %s",
551251881Speter		    res->hr_remoteaddr);
552251881Speter		goto close;
553251881Speter	}
554251881Speter	errmsg = nv_get_string(nvin, "errmsg");
555251881Speter	if (errmsg != NULL) {
556251881Speter		pjdlog_warning("%s", errmsg);
557251881Speter		nv_free(nvin);
558251881Speter		goto close;
559251881Speter	}
560251881Speter	token = nv_get_uint8_array(nvin, &size, "token");
561251881Speter	if (token == NULL) {
562251881Speter		pjdlog_warning("Handshake header from %s has no 'token' field.",
563251881Speter		    res->hr_remoteaddr);
564251881Speter		nv_free(nvin);
565251881Speter		goto close;
566251881Speter	}
567251881Speter	if (size != sizeof(res->hr_token)) {
568251881Speter		pjdlog_warning("Handshake header from %s contains 'token' of wrong size (got %zu, expected %zu).",
569251881Speter		    res->hr_remoteaddr, size, sizeof(res->hr_token));
570251881Speter		nv_free(nvin);
571251881Speter		goto close;
572251881Speter	}
573251881Speter	bcopy(token, res->hr_token, sizeof(res->hr_token));
574251881Speter	nv_free(nvin);
575251881Speter
576251881Speter	/*
577251881Speter	 * Second handshake step.
578251881Speter	 * Setup incoming connection with remote node.
579251881Speter	 */
580251881Speter	if (proto_client(res->hr_remoteaddr, &in) < 0) {
581251881Speter		primary_exit(EX_TEMPFAIL,
582251881Speter		    "Unable to create incoming connection to %s",
583251881Speter		    res->hr_remoteaddr);
584251881Speter	}
585251881Speter	/* Try to connect, but accept failure. */
586251881Speter	if (proto_connect(in) < 0) {
587251881Speter		pjdlog_errno(LOG_WARNING, "Unable to connect to %s",
588251881Speter		    res->hr_remoteaddr);
589251881Speter		goto close;
590251881Speter	}
591251881Speter	/* Error in setting timeout is not critical, but why should it fail? */
592251881Speter	if (proto_timeout(in, res->hr_timeout) < 0)
593251881Speter		pjdlog_errno(LOG_WARNING, "Unable to set connection timeout");
594251881Speter	nvout = nv_alloc();
595251881Speter	nv_add_string(nvout, res->hr_name, "resource");
596251881Speter	nv_add_uint8_array(nvout, res->hr_token, sizeof(res->hr_token),
597251881Speter	    "token");
598251881Speter	if (res->hr_resuid == 0) {
599251881Speter		/*
600251881Speter		 * The resuid field was not yet initialized.
601251881Speter		 * Because we do synchronization inside init_resuid(), it is
602251881Speter		 * possible that someone already initialized it, the function
603251881Speter		 * will return false then, but if we successfully initialized
604251881Speter		 * it, we will get true. True means that there were no writes
605251881Speter		 * to this resource yet and we want to inform secondary that
606251881Speter		 * synchronization is not needed by sending "virgin" argument.
607251881Speter		 */
608251881Speter		if (init_resuid(res))
609251881Speter			nv_add_int8(nvout, 1, "virgin");
610251881Speter	}
611251881Speter	nv_add_uint64(nvout, res->hr_resuid, "resuid");
612251881Speter	nv_add_uint64(nvout, res->hr_primary_localcnt, "localcnt");
613251881Speter	nv_add_uint64(nvout, res->hr_primary_remotecnt, "remotecnt");
614251881Speter	if (nv_error(nvout) != 0) {
615251881Speter		pjdlog_common(LOG_WARNING, 0, nv_error(nvout),
616251881Speter		    "Unable to allocate header for connection with %s",
617251881Speter		    res->hr_remoteaddr);
618251881Speter		nv_free(nvout);
619251881Speter		goto close;
620251881Speter	}
621251881Speter	if (hast_proto_send(res, in, nvout, NULL, 0) < 0) {
622251881Speter		pjdlog_errno(LOG_WARNING,
623251881Speter		    "Unable to send handshake header to %s",
624251881Speter		    res->hr_remoteaddr);
625251881Speter		nv_free(nvout);
626251881Speter		goto close;
627251881Speter	}
628251881Speter	nv_free(nvout);
629251881Speter	if (hast_proto_recv_hdr(out, &nvin) < 0) {
630251881Speter		pjdlog_errno(LOG_WARNING,
631251881Speter		    "Unable to receive handshake header from %s",
632251881Speter		    res->hr_remoteaddr);
633251881Speter		goto close;
634251881Speter	}
635251881Speter	errmsg = nv_get_string(nvin, "errmsg");
636251881Speter	if (errmsg != NULL) {
637251881Speter		pjdlog_warning("%s", errmsg);
638251881Speter		nv_free(nvin);
639251881Speter		goto close;
640251881Speter	}
641251881Speter	datasize = nv_get_int64(nvin, "datasize");
642251881Speter	if (datasize != res->hr_datasize) {
643251881Speter		pjdlog_warning("Data size differs between nodes (local=%jd, remote=%jd).",
644251881Speter		    (intmax_t)res->hr_datasize, (intmax_t)datasize);
645251881Speter		nv_free(nvin);
646251881Speter		goto close;
647251881Speter	}
648251881Speter	extentsize = nv_get_int32(nvin, "extentsize");
649251881Speter	if (extentsize != res->hr_extentsize) {
650251881Speter		pjdlog_warning("Extent size differs between nodes (local=%zd, remote=%zd).",
651251881Speter		    (ssize_t)res->hr_extentsize, (ssize_t)extentsize);
652251881Speter		nv_free(nvin);
653251881Speter		goto close;
654251881Speter	}
655251881Speter	res->hr_secondary_localcnt = nv_get_uint64(nvin, "localcnt");
656251881Speter	res->hr_secondary_remotecnt = nv_get_uint64(nvin, "remotecnt");
657251881Speter	res->hr_syncsrc = nv_get_uint8(nvin, "syncsrc");
658251881Speter	map = NULL;
659251881Speter	mapsize = nv_get_uint32(nvin, "mapsize");
660251881Speter	if (mapsize > 0) {
661251881Speter		map = malloc(mapsize);
662251881Speter		if (map == NULL) {
663251881Speter			pjdlog_error("Unable to allocate memory for remote activemap (mapsize=%ju).",
664251881Speter			    (uintmax_t)mapsize);
665251881Speter			nv_free(nvin);
666251881Speter			goto close;
667251881Speter		}
668251881Speter		/*
669251881Speter		 * Remote node have some dirty extents on its own, lets
670251881Speter		 * download its activemap.
671251881Speter		 */
672251881Speter		if (hast_proto_recv_data(res, out, nvin, map,
673251881Speter		    mapsize) < 0) {
674251881Speter			pjdlog_errno(LOG_ERR,
675251881Speter			    "Unable to receive remote activemap");
676251881Speter			nv_free(nvin);
677251881Speter			free(map);
678251881Speter			goto close;
679251881Speter		}
680251881Speter		/*
681251881Speter		 * Merge local and remote bitmaps.
682251881Speter		 */
683251881Speter		activemap_merge(res->hr_amp, map, mapsize);
684251881Speter		free(map);
685251881Speter		/*
686251881Speter		 * Now that we merged bitmaps from both nodes, flush it to the
687251881Speter		 * disk before we start to synchronize.
688251881Speter		 */
689251881Speter		(void)hast_activemap_flush(res);
690251881Speter	}
691251881Speter	nv_free(nvin);
692251881Speter	pjdlog_info("Connected to %s.", res->hr_remoteaddr);
693251881Speter	if (inp != NULL && outp != NULL) {
694251881Speter		*inp = in;
695251881Speter		*outp = out;
696251881Speter	} else {
697251881Speter		res->hr_remotein = in;
698251881Speter		res->hr_remoteout = out;
699251881Speter	}
700251881Speter	event_send(res, EVENT_CONNECT);
701251881Speter	return (true);
702251881Speterclose:
703251881Speter	if (errmsg != NULL && strcmp(errmsg, "Split-brain condition!") == 0)
704251881Speter		event_send(res, EVENT_SPLITBRAIN);
705251881Speter	proto_close(out);
706251881Speter	if (in != NULL)
707251881Speter		proto_close(in);
708251881Speter	return (false);
709251881Speter}
710251881Speter
711251881Speterstatic void
712251881Spetersync_start(void)
713251881Speter{
714251881Speter
715251881Speter	mtx_lock(&sync_lock);
716251881Speter	sync_inprogress = true;
717251881Speter	mtx_unlock(&sync_lock);
718251881Speter	cv_signal(&sync_cond);
719251881Speter}
720251881Speter
721251881Speterstatic void
722251881Spetersync_stop(void)
723251881Speter{
724251881Speter
725251881Speter	mtx_lock(&sync_lock);
726251881Speter	if (sync_inprogress)
727251881Speter		sync_inprogress = false;
728251881Speter	mtx_unlock(&sync_lock);
729251881Speter}
730251881Speter
731251881Speterstatic void
732251881Speterinit_ggate(struct hast_resource *res)
733251881Speter{
734251881Speter	struct g_gate_ctl_create ggiocreate;
735251881Speter	struct g_gate_ctl_cancel ggiocancel;
736251881Speter
737251881Speter	/*
738251881Speter	 * We communicate with ggate via /dev/ggctl. Open it.
