Merge branch 'drbd-8.4_ed6' into for-3.8-drivers-drbd-8.4_ed6
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / block / drbd / drbd_receiver.c
index 59f9af96374e83ac840ee36c5fc3a2846d4a468f..0331ad0b61e18583fb8f5fc5b768134eba0fd6ad 100644 (file)
@@ -63,9 +63,9 @@ enum finish_epoch {
 
 static int drbd_do_features(struct drbd_tconn *tconn);
 static int drbd_do_auth(struct drbd_tconn *tconn);
-static int drbd_disconnected(int vnr, void *p, void *data);
+static int drbd_disconnected(struct drbd_conf *mdev);
 
-static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *, struct drbd_epoch *, enum epoch_event);
+static enum finish_epoch drbd_may_finish_epoch(struct drbd_tconn *, struct drbd_epoch *, enum epoch_event);
 static int e_end_block(struct drbd_work *, int);
 
 
@@ -295,6 +295,9 @@ static void drbd_free_pages(struct drbd_conf *mdev, struct page *page, int is_ne
        atomic_t *a = is_net ? &mdev->pp_in_use_by_net : &mdev->pp_in_use;
        int i;
 
+       if (page == NULL)
+               return;
+
        if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE) * minor_count)
                i = page_chain_free(page);
        else {
@@ -331,7 +334,7 @@ drbd_alloc_peer_req(struct drbd_conf *mdev, u64 id, sector_t sector,
                    unsigned int data_size, gfp_t gfp_mask) __must_hold(local)
 {
        struct drbd_peer_request *peer_req;
-       struct page *page;
+       struct page *page = NULL;
        unsigned nr_pages = (data_size + PAGE_SIZE -1) >> PAGE_SHIFT;
 
        if (drbd_insert_fault(mdev, DRBD_FAULT_AL_EE))
@@ -344,9 +347,11 @@ drbd_alloc_peer_req(struct drbd_conf *mdev, u64 id, sector_t sector,
                return NULL;
        }
 
-       page = drbd_alloc_pages(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
-       if (!page)
-               goto fail;
+       if (data_size) {
+               page = drbd_alloc_pages(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
+               if (!page)
+                       goto fail;
+       }
 
        drbd_clear_interval(&peer_req->i);
        peer_req->i.size = data_size;
@@ -420,7 +425,7 @@ static int drbd_finish_peer_reqs(struct drbd_conf *mdev)
                drbd_free_net_peer_req(mdev, peer_req);
 
        /* possible callbacks here:
-        * e_end_block, and e_end_resync_block, e_send_discard_write.
+        * e_end_block, and e_end_resync_block, e_send_superseded.
         * all ignore the last argument.
         */
        list_for_each_entry_safe(peer_req, t, &work_list, w.list) {
@@ -461,37 +466,6 @@ static void drbd_wait_ee_list_empty(struct drbd_conf *mdev,
        spin_unlock_irq(&mdev->tconn->req_lock);
 }
 
-/* see also kernel_accept; which is only present since 2.6.18.
- * also we want to log which part of it failed, exactly */
-static int drbd_accept(const char **what, struct socket *sock, struct socket **newsock)
-{
-       struct sock *sk = sock->sk;
-       int err = 0;
-
-       *what = "listen";
-       err = sock->ops->listen(sock, 5);
-       if (err < 0)
-               goto out;
-
-       *what = "sock_create_lite";
-       err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
-                              newsock);
-       if (err < 0)
-               goto out;
-
-       *what = "accept";
-       err = sock->ops->accept(sock, *newsock, 0);
-       if (err < 0) {
-               sock_release(*newsock);
-               *newsock = NULL;
-               goto out;
-       }
-       (*newsock)->ops  = sock->ops;
-
-out:
-       return err;
-}
-
 static int drbd_recv_short(struct socket *sock, void *buf, size_t size, int flags)
 {
        mm_segment_t oldfs;
@@ -516,54 +490,34 @@ static int drbd_recv_short(struct socket *sock, void *buf, size_t size, int flag
 
 static int drbd_recv(struct drbd_tconn *tconn, void *buf, size_t size)
 {
-       mm_segment_t oldfs;
-       struct kvec iov = {
-               .iov_base = buf,
-               .iov_len = size,
-       };
-       struct msghdr msg = {
-               .msg_iovlen = 1,
-               .msg_iov = (struct iovec *)&iov,
-               .msg_flags = MSG_WAITALL | MSG_NOSIGNAL
-       };
        int rv;
 