739251881Speter	 */
740251881Speter	res->hr_ggatefd = open("/dev/" G_GATE_CTL_NAME, O_RDWR);
741251881Speter	if (res->hr_ggatefd < 0)
742251881Speter		primary_exit(EX_OSFILE, "Unable to open /dev/" G_GATE_CTL_NAME);
743251881Speter	/*
744251881Speter	 * Create provider before trying to connect, as connection failure
745251881Speter	 * is not critical, but may take some time.
746251881Speter	 */
747251881Speter	bzero(&ggiocreate, sizeof(ggiocreate));
748251881Speter	ggiocreate.gctl_version = G_GATE_VERSION;
749251881Speter	ggiocreate.gctl_mediasize = res->hr_datasize;
750251881Speter	ggiocreate.gctl_sectorsize = res->hr_local_sectorsize;
751251881Speter	ggiocreate.gctl_flags = 0;
752251881Speter	ggiocreate.gctl_maxcount = G_GATE_MAX_QUEUE_SIZE;
753251881Speter	ggiocreate.gctl_timeout = 0;
754251881Speter	ggiocreate.gctl_unit = G_GATE_NAME_GIVEN;
755251881Speter	snprintf(ggiocreate.gctl_name, sizeof(ggiocreate.gctl_name), "hast/%s",
756251881Speter	    res->hr_provname);
757251881Speter	if (ioctl(res->hr_ggatefd, G_GATE_CMD_CREATE, &ggiocreate) == 0) {
758251881Speter		pjdlog_info("Device hast/%s created.", res->hr_provname);
759251881Speter		res->hr_ggateunit = ggiocreate.gctl_unit;
760251881Speter		return;
761251881Speter	}
762251881Speter	if (errno != EEXIST) {
763251881Speter		primary_exit(EX_OSERR, "Unable to create hast/%s device",
764251881Speter		    res->hr_provname);
765251881Speter	}
766251881Speter	pjdlog_debug(1,
767251881Speter	    "Device hast/%s already exists, we will try to take it over.",
768251881Speter	    res->hr_provname);
769251881Speter	/*
770251881Speter	 * If we received EEXIST, we assume that the process who created the
771251881Speter	 * provider died and didn't clean up. In that case we will start from
772251881Speter	 * where he left of.
773251881Speter	 */
774251881Speter	bzero(&ggiocancel, sizeof(ggiocancel));
775251881Speter	ggiocancel.gctl_version = G_GATE_VERSION;
776251881Speter	ggiocancel.gctl_unit = G_GATE_NAME_GIVEN;
777251881Speter	snprintf(ggiocancel.gctl_name, sizeof(ggiocancel.gctl_name), "hast/%s",
778251881Speter	    res->hr_provname);
779251881Speter	if (ioctl(res->hr_ggatefd, G_GATE_CMD_CANCEL, &ggiocancel) == 0) {
780251881Speter		pjdlog_info("Device hast/%s recovered.", res->hr_provname);
781251881Speter		res->hr_ggateunit = ggiocancel.gctl_unit;
782251881Speter		return;
783251881Speter	}
784251881Speter	primary_exit(EX_OSERR, "Unable to take over hast/%s device",
785251881Speter	    res->hr_provname);
786251881Speter}
787251881Speter
788251881Spetervoid
789251881Speterhastd_primary(struct hast_resource *res)
790251881Speter{
791251881Speter	pthread_t td;
792251881Speter	pid_t pid;
793251881Speter	int error, mode;
794251881Speter
795251881Speter	/*
796251881Speter	 * Create communication channel between parent and child.
797251881Speter	 */
798251881Speter	if (proto_client("socketpair://", &res->hr_ctrl) < 0) {
799251881Speter		/* TODO: There's no need for this to be fatal error. */
800251881Speter		KEEP_ERRNO((void)pidfile_remove(pfh));
801251881Speter		pjdlog_exit(EX_OSERR,
802251881Speter		    "Unable to create control sockets between parent and child");
803251881Speter	}
804251881Speter	/*
805251881Speter	 * Create communication channel between child and parent.
806251881Speter	 */
807251881Speter	if (proto_client("socketpair://", &res->hr_event) < 0) {
808251881Speter		/* TODO: There's no need for this to be fatal error. */
809251881Speter		KEEP_ERRNO((void)pidfile_remove(pfh));
810251881Speter		pjdlog_exit(EX_OSERR,
811251881Speter		    "Unable to create event sockets between child and parent");
812251881Speter	}
813251881Speter
814251881Speter	pid = fork();
815251881Speter	if (pid < 0) {
816251881Speter		/* TODO: There's no need for this to be fatal error. */
817251881Speter		KEEP_ERRNO((void)pidfile_remove(pfh));
818251881Speter		pjdlog_exit(EX_TEMPFAIL, "Unable to fork");
819251881Speter	}
820251881Speter
821251881Speter	if (pid > 0) {
822251881Speter		/* This is parent. */
823251881Speter		/* Declare that we are receiver. */
824251881Speter		proto_recv(res->hr_event, NULL, 0);
825251881Speter		/* Declare that we are sender. */
826251881Speter		proto_send(res->hr_ctrl, NULL, 0);
827251881Speter		res->hr_workerpid = pid;
828251881Speter		return;
829251881Speter	}
830251881Speter
831251881Speter	gres = res;
832251881Speter	mode = pjdlog_mode_get();
833251881Speter
834251881Speter	/* Declare that we are sender. */
835251881Speter	proto_send(res->hr_event, NULL, 0);
836251881Speter	/* Declare that we are receiver. */
837251881Speter	proto_recv(res->hr_ctrl, NULL, 0);
838251881Speter	descriptors_cleanup(res);
839251881Speter
840251881Speter	descriptors_assert(res, mode);
841251881Speter
842251881Speter	pjdlog_init(mode);
843251881Speter	pjdlog_prefix_set("[%s] (%s) ", res->hr_name, role2str(res->hr_role));
844251881Speter	setproctitle("%s (primary)", res->hr_name);
845251881Speter
846251881Speter	init_local(res);
847251881Speter	init_ggate(res);
848251881Speter	init_environment(res);
849251881Speter
850251881Speter	/*
851251881Speter	 * Create the guard thread first, so we can handle signals from the
852251881Speter	 * very begining.
853251881Speter	 */
854251881Speter	error = pthread_create(&td, NULL, guard_thread, res);
855251881Speter	assert(error == 0);
856251881Speter	/*
857251881Speter	 * Create the control thread before sending any event to the parent,
858251881Speter	 * as we can deadlock when parent sends control request to worker,
859251881Speter	 * but worker has no control thread started yet, so parent waits.
860251881Speter	 * In the meantime worker sends an event to the parent, but parent
861251881Speter	 * is unable to handle the event, because it waits for control
862251881Speter	 * request response.
863251881Speter	 */
864251881Speter	error = pthread_create(&td, NULL, ctrl_thread, res);
865251881Speter	assert(error == 0);
866251881Speter	if (real_remote(res) && init_remote(res, NULL, NULL))
867251881Speter		sync_start();
868251881Speter	error = pthread_create(&td, NULL, ggate_recv_thread, res);
869251881Speter	assert(error == 0);
870251881Speter	error = pthread_create(&td, NULL, local_send_thread, res);
871251881Speter	assert(error == 0);
872251881Speter	error = pthread_create(&td, NULL, remote_send_thread, res);
873251881Speter	assert(error == 0);
874251881Speter	error = pthread_create(&td, NULL, remote_recv_thread, res);
875251881Speter	assert(error == 0);
876251881Speter	error = pthread_create(&td, NULL, ggate_send_thread, res);
877251881Speter	assert(error == 0);
878251881Speter	(void)sync_thread(res);
879251881Speter}
880251881Speter
881251881Speterstatic void
882251881Speterreqlog(int loglevel, int debuglevel, struct g_gate_ctl_io *ggio, const char *fmt, ...)
883251881Speter{
884251881Speter	char msg[1024];
885251881Speter	va_list ap;
886251881Speter	int len;
887251881Speter
888251881Speter	va_start(ap, fmt);
889251881Speter	len = vsnprintf(msg, sizeof(msg), fmt, ap);
890251881Speter	va_end(ap);
891251881Speter	if ((size_t)len < sizeof(msg)) {
892251881Speter		switch (ggio->gctl_cmd) {
893251881Speter		case BIO_READ:
894251881Speter			(void)snprintf(msg + len, sizeof(msg) - len,
895251881Speter			    "READ(%ju, %ju).", (uintmax_t)ggio->gctl_offset,
896251881Speter			    (uintmax_t)ggio->gctl_length);
897251881Speter			break;
898251881Speter		case BIO_DELETE:
899251881Speter			(void)snprintf(msg + len, sizeof(msg) - len,
900251881Speter			    "DELETE(%ju, %ju).", (uintmax_t)ggio->gctl_offset,
901251881Speter			    (uintmax_t)ggio->gctl_length);
902251881Speter			break;
903251881Speter		case BIO_FLUSH:
904251881Speter			(void)snprintf(msg + len, sizeof(msg) - len, "FLUSH.");
905251881Speter			break;
906251881Speter		case BIO_WRITE:
907251881Speter			(void)snprintf(msg + len, sizeof(msg) - len,
908251881Speter			    "WRITE(%ju, %ju).", (uintmax_t)ggio->gctl_offset,
909251881Speter			    (uintmax_t)ggio->gctl_length);
910251881Speter			break;
911251881Speter		default:
912251881Speter			(void)snprintf(msg + len, sizeof(msg) - len,
913362181Sdim			    "UNKNOWN(%u).", (unsigned int)ggio->gctl_cmd);
914362181Sdim			break;
915251881Speter		}
916362181Sdim	}
917362181Sdim	pjdlog_common(loglevel, debuglevel, -1, "%s", msg);
918362181Sdim}
919362181Sdim
920362181Sdimstatic void
921362181Sdimremote_close(struct hast_resource *res, int ncomp)
922362181Sdim{
923362181Sdim
924362181Sdim	rw_wlock(&hio_remote_lock[ncomp]);
925362181Sdim	/*
926362181Sdim	 * A race is possible between dropping rlock and acquiring wlock -
927362181Sdim	 * another thread can close connection in-between.
928362181Sdim	 */
929362181Sdim	if (!ISCONNECTED(res, ncomp)) {
930362181Sdim		assert(res->hr_remotein == NULL);
931251881Speter		assert(res->hr_remoteout == NULL);
932251881Speter		rw_unlock(&hio_remote_lock[ncomp]);
933251881Speter		return;
934251881Speter	}
935251881Speter
936251881Speter	assert(res->hr_remotein != NULL);
937251881Speter	assert(res->hr_remoteout != NULL);
938251881Speter
939251881Speter	pjdlog_debug(2, "Closing incoming connection to %s.",
940251881Speter	    res->hr_remoteaddr);
941251881Speter	proto_close(res->hr_remotein);
942251881Speter	res->hr_remotein = NULL;
943251881Speter	pjdlog_debug(2, "Closing outgoing connection to %s.",
944251881Speter	    res->hr_remoteaddr);
945251881Speter	proto_close(res->hr_remoteout);
946251881Speter	res->hr_remoteout = NULL;
947251881Speter
948251881Speter	rw_unlock(&hio_remote_lock[ncomp]);
949251881Speter
950251881Speter	pjdlog_warning("Disconnected from %s.", res->hr_remoteaddr);
951251881Speter
952251881Speter	/*
953251881Speter	 * Stop synchronization if in-progress.
954251881Speter	 */
955251881Speter	sync_stop();
956251881Speter
957251881Speter	event_send(res, EVENT_DISCONNECT);
958251881Speter}
959251881Speter
960251881Speter/*
961251881Speter * Thread receives ggate I/O requests from the kernel and passes them to
962251881Speter * appropriate threads:
963251881Speter * WRITE - always goes to both local_send and remote_send threads
964251881Speter * READ (when the block is up-to-date on local component) -
965251881Speter *	only local_send thread
966251881Speter * READ (when the block isn't up-to-date on local component) -
967251881Speter *	only remote_send thread
968251881Speter * DELETE - always goes to both local_send and remote_send threads
969251881Speter * FLUSH - always goes to both local_send and remote_send threads
970251881Speter */
971251881Speterstatic void *
972251881Speterggate_recv_thread(void *arg)
973251881Speter{
974251881Speter	struct hast_resource *res = arg;
975251881Speter	struct g_gate_ctl_io *ggio;
976251881Speter	struct hio *hio;
977251881Speter	unsigned int ii, ncomp, ncomps;
978251881Speter	int error;
979251881Speter
980251881Speter	ncomps = HAST_NCOMPONENTS;
981251881Speter
982251881Speter	for (;;) {
983251881Speter		pjdlog_debug(2, "ggate_recv: Taking free request.");
984251881Speter		QUEUE_TAKE2(hio, free);
985362181Sdim		pjdlog_debug(2, "ggate_recv: (%p) Got free request.", hio);
986251881Speter		ggio = &hio->hio_ggio;
987251881Speter		ggio->gctl_unit = res->hr_ggateunit;
988251881Speter		ggio->gctl_length = MAXPHYS;
989251881Speter		ggio->gctl_error = 0;
990251881Speter		pjdlog_debug(2,
991251881Speter		    "ggate_recv: (%p) Waiting for request from the kernel.",
992251881Speter		    hio);
993251881Speter		if (ioctl(res->hr_ggatefd, G_GATE_CMD_START, ggio) < 0) {
994251881Speter			if (sigexit_received)
995251881Speter				pthread_exit(NULL);
996251881Speter			primary_exit(EX_OSERR, "G_GATE_CMD_START failed");
997251881Speter		}
998251881Speter		error = ggio->gctl_error;
999251881Speter		switch (error) {
1000251881Speter		case 0:
1001251881Speter			break;
1002251881Speter		case ECANCELED:
1003251881Speter			/* Exit gracefully. */
1004251881Speter			if (!sigexit_received) {
1005251881Speter				pjdlog_debug(2,
1006251881Speter				    "ggate_recv: (%p) Received cancel from the kernel.",
1007251881Speter				    hio);
1008251881Speter				pjdlog_info("Received cancel from the kernel, exiting.");
1009251881Speter			}
1010251881Speter			pthread_exit(NULL);
1011251881Speter		case ENOMEM:
1012362181Sdim			/*
1013251881Speter			 * Buffer too small? Impossible, we allocate MAXPHYS
1014251881Speter			 * bytes - request can't be bigger than that.
1015251881Speter			 */
1016251881Speter			/* FALLTHROUGH */
1017251881Speter		case ENXIO:
1018251881Speter		default:
1019251881Speter			primary_exitx(EX_OSERR, "G_GATE_CMD_START failed: %s.",
1020251881Speter			    strerror(error));
1021251881Speter		}
1022251881Speter		for (ii = 0; ii < ncomps; ii++)
1023251881Speter			hio->hio_errors[ii] = EINVAL;
1024251881Speter		reqlog(LOG_DEBUG, 2, ggio,
1025251881Speter		    "ggate_recv: (%p) Request received from the kernel: ",
1026251881Speter		    hio);
1027251881Speter		/*
1028251881Speter		 * Inform all components about new write request.
1029251881Speter		 * For read request prefer local component unless the given
1030251881Speter		 * range is out-of-date, then use remote component.
1031251881Speter		 */
1032251881Speter		switch (ggio->gctl_cmd) {
1033251881Speter		case BIO_READ:
1034251881Speter			pjdlog_debug(2,
1035251881Speter			    "ggate_recv: (%p) Moving request to the send queue.",
1036251881Speter			    hio);
1037251881Speter			refcount_init(&hio->hio_countdown, 1);
1038251881Speter			mtx_lock(&metadata_lock);
1039251881Speter			if (res->hr_syncsrc == HAST_SYNCSRC_UNDEF ||
1040251881Speter			    res->hr_syncsrc == HAST_SYNCSRC_PRIMARY) {
1041251881Speter				/*
1042251881Speter				 * This range is up-to-date on local component,
1043251881Speter				 * so handle request locally.
1044251881Speter				 */
1045251881Speter				 /* Local component is 0 for now. */
1046251881Speter				ncomp = 0;
1047251881Speter			} else /* if (res->hr_syncsrc ==
1048251881Speter			    HAST_SYNCSRC_SECONDARY) */ {
1049251881Speter				assert(res->hr_syncsrc ==
1050251881Speter				    HAST_SYNCSRC_SECONDARY);
1051251881Speter				/*
1052251881Speter				 * This range is out-of-date on local component,
1053251881Speter				 * so send request to the remote node.