-       oldfs = get_fs();
-       set_fs(KERNEL_DS);
+       rv = drbd_recv_short(tconn->data.socket, buf, size, 0);
 
-       for (;;) {
-               rv = sock_recvmsg(tconn->data.socket, &msg, size, msg.msg_flags);
-               if (rv == size)
-                       break;
+       if (rv < 0) {
+               if (rv == -ECONNRESET)
+                       conn_info(tconn, "sock was reset by peer\n");
+               else if (rv != -ERESTARTSYS)
+                       conn_err(tconn, "sock_recvmsg returned %d\n", rv);
+       } else if (rv == 0) {
+               if (test_bit(DISCONNECT_SENT, &tconn->flags)) {
+                       long t;
+                       rcu_read_lock();
+                       t = rcu_dereference(tconn->net_conf)->ping_timeo * HZ/10;
+                       rcu_read_unlock();
 
-               /* Note:
-                * ECONNRESET   other side closed the connection
-                * ERESTARTSYS  (on  sock) we got a signal
-                */
+                       t = wait_event_timeout(tconn->ping_wait, tconn->cstate < C_WF_REPORT_PARAMS, t);
 
-               if (rv < 0) {
-                       if (rv == -ECONNRESET)
-                               conn_info(tconn, "sock was reset by peer\n");
-                       else if (rv != -ERESTARTSYS)
-                               conn_err(tconn, "sock_recvmsg returned %d\n", rv);
-                       break;
-               } else if (rv == 0) {
-                       conn_info(tconn, "sock was shut down by peer\n");
-                       break;
-               } else  {
-                       /* signal came in, or peer/link went down,
-                        * after we read a partial message
-                        */
-                       /* D_ASSERT(signal_pending(current)); */
-                       break;
+                       if (t)
+                               goto out;
                }
-       };
-
-       set_fs(oldfs);
+               conn_info(tconn, "sock was shut down by peer\n");
+       }
 
        if (rv != size)
                conn_request_state(tconn, NS(conn, C_BROKEN_PIPE), CS_HARD);
 
+out:
        return rv;
 }
 
@@ -617,7 +571,7 @@ static struct socket *drbd_try_connect(struct drbd_tconn *tconn)
        struct sockaddr_in6 peer_in6;
        struct net_conf *nc;
        int err, peer_addr_len, my_addr_len;
-       int sndbuf_size, rcvbuf_size, try_connect_int;
+       int sndbuf_size, rcvbuf_size, connect_int;
        int disconnect_on_error = 1;
 
        rcu_read_lock();
@@ -626,23 +580,21 @@ static struct socket *drbd_try_connect(struct drbd_tconn *tconn)
                rcu_read_unlock();
                return NULL;
        }
-
        sndbuf_size = nc->sndbuf_size;
        rcvbuf_size = nc->rcvbuf_size;
-       try_connect_int = nc->try_connect_int;
+       connect_int = nc->connect_int;
+       rcu_read_unlock();
 
-       my_addr_len = min_t(int, nc->my_addr_len, sizeof(src_in6));
-       memcpy(&src_in6, nc->my_addr, my_addr_len);
+       my_addr_len = min_t(int, tconn->my_addr_len, sizeof(src_in6));
+       memcpy(&src_in6, &tconn->my_addr, my_addr_len);
 
-       if (((struct sockaddr *)nc->my_addr)->sa_family == AF_INET6)
+       if (((struct sockaddr *)&tconn->my_addr)->sa_family == AF_INET6)
                src_in6.sin6_port = 0;
        else
                ((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
 