1054251881Speter				 */
1055251881Speter				 /* Remote component is 1 for now. */
1056251881Speter				ncomp = 1;
1057251881Speter			}
1058251881Speter			mtx_unlock(&metadata_lock);
1059251881Speter			QUEUE_INSERT1(hio, send, ncomp);
1060251881Speter			break;
1061251881Speter		case BIO_WRITE:
1062251881Speter			if (res->hr_resuid == 0) {
1063251881Speter				/* This is first write, initialize resuid. */
1064251881Speter				(void)init_resuid(res);
1065251881Speter			}
1066251881Speter			for (;;) {
1067251881Speter				mtx_lock(&range_lock);
1068251881Speter				if (rangelock_islocked(range_sync,
1069251881Speter				    ggio->gctl_offset, ggio->gctl_length)) {
1070251881Speter					pjdlog_debug(2,
1071251881Speter					    "regular: Range offset=%jd length=%zu locked.",
1072251881Speter					    (intmax_t)ggio->gctl_offset,
1073251881Speter					    (size_t)ggio->gctl_length);
1074251881Speter					range_regular_wait = true;
1075251881Speter					cv_wait(&range_regular_cond, &range_lock);
1076251881Speter					range_regular_wait = false;
1077251881Speter					mtx_unlock(&range_lock);
1078251881Speter					continue;
1079251881Speter				}
1080251881Speter				if (rangelock_add(range_regular,
1081251881Speter				    ggio->gctl_offset, ggio->gctl_length) < 0) {
1082251881Speter					mtx_unlock(&range_lock);
1083251881Speter					pjdlog_debug(2,
1084251881Speter					    "regular: Range offset=%jd length=%zu is already locked, waiting.",
1085251881Speter					    (intmax_t)ggio->gctl_offset,
1086251881Speter					    (size_t)ggio->gctl_length);
1087251881Speter					sleep(1);
1088251881Speter					continue;
1089251881Speter				}
1090251881Speter				mtx_unlock(&range_lock);
1091251881Speter				break;
1092251881Speter			}
1093251881Speter			mtx_lock(&res->hr_amp_lock);
1094251881Speter			if (activemap_write_start(res->hr_amp,
1095251881Speter			    ggio->gctl_offset, ggio->gctl_length)) {
1096251881Speter				(void)hast_activemap_flush(res);
1097251881Speter			}
1098251881Speter			mtx_unlock(&res->hr_amp_lock);
1099251881Speter			/* FALLTHROUGH */
1100251881Speter		case BIO_DELETE:
1101251881Speter		case BIO_FLUSH:
1102251881Speter			pjdlog_debug(2,
1103251881Speter			    "ggate_recv: (%p) Moving request to the send queues.",
1104251881Speter			    hio);
1105251881Speter			refcount_init(&hio->hio_countdown, ncomps);
1106251881Speter			for (ii = 0; ii < ncomps; ii++)
1107251881Speter				QUEUE_INSERT1(hio, send, ii);
1108251881Speter			break;
1109251881Speter		}
1110251881Speter	}
1111251881Speter	/* NOTREACHED */
1112251881Speter	return (NULL);
1113251881Speter}
1114251881Speter
1115251881Speter/*
1116251881Speter * Thread reads from or writes to local component.
1117251881Speter * If local read fails, it redirects it to remote_send thread.
1118251881Speter */
1119251881Speterstatic void *
1120251881Speterlocal_send_thread(void *arg)
1121251881Speter{
1122251881Speter	struct hast_resource *res = arg;
1123251881Speter	struct g_gate_ctl_io *ggio;
1124251881Speter	struct hio *hio;
1125251881Speter	unsigned int ncomp, rncomp;
1126251881Speter	ssize_t ret;
1127251881Speter
1128251881Speter	/* Local component is 0 for now. */
1129251881Speter	ncomp = 0;
1130251881Speter	/* Remote component is 1 for now. */
1131251881Speter	rncomp = 1;
1132251881Speter
1133251881Speter	for (;;) {
1134251881Speter		pjdlog_debug(2, "local_send: Taking request.");
1135251881Speter		QUEUE_TAKE1(hio, send, ncomp, 0);
1136251881Speter		pjdlog_debug(2, "local_send: (%p) Got request.", hio);
1137251881Speter		ggio = &hio->hio_ggio;
1138251881Speter		switch (ggio->gctl_cmd) {
1139251881Speter		case BIO_READ:
1140251881Speter			ret = pread(res->hr_localfd, ggio->gctl_data,
1141251881Speter			    ggio->gctl_length,
1142251881Speter			    ggio->gctl_offset + res->hr_localoff);
1143251881Speter			if (ret == ggio->gctl_length)
1144251881Speter				hio->hio_errors[ncomp] = 0;
1145251881Speter			else {
1146251881Speter				/*
1147251881Speter				 * If READ failed, try to read from remote node.
1148251881Speter				 */
1149251881Speter				if (ret < 0) {
1150251881Speter					reqlog(LOG_WARNING, 0, ggio,
1151251881Speter					    "Local request failed (%s), trying remote node. ",
1152251881Speter					    strerror(errno));
1153251881Speter				} else if (ret != ggio->gctl_length) {
1154251881Speter					reqlog(LOG_WARNING, 0, ggio,
1155251881Speter					    "Local request failed (%zd != %jd), trying remote node. ",
1156251881Speter					    ret, (intmax_t)ggio->gctl_length);
1157251881Speter				}
1158251881Speter				QUEUE_INSERT1(hio, send, rncomp);
1159251881Speter				continue;
1160251881Speter			}
1161251881Speter			break;
1162251881Speter		case BIO_WRITE:
1163251881Speter			ret = pwrite(res->hr_localfd, ggio->gctl_data,
1164251881Speter			    ggio->gctl_length,
1165251881Speter			    ggio->gctl_offset + res->hr_localoff);
1166251881Speter			if (ret < 0) {
1167251881Speter				hio->hio_errors[ncomp] = errno;
1168251881Speter				reqlog(LOG_WARNING, 0, ggio,
1169251881Speter				    "Local request failed (%s): ",
1170251881Speter				    strerror(errno));
1171251881Speter			} else if (ret != ggio->gctl_length) {
1172251881Speter				hio->hio_errors[ncomp] = EIO;
1173251881Speter				reqlog(LOG_WARNING, 0, ggio,
1174251881Speter				    "Local request failed (%zd != %jd): ",
1175251881Speter				    ret, (intmax_t)ggio->gctl_length);
1176251881Speter			} else {
1177251881Speter				hio->hio_errors[ncomp] = 0;
1178251881Speter			}
1179251881Speter			break;
1180251881Speter		case BIO_DELETE:
1181251881Speter			ret = g_delete(res->hr_localfd,
1182251881Speter			    ggio->gctl_offset + res->hr_localoff,
1183251881Speter			    ggio->gctl_length);
1184251881Speter			if (ret < 0) {
1185251881Speter				hio->hio_errors[ncomp] = errno;
1186251881Speter				reqlog(LOG_WARNING, 0, ggio,
1187251881Speter				    "Local request failed (%s): ",
1188251881Speter				    strerror(errno));
1189251881Speter			} else {
1190251881Speter				hio->hio_errors[ncomp] = 0;
1191251881Speter			}
1192251881Speter			break;
1193251881Speter		case BIO_FLUSH:
1194251881Speter			ret = g_flush(res->hr_localfd);
1195251881Speter			if (ret < 0) {
1196251881Speter				hio->hio_errors[ncomp] = errno;
1197251881Speter				reqlog(LOG_WARNING, 0, ggio,
1198251881Speter				    "Local request failed (%s): ",
1199251881Speter				    strerror(errno));
1200251881Speter			} else {
1201251881Speter				hio->hio_errors[ncomp] = 0;
1202251881Speter			}
1203251881Speter			break;
1204251881Speter		}
1205251881Speter		if (refcount_release(&hio->hio_countdown)) {
1206251881Speter			if (ISSYNCREQ(hio)) {
1207251881Speter				mtx_lock(&sync_lock);
1208251881Speter				SYNCREQDONE(hio);
1209251881Speter				mtx_unlock(&sync_lock);
1210251881Speter				cv_signal(&sync_cond);
1211251881Speter			} else {
1212251881Speter				pjdlog_debug(2,
1213251881Speter				    "local_send: (%p) Moving request to the done queue.",
1214251881Speter				    hio);
1215251881Speter				QUEUE_INSERT2(hio, done);
1216251881Speter			}
1217251881Speter		}
1218251881Speter	}
1219251881Speter	/* NOTREACHED */
1220251881Speter	return (NULL);
1221251881Speter}
1222251881Speter
1223251881Speterstatic void
1224251881Speterkeepalive_send(struct hast_resource *res, unsigned int ncomp)
1225251881Speter{
1226251881Speter	struct nv *nv;
1227251881Speter
1228251881Speter	if (!ISCONNECTED(res, ncomp))
1229251881Speter		return;
1230251881Speter
1231251881Speter	assert(res->hr_remotein != NULL);
1232251881Speter	assert(res->hr_remoteout != NULL);
1233251881Speter
1234251881Speter	nv = nv_alloc();
1235251881Speter	nv_add_uint8(nv, HIO_KEEPALIVE, "cmd");
1236251881Speter	if (nv_error(nv) != 0) {
1237251881Speter		nv_free(nv);
1238251881Speter		pjdlog_debug(1,
1239289180Speter		    "keepalive_send: Unable to prepare header to send.");
1240251881Speter		return;
1241251881Speter	}
1242251881Speter	if (hast_proto_send(res, res->hr_remoteout, nv, NULL, 0) < 0) {
1243251881Speter		pjdlog_common(LOG_DEBUG, 1, errno,
1244251881Speter		    "keepalive_send: Unable to send request");
1245251881Speter		nv_free(nv);
1246251881Speter		rw_unlock(&hio_remote_lock[ncomp]);
1247251881Speter		remote_close(res, ncomp);
1248251881Speter		rw_rlock(&hio_remote_lock[ncomp]);
1249251881Speter		return;
1250251881Speter	}
1251251881Speter	nv_free(nv);
1252251881Speter	pjdlog_debug(2, "keepalive_send: Request sent.");
1253251881Speter}
1254251881Speter
1255251881Speter/*
1256251881Speter * Thread sends request to secondary node.