-       peer_addr_len = min_t(int, nc->peer_addr_len, sizeof(src_in6));
-       memcpy(&peer_in6, nc->peer_addr, peer_addr_len);
-
-       rcu_read_unlock();
+       peer_addr_len = min_t(int, tconn->peer_addr_len, sizeof(src_in6));
+       memcpy(&peer_in6, &tconn->peer_addr, peer_addr_len);
 
        what = "sock_create_kern";
        err = sock_create_kern(((struct sockaddr *)&src_in6)->sa_family,
@@ -653,7 +605,7 @@ static struct socket *drbd_try_connect(struct drbd_tconn *tconn)
        }
 
        sock->sk->sk_rcvtimeo =
-       sock->sk->sk_sndtimeo = try_connect_int * HZ;
+       sock->sk->sk_sndtimeo = connect_int * HZ;
        drbd_setbufsize(sock, sndbuf_size, rcvbuf_size);
 
        /* explicitly bind to the configured IP as source IP
@@ -699,12 +651,30 @@ out:
        return sock;
 }
 
-static struct socket *drbd_wait_for_connect(struct drbd_tconn *tconn)
+struct accept_wait_data {
+       struct drbd_tconn *tconn;
+       struct socket *s_listen;
+       struct completion door_bell;
+       void (*original_sk_state_change)(struct sock *sk);
+
+};
+
+static void drbd_incoming_connection(struct sock *sk)
+{
+       struct accept_wait_data *ad = sk->sk_user_data;
+       void (*state_change)(struct sock *sk);
+
+       state_change = ad->original_sk_state_change;
+       if (sk->sk_state == TCP_ESTABLISHED)
+               complete(&ad->door_bell);
+       state_change(sk);
+}
+
+static int prepare_listen_socket(struct drbd_tconn *tconn, struct accept_wait_data *ad)
 {
-       int timeo, err, my_addr_len;
-       int sndbuf_size, rcvbuf_size, try_connect_int;
-       struct socket *s_estab = NULL, *s_listen;
+       int err, sndbuf_size, rcvbuf_size, my_addr_len;
        struct sockaddr_in6 my_addr;
+       struct socket *s_listen;
        struct net_conf *nc;
        const char *what;
 
@@ -712,31 +682,24 @@ static struct socket *drbd_wait_for_connect(struct drbd_tconn *tconn)
        nc = rcu_dereference(tconn->net_conf);
        if (!nc) {
                rcu_read_unlock();
-               return NULL;
+               return -EIO;
        }
-
        sndbuf_size = nc->sndbuf_size;
        rcvbuf_size = nc->rcvbuf_size;
-       try_connect_int = nc->try_connect_int;
-
-       my_addr_len = min_t(int, nc->my_addr_len, sizeof(struct sockaddr_in6));
-       memcpy(&my_addr, nc->my_addr, my_addr_len);
        rcu_read_unlock();
 
+       my_addr_len = min_t(int, tconn->my_addr_len, sizeof(struct sockaddr_in6));
+       memcpy(&my_addr, &tconn->my_addr, my_addr_len);
+
        what = "sock_create_kern";
        err = sock_create_kern(((struct sockaddr *)&my_addr)->sa_family,
-               SOCK_STREAM, IPPROTO_TCP, &s_listen);
+                              SOCK_STREAM, IPPROTO_TCP, &s_listen);
        if (err) {
                s_listen = NULL;
                goto out;
        }
 
-       timeo = try_connect_int * HZ;
-       timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
-
-       s_listen->sk->sk_reuse    = 1; /* SO_REUSEADDR */
-       s_listen->sk->sk_rcvtimeo = timeo;
-       s_listen->sk->sk_sndtimeo = timeo;
+       s_listen->sk->sk_reuse = SK_CAN_REUSE; /* SO_REUSEADDR */
        drbd_setbufsize(s_listen, sndbuf_size, rcvbuf_size);
 
        what = "bind before listen";
@@ -744,8 +707,19 @@ static struct socket *drbd_wait_for_connect(struct drbd_tconn *tconn)
        if (err < 0)
                goto out;
 
-       err = drbd_accept(&what, s_listen, &s_estab);
+       ad->s_listen = s_listen;
+       write_lock_bh(&s_listen