1257251881Speter */
1258251881Speterstatic void *
1259251881Speterremote_send_thread(void *arg)
1260251881Speter{
1261251881Speter	struct hast_resource *res = arg;
1262251881Speter	struct g_gate_ctl_io *ggio;
1263251881Speter	time_t lastcheck, now;
1264251881Speter	struct hio *hio;
1265251881Speter	struct nv *nv;
1266289180Speter	unsigned int ncomp;
1267251881Speter	bool wakeup;
1268251881Speter	uint64_t offset, length;
1269251881Speter	uint8_t cmd;
1270251881Speter	void *data;
1271251881Speter
1272251881Speter	/* Remote component is 1 for now. */
1273251881Speter	ncomp = 1;
1274251881Speter	lastcheck = time(NULL);
1275251881Speter
1276251881Speter	for (;;) {
1277251881Speter		pjdlog_debug(2, "remote_send: Taking request.");
1278251881Speter		QUEUE_TAKE1(hio, send, ncomp, RETRY_SLEEP);
1279251881Speter		if (hio == NULL) {
1280251881Speter			now = time(NULL);
1281251881Speter			if (lastcheck + RETRY_SLEEP <= now) {
1282251881Speter				keepalive_send(res, ncomp);
1283251881Speter				lastcheck = now;
1284251881Speter			}
1285251881Speter			continue;
1286251881Speter		}
1287251881Speter		pjdlog_debug(2, "remote_send: (%p) Got request.", hio);
1288251881Speter		ggio = &hio->hio_ggio;
1289251881Speter		switch (ggio->gctl_cmd) {
1290251881Speter		case BIO_READ:
1291251881Speter			cmd = HIO_READ;
1292251881Speter			data = NULL;
1293251881Speter			offset = ggio->gctl_offset;
1294251881Speter			length = ggio->gctl_length;
1295251881Speter			break;
1296251881Speter		case BIO_WRITE:
1297251881Speter			cmd = HIO_WRITE;
1298251881Speter			data = ggio->gctl_data;
1299251881Speter			offset = ggio->gctl_offset;
1300251881Speter			length = ggio->gctl_length;
1301251881Speter			break;
1302251881Speter		case BIO_DELETE:
1303251881Speter			cmd = HIO_DELETE;
1304251881Speter			data = NULL;
1305251881Speter			offset = ggio->gctl_offset;
1306251881Speter			length = ggio->gctl_length;
1307251881Speter			break;
1308251881Speter		case BIO_FLUSH:
1309251881Speter			cmd = HIO_FLUSH;
1310251881Speter			data = NULL;
1311251881Speter			offset = 0;
1312251881Speter			length = 0;
1313289180Speter			break;
1314251881Speter		default:
1315251881Speter			assert(!"invalid condition");
1316251881Speter			abort();
1317251881Speter		}
1318289180Speter		nv = nv_alloc();
1319251881Speter		nv_add_uint8(nv, cmd, "cmd");
1320251881Speter		nv_add_uint64(nv, (uint64_t)ggio->gctl_seq, "seq");
1321251881Speter		nv_add_uint64(nv, offset, "offset");
1322251881Speter		nv_add_uint64(nv, length, "length");
1323		if (nv_error(nv) != 0) {
1324			hio->hio_errors[ncomp] = nv_error(nv);
1325			pjdlog_debug(2,
1326			    "remote_send: (%p) Unable to prepare header to send.",
1327			    hio);
1328			reqlog(LOG_ERR, 0, ggio,
1329			    "Unable to prepare header to send (%s): ",
1330			    strerror(nv_error(nv)));
1331			/* Move failed request immediately to the done queue. */
1332			goto done_queue;
1333		}
1334		pjdlog_debug(2,
1335		    "remote_send: (%p) Moving request to the recv queue.",
1336		    hio);
1337		/*
1338		 * Protect connection from disappearing.
1339		 */
1340		rw_rlock(&hio_remote_lock[ncomp]);
1341		if (!ISCONNECTED(res, ncomp)) {
1342			rw_unlock(&hio_remote_lock[ncomp]);
1343			hio->hio_errors[ncomp] = ENOTCONN;
1344			goto done_queue;
1345		}
1346		/*
1347		 * Move the request to recv queue before sending it, because
1348		 * in different order we can get reply before we move request
1349		 * to recv queue.
1350		 */
1351		mtx_lock(&hio_recv_list_lock[ncomp]);
1352		wakeup = TAILQ_EMPTY(&hio_recv_list[ncomp]);
1353		TAILQ_INSERT_TAIL(&hio_recv_list[ncomp], hio, hio_next[ncomp]);
1354		mtx_unlock(&hio_recv_list_lock[ncomp]);
1355		if (hast_proto_send(res, res->hr_remoteout, nv, data,
1356		    data != NULL ? length : 0) < 0) {
1357			hio->hio_errors[ncomp] = errno;
1358			rw_unlock(&hio_remote_lock[ncomp]);
1359			pjdlog_debug(2,
1360			    "remote_send: (%p) Unable to send request.", hio);
1361			reqlog(LOG_ERR, 0, ggio,
1362			    "Unable to send request (%s): ",
1363			    strerror(hio->hio_errors[ncomp]));
1364			remote_close(res, ncomp);
1365			/*
1366			 * Take request back from the receive queue and move
1367			 * it immediately to the done queue.
1368			 */
1369			mtx_lock(&hio_recv_list_lock[ncomp]);
1370			TAILQ_REMOVE(&hio_recv_list[ncomp], hio, hio_next[ncomp]);
1371			mtx_unlock(&hio_recv_list_lock[ncomp]);
1372			goto done_queue;
1373		}
1374		rw_unlock(&hio_remote_lock[ncomp]);
1375		nv_free(nv);
1376		if (wakeup)
1377			cv_signal(&hio_recv_list_cond[ncomp]);
1378		continue;
1379done_queue:
1380		nv_free(nv);
1381		if (ISSYNCREQ(hio)) {
1382			if (!refcount_release(&hio->hio_countdown))
1383				continue;
1384			mtx_lock(&sync_lock);
1385			SYNCREQDONE(hio);
1386			mtx_unlock(&sync_lock);
1387			cv_signal(&sync_cond);
1388			continue;
1389		}
1390		if (ggio->gctl_cmd == BIO_WRITE) {
1391			mtx_lock(&res->hr_amp_lock);
1392			if (activemap_need_sync(res->hr_amp, ggio->gctl_offset,
1393			    ggio->gctl_length)) {
1394				(void)hast_activemap_flush(res);
1395			}
1396			mtx_unlock(&res->hr_amp_lock);
1397		}
1398		if (!refcount_release(&hio->hio_countdown))
1399			continue;
1400		pjdlog_debug(2,
1401		    "remote_send: (%p) Moving request to the done queue.",
1402		    hio);
1403		QUEUE_INSERT2(hio, done);
1404	}
1405	/* NOTREACHED */
1406	return (NULL);
1407}
1408
1409/*
1410 * Thread receives answer from secondary node and passes it to ggate_send
1411 * thread.
1412 */
1413static void *
1414remote_recv_thread(void *arg)
1415{
1416	struct hast_resource *res = arg;
1417	struct g_gate_ctl_io *ggio;
1418	struct hio *hio;
1419	struct nv *nv;
1420	unsigned int ncomp;
1421	uint64_t seq;
1422	int error;
1423
1424	/* Remote component is 1 for now. */
1425	ncomp = 1;
1426
1427	for (;;) {
1428		/* Wait until there is anything to receive. */
1429		mtx_lock(&hio_recv_list_lock[ncomp]);
1430		while (TAILQ_EMPTY(&hio_recv_list[ncomp])) {
1431			pjdlog_debug(2, "remote_recv: No requests, waiting.");
1432			cv_wait(&hio_recv_list_cond[ncomp],
1433			    &hio_recv_list_lock[ncomp]);
1434		}
1435		mtx_unlock(&hio_recv_list_lock[ncomp]);
1436		rw_rlock(&hio_remote_lock[ncomp]);
1437		if (!ISCONNECTED(res, ncomp)) {
1438			rw_unlock(&hio_remote_lock[ncomp]);
1439			/*
1440			 * Connection is dead, so move all pending requests to
1441			 * the done queue (one-by-one).
1442			 */
1443			mtx_lock(&hio_recv_list_lock[ncomp]);
1444			hio = TAILQ_FIRST(&hio_recv_list[ncomp]);
1445			assert(hio != NULL);
1446			TAILQ_REMOVE(&hio_recv_list[ncomp], hio,
1447			    hio_next[ncomp]);
1448			mtx_unlock(&hio_recv_list_lock[ncomp]);
1449			goto done_queue;
1450		}
1451		if (hast_proto_recv_hdr(res->hr_remotein, &nv) < 0) {
1452			pjdlog_errno(LOG_ERR,
1453			    "Unable to receive reply header");
1454			rw_unlock(&hio_remote_lock[ncomp]);
1455			remote_close(res, ncomp);
1456			continue;
1457		}
1458		rw_unlock(&hio_remote_lock[ncomp]);
1459		seq = nv_get_uint64(nv, "seq");
1460		if (seq == 0) {
1461			pjdlog_error("Header contains no 'seq' field.");
1462			nv_free(nv);
1463			continue;
1464		}
1465		mtx_lock(&hio_recv_list_lock[ncomp]);
1466		TAILQ_FOREACH(hio, &hio_recv_list[ncomp], hio_next[ncomp]) {
1467			if (hio->hio_ggio.gctl_seq == seq) {
1468				TAILQ_REMOVE(&hio_recv_list[ncomp], hio,
1469				    hio_next[ncomp]);
1470				break;
1471			}
1472		}
1473		mtx_unlock(&hio_recv_list_lock[ncomp]);
1474		if (hio == NULL) {
1475			pjdlog_error("Found no request matching received 'seq' field (%ju).",
1476			    (uintmax_t)seq);
1477			nv_free(nv);
1478			continue;
1479		}
1480		error = nv_get_int16(nv, "error");
1481		if (error != 0) {
1482			/* Request failed on remote side. */
1483			hio->hio_errors[ncomp] = error;
1484			reqlog(LOG_WARNING, 0, &hio->hio_ggio,
1485			    "Remote request failed (%s): ", strerror(error));
1486			nv_free(nv);
1487			goto done_queue;
1488		}
1489		ggio = &hio->hio_ggio;
1490		switch (ggio->gctl_cmd) {
1491		case BIO_READ:
1492			rw_rlock(&hio_remote_lock[ncomp]);
1493			if (!ISCONNECTED(res, ncomp)) {
1494				rw_unlock(&hio_remote_lock[ncomp]);
1495				nv_free(nv);
1496				goto done_queue;
1497			}
1498			if (hast_proto_recv_data(res, res->hr_remotein, nv,
1499			    ggio->gctl_data, ggio->gctl_length) < 0) {
1500				hio->hio_errors[ncomp] = errno;
1501				pjdlog_errno(LOG_ERR,
1502				    "Unable to receive reply data");
1503				rw_unlock(&hio_remote_lock[ncomp]);
1504				nv_free(nv);
1505				remote_close(res, ncomp);
1506				goto done_queue;
1507			}
1508			rw_unlock(&hio_remote_lock[ncomp]);
1509			break;
1510		case BIO_WRITE:
1511		case BIO_DELETE:
1512		case BIO_FLUSH:
1513			break;
1514		default:
1515			assert(!"invalid condition");
1516			abort();
1517		}
1518		hio->hio_errors[ncomp] = 0;
1519		nv_free(nv);
1520done_queue:
1521		if (refcount_release(&hio->hio_countdown)) {
1522			if (ISSYNCREQ(hio)) {
1523				mtx_lock(&sync_lock);
1524				SYNCREQDONE(hio);
1525				mtx_unlock(&sync_lock);
1526				cv_signal(&sync_cond);
1527			} else {
1528				pjdlog_debug(2,
1529				    "remote_recv: (%p) Moving request to the done queue.",
1530				    hio);
1531				QUEUE_INSERT2(hio, done);
1532			}
1533		}
1534	}
1535	/* NOTREACHED */
1536	return (NULL);
1537}
1538
1539/*
1540 * Thread sends answer to the kernel.
1541 */
1542static void *
1543ggate_send_thread(void *arg)
1544{
1545	struct hast_resource *res = arg;
1546	struct g_gate_ctl_io *ggio;
1547	struct hio *hio;
1548	unsigned int ii, ncomp, ncomps;
1549
1550	ncomps = HAST_NCOMPONENTS;
1551
1552	for (;;) {
1553		pjdlog_debug(2, "ggate_send: Taking request.");
1554		QUEUE_TAKE2(hio, done);
1555		pjdlog_debug(2, "ggate_send: (%p) Got request.", hio);
1556		ggio = &hio->hio_ggio;
1557		for (ii = 0; ii < ncomps; ii++) {
1558			if (hio->hio_errors[ii] == 0) {
1559				/*
1560				 * One successful request is enough to declare
1561				 * success.
1562				 */
1563				ggio->gctl_error = 0;
1564				break;
1565			}
1566		}
1567		if (ii == ncomps) {
1568			/*
1569			 * None of the requests were successful.
1570			 * Use first error.
1571			 */
1572			ggio->gctl_error = hio->hio_errors[0];
1573		}
1574		if (ggio->gctl_error == 0 && ggio->gctl_cmd == BIO_WRITE) {
1575			mtx_lock(&res->hr_amp_lock);
1576			activemap_write_complete(res->hr_amp,
1577			    ggio->gctl_offset, ggio->gctl_length);
1578			mtx_unlock(&res->hr_amp_lock);
1579		}
1580		if (ggio->gctl_cmd == BIO_WRITE) {
1581			/*
1582			 * Unlock range we locked.
1583			 */
1584			mtx_lock(&range_lock);
1585			rangelock_del(range_regular, ggio->gctl_offset,
1586			    ggio->gctl_length);
1587			if (range_sync_wait)
1588				cv_signal(&range_sync_cond);
1589			mtx_unlock(&range_lock);
1590			/*
1591			 * Bump local count if this is first write after
1592			 * connection failure with remote node.
1593			 */
1594			ncomp = 1;
1595			rw_rlock(&hio_remote_lock[ncomp]);
1596			if (!ISCONNECTED(res, ncomp)) {
1597				mtx_lock(&metadata_lock);
1598				if (res->hr_primary_localcnt ==
1599				    res->hr_secondary_remotecnt) {
1600					res->hr_primary_localcnt++;
1601					pjdlog_debug(1,
1602					    "Increasing localcnt to %ju.",
1603					    (uintmax_t)res->hr_primary_localcnt);
1604					(void)metadata_write(res);
1605				}
1606				mtx_unlock(&metadata_lock);
1607			}
1608			rw_unlock(&hio_remote_lock[ncomp]);
1609		}
1610		if (ioctl(res->hr_ggatefd, G_GATE_CMD_DONE, ggio) < 0)
1611			primary_exit(EX_OSERR, "G_GATE_CMD_DONE failed");
1612		pjdlog_debug(2,
1613		    "ggate_send: (%p) Moving request to the free queue.", hio);
1614		QUEUE_INSERT2(hio, free);
1615	}
1616	/* NOTREACHED */
1617	return (NULL);
1618}
1619
1620/*
1621 * Thread synchronize local and remote components.
1622 */
1623static void *
1624sync_thread(void *arg __unused)
1625{
1626	struct hast_resource *res = arg;
1627	struct hio *hio;
1628	struct g_gate_ctl_io *ggio;
1629	unsigned int ii, ncomp, ncomps;
1630	off_t offset, length, synced;
1631	bool dorewind;
1632	int syncext;
1633
1634	ncomps = HAST_NCOMPONENTS;
1635	dorewind = true;
1636	synced = 0;
1637	offset = -1;
1638
1639	for (;;) {
1640		mtx_lock(&sync_lock);
1641		if (offset >= 0 && !sync_inprogress) {
1642			pjdlog_info("Synchronization interrupted. "
1643			    "%jd bytes synchronized so far.",
1644			    (intmax_t)synced);
1645			event_send(res, EVENT_SYNCINTR);
1646		}
1647		while (!sync_inprogress) {
1648			dorewind = true;
1649			synced = 0;
1650			cv_wait(&sync_cond, &sync_lock);
1651		}
1652		mtx_unlock(&sync_lock);
1653		/*
1654		 * Obtain offset at which we should synchronize.
1655		 * Rewind synchronization if needed.
1656		 */
1657		mtx_lock(&res->hr_amp_lock);
1658		if (dorewind)
1659			activemap_sync_rewind(res->hr_amp);
1660		offset = activemap_sync_offset(res->hr_amp, &length, &syncext);
1661		if (syncext != -1) {
1662			/*
1663			 * We synchronized entire syncext extent, we can mark
1664			 * it as clean now.
1665			 */
1666			if (activemap_extent_complete(res->hr_amp, syncext))
1667				(void)hast_activemap_flush(res);
1668		}
1669		mtx_unlock(&res->hr_amp_lock);
1670		if (dorewind) {
1671			dorewind = false;
1672			if (offset < 0)
1673				pjdlog_info("Nodes are in sync.");
1674			else {
1675				pjdlog_info("Synchronization started. %ju bytes to go.",
1676				    (uintmax_t)(res->hr_extentsize *
1677				    activemap_ndirty(res->hr_amp)));
1678				event_send(res, EVENT_SYNCSTART);
1679			}
1680		}
1681		if (offset < 0) {
1682			sync_stop();
1683			pjdlog_debug(1, "Nothing to synchronize.");
1684			/*
1685			 * Synchronization complete, make both localcnt and
1686			 * remotecnt equal.
1687			 */
1688			ncomp = 1;
1689			rw_rlock(&hio_remote_lock[ncomp]);
1690			if (ISCONNECTED(res, ncomp)) {
1691				if (synced > 0) {
1692					pjdlog_info("Synchronization complete. "
1693					    "%jd bytes synchronized.",
1694					    (intmax_t)synced);
1695					event_send(res, EVENT_SYNCDONE);
1696				}
1697				mtx_lock(&metadata_lock);
1698				res->hr_syncsrc = HAST_SYNCSRC_UNDEF;
1699				res->hr_primary_localcnt =
1700				    res->hr_secondary_localcnt;
1701				res->hr_primary_remotecnt =
1702				    res->hr_secondary_remotecnt;
1703				pjdlog_debug(1,
1704				    "Setting localcnt to %ju and remotecnt to %ju.",
1705				    (uintmax_t)res->hr_primary_localcnt,
1706				    (uintmax_t)res->hr_secondary_localcnt);
1707				(void)metadata_write(res);
1708				mtx_unlock(&metadata_lock);
1709			}
1710			rw_unlock(&hio_remote_lock[ncomp]);
1711			continue;
1712		}
1713		pjdlog_debug(2, "sync: Taking free request.");
1714		QUEUE_TAKE2(hio, free);
1715		pjdlog_debug(2, "sync: (%p) Got free request.", hio);
1716		/*
1717		 * Lock the range we are going to synchronize. We don't want
1718		 * race where someone writes between our read and write.
1719		 */
1720		for (;;) {
1721			mtx_lock(&range_lock);
1722			if (rangelock_islocked(range_regular, offset, length)) {
1723				pjdlog_debug(2,
1724				    "sync: Range offset=%jd length=%jd locked.",
1725				    (intmax_t)offset, (intmax_t)length);
1726				range_sync_wait = true;
1727				cv_wait(&range_sync_cond, &range_lock);
1728				range_sync_wait = false;
1729				mtx_unlock(&range_lock);
1730				continue;
1731			}
1732			if (rangelock_add(range_sync, offset, length) < 0) {
1733				mtx_unlock(&range_lock);
1734				pjdlog_debug(2,
1735				    "sync: Range offset=%jd length=%jd is already locked, waiting.",
1736				    (intmax_t)offset, (intmax_t)length);
1737				sleep(1);
1738				continue;
1739			}
1740			mtx_unlock(&range_lock);
1741			break;
1742		}
1743		/*
1744		 * First read the data from synchronization source.
1745		 */
1746		SYNCREQ(hio);
1747		ggio = &hio->hio_ggio;
1748		ggio->gctl_cmd = BIO_READ;
1749		ggio->gctl_offset = offset;
1750		ggio->gctl_length = length;
1751		ggio->gctl_error = 0;
1752		for (ii = 0; ii < ncomps; ii++)
1753			hio->hio_errors[ii] = EINVAL;
1754		reqlog(LOG_DEBUG, 2, ggio, "sync: (%p) Sending sync request: ",
1755		    hio);
1756		pjdlog_debug(2, "sync: (%p) Moving request to the send queue.",
1757		    hio);
1758		mtx_lock(&metadata_lock);
1759		if (res->hr_syncsrc == HAST_SYNCSRC_PRIMARY) {
1760			/*
1761			 * This range is up-to-date on local component,
1762			 * so handle request locally.
1763			 */
1764			 /* Local component is 0 for now. */
1765			ncomp = 0;
1766		} else /* if (res->hr_syncsrc == HAST_SYNCSRC_SECONDARY) */ {
1767			assert(res->hr_syncsrc == HAST_SYNCSRC_SECONDARY);
1768			/*
1769			 * This range is out-of-date on local component,
1770			 * so send request to the remote node.
1771			 */
1772			 /* Remote component is 1 for now. */
1773			ncomp = 1;
1774		}
1775		mtx_unlock(&metadata_lock);
1776		refcount_init(&hio->hio_countdown, 1);
1777		QUEUE_INSERT1(hio, send, ncomp);
1778
1779		/*
1780		 * Let's wait for READ to finish.
1781		 */
1782		mtx_lock(&sync_lock);
1783		while (!ISSYNCREQDONE(hio))
1784			cv_wait(&sync_cond, &sync_lock);
1785		mtx_unlock(&sync_lock);
1786
1787		if (hio->hio_errors[ncomp] != 0) {
1788			pjdlog_error("Unable to read synchronization data: %s.",
1789			    strerror(hio->hio_errors[ncomp]));
1790			goto free_queue;
1791		}
1792
1793		/*
1794		 * We read the data from synchronization source, now write it
1795		 * to synchronization target.
1796		 */
1797		SYNCREQ(hio);
1798		ggio->gctl_cmd = BIO_WRITE;
1799		for (ii = 0; ii < ncomps; ii++)
1800			hio->hio_errors[ii] = EINVAL;
1801		reqlog(LOG_DEBUG, 2, ggio, "sync: (%p) Sending sync request: ",
1802		    hio);
1803		pjdlog_debug(2, "sync: (%p) Moving request to the send queue.",
1804		    hio);
1805		mtx_lock(&metadata_lock);
1806		if (res->hr_syncsrc == HAST_SYNCSRC_PRIMARY) {
1807			/*
1808			 * This range is up-to-date on local component,
1809			 * so we update remote component.
1810			 */
1811			 /* Remote component is 1 for now. */
1812			ncomp = 1;
1813		} else /* if (res->hr_syncsrc == HAST_SYNCSRC_SECONDARY) */ {
1814			assert(res->hr_syncsrc == HAST_SYNCSRC_SECONDARY);
1815			/*
1816			 * This range is out-of-date on local component,
1817			 * so we update it.
1818			 */
1819			 /* Local component is 0 for now. */
1820			ncomp = 0;
1821		}
1822		mtx_unlock(&metadata_lock);
1823
1824		pjdlog_debug(2, "sync: (%p) Moving request to the send queues.",
1825		    hio);
1826		refcount_init(&hio->hio_countdown, 1);
1827		QUEUE_INSERT1(hio, send, ncomp);
1828
1829		/*
1830		 * Let's wait for WRITE to finish.
1831		 */
1832		mtx_lock(&sync_lock);
1833		while (!ISSYNCREQDONE(hio))
1834			cv_wait(&sync_cond, &sync_lock);
1835		mtx_unlock(&sync_lock);
1836
1837		if (hio->hio_errors[ncomp] != 0) {
1838			pjdlog_error("Unable to write synchronization data: %s.",
1839			    strerror(hio->hio_errors[ncomp]));
1840			goto free_queue;
1841		}
1842
1843		synced += length;
1844free_queue:
1845		mtx_lock(&range_lock);
1846		rangelock_del(range_sync, offset, length);
1847		if (range_regular_wait)
1848			cv_signal(&range_regular_cond);
1849		mtx_unlock(&range_lock);
1850		pjdlog_debug(2, "sync: (%p) Moving request to the free queue.",
1851		    hio);
1852		QUEUE_INSERT2(hio, free);
1853	}
1854	/* NOTREACHED */
1855	return (NULL);
1856}
1857
1858void
1859primary_config_reload(struct hast_resource *res, struct nv *nv)
1860{
1861	unsigned int ii, ncomps;
1862	int modified, vint;
1863	const char *vstr;
1864
1865	pjdlog_info("Reloading configuration...");
1866
1867	assert(res->hr_role == HAST_ROLE_PRIMARY);
1868	assert(gres == res);
1869	nv_assert(nv, "remoteaddr");
1870	nv_assert(nv, "replication");
1871	nv_assert(nv, "timeout");
1872	nv_assert(nv, "exec");
1873
1874	ncomps = HAST_NCOMPONENTS;
1875
1876#define MODIFIED_REMOTEADDR	0x1
1877#define MODIFIED_REPLICATION	0x2
1878#define MODIFIED_TIMEOUT	0x4
1879#define MODIFIED_EXEC		0x8
1880	modified = 0;
1881
1882	vstr = nv_get_string(nv, "remoteaddr");
1883	if (strcmp(gres->hr_remoteaddr, vstr) != 0) {
1884		/*
1885		 * Don't copy res->hr_remoteaddr to gres just yet.
1886		 * We want remote_close() to log disconnect from the old
1887		 * addresses, not from the new ones.
1888		 */
1889		modified |= MODIFIED_REMOTEADDR;
1890	}
1891	vint = nv_get_int32(nv, "replication");
1892	if (gres->hr_replication != vint) {
1893		gres->hr_replication = vint;
1894		modified |= MODIFIED_REPLICATION;
1895	}
1896	vint = nv_get_int32(nv, "timeout");
1897	if (gres->hr_timeout != vint) {
1898		gres->hr_timeout = vint;
1899		modified |= MODIFIED_TIMEOUT;
1900	}
1901	vstr = nv_get_string(nv, "exec");
1902	if (strcmp(gres->hr_exec, vstr) != 0) {
1903		strlcpy(gres->hr_exec, vstr, sizeof(gres->hr_exec));
1904		modified |= MODIFIED_EXEC;
1905	}
1906
1907	/*
1908	 * If only timeout was modified we only need to change it without
1909	 * reconnecting.
1910	 */
1911	if (modified == MODIFIED_TIMEOUT) {
1912		for (ii = 0; ii < ncomps; ii++) {
1913			if (!ISREMOTE(ii))
1914				continue;
1915			rw_rlock(&hio_remote_lock[ii]);
1916			if (!ISCONNECTED(gres, ii)) {
1917				rw_unlock(&hio_remote_lock[ii]);
1918				continue;
1919			}
1920			rw_unlock(&hio_remote_lock[ii]);
1921			if (proto_timeout(gres->hr_remotein,
1922			    gres->hr_timeout) < 0) {
1923				pjdlog_errno(LOG_WARNING,
1924				    "Unable to set connection timeout");
1925			}
1926			if (proto_timeout(gres->hr_remoteout,
1927			    gres->hr_timeout) < 0) {
1928				pjdlog_errno(LOG_WARNING,
1929				    "Unable to set connection timeout");
1930			}
1931		}
1932	} else if ((modified &
1933	    (MODIFIED_REMOTEADDR | MODIFIED_REPLICATION)) != 0) {
1934		for (ii = 0; ii < ncomps; ii++) {
1935			if (!ISREMOTE(ii))
1936				continue;
1937			remote_close(gres, ii);
1938		}
1939		if (modified & MODIFIED_REMOTEADDR) {
1940			vstr = nv_get_string(nv, "remoteaddr");
1941			strlcpy(gres->hr_remoteaddr, vstr,
1942			    sizeof(gres->hr_remoteaddr));
1943		}
1944	}
1945#undef	MODIFIED_REMOTEADDR
1946#undef	MODIFIED_REPLICATION
1947#undef	MODIFIED_TIMEOUT
1948#undef	MODIFIED_EXEC
1949
1950	pjdlog_info("Configuration reloaded successfully.");
1951}
1952
1953static void
1954guard_one(struct hast_resource *res, unsigned int ncomp)
1955{
1956	struct proto_conn *in, *out;
1957
1958	if (!ISREMOTE(ncomp))
1959		return;
1960
1961	rw_rlock(&hio_remote_lock[ncomp]);
1962
1963	if (!real_remote(res)) {
1964		rw_unlock(&hio_remote_lock[ncomp]);
1965		return;
1966	}
1967
1968	if (ISCONNECTED(res, ncomp)) {
1969		assert(res->hr_remotein != NULL);
1970		assert(res->hr_remoteout != NULL);
1971		rw_unlock(&hio_remote_lock[ncomp]);
1972		pjdlog_debug(2, "remote_guard: Connection to %s is ok.",
1973		    res->hr_remoteaddr);
1974		return;
1975	}
1976
1977	assert(res->hr_remotein == NULL);
1978	assert(res->hr_remoteout == NULL);
1979	/*
1980	 * Upgrade the lock. It doesn't have to be atomic as no other thread
1981	 * can change connection status from disconnected to connected.
1982	 */
1983	rw_unlock(&hio_remote_lock[ncomp]);
1984	pjdlog_debug(2, "remote_guard: Reconnecting to %s.",
1985	    res->hr_remoteaddr);
1986	in = out = NULL;
1987	if (init_remote(res, &in, &out)) {
1988		rw_wlock(&hio_remote_lock[ncomp]);
1989		assert(res->hr_remotein == NULL);
1990		assert(res->hr_remoteout == NULL);
1991		assert(in != NULL && out != NULL);
1992		res->hr_remotein = in;
1993		res->hr_remoteout = out;
1994		rw_unlock(&hio_remote_lock[ncomp]);
1995		pjdlog_info("Successfully reconnected to %s.",
1996		    res->hr_remoteaddr);
1997		sync_start();
1998	} else {
1999		/* Both connections should be NULL. */
2000		assert(res->hr_remotein == NULL);
2001		assert(res->hr_remoteout == NULL);
2002		assert(in == NULL && out == NULL);
2003		pjdlog_debug(2, "remote_guard: Reconnect to %s failed.",
2004		    res->hr_remoteaddr);
2005	}
2006}
2007
2008/*
2009 * Thread guards remote connections and reconnects when needed, handles
2010 * signals, etc.
2011 */
2012static void *
2013guard_thread(void *arg)
2014{
2015	struct hast_resource *res = arg;
2016	unsigned int ii, ncomps;
2017	struct timespec timeout;
2018	time_t lastcheck, now;
2019	sigset_t mask;
2020	int signo;
2021
2022	ncomps = HAST_NCOMPONENTS;
2023	lastcheck = time(NULL);
2024
2025	PJDLOG_VERIFY(sigemptyset(&mask) == 0);
2026	PJDLOG_VERIFY(sigaddset(&mask, SIGINT) == 0);
2027	PJDLOG_VERIFY(sigaddset(&mask, SIGTERM) == 0);
2028
2029	timeout.tv_sec = RETRY_SLEEP;
2030	timeout.tv_nsec = 0;
2031	signo = -1;
2032
2033	for (;;) {
2034		switch (signo) {
2035		case SIGINT:
2036		case SIGTERM:
2037			sigexit_received = true;
2038			primary_exitx(EX_OK,
2039			    "Termination signal received, exiting.");
2040			break;
2041		default:
2042			break;
2043		}
2044
2045		pjdlog_debug(2, "remote_guard: Checking connections.");
2046		now = time(NULL);
2047		if (lastcheck + RETRY_SLEEP <= now) {
2048			for (ii = 0; ii < ncomps; ii++)
2049				guard_one(res, ii);
2050			lastcheck = now;
2051		}
2052		signo = sigtimedwait(&mask, NULL, &timeout);
2053	}
2054	/* NOTREACHED */
2055	return (NULL);
2056}
2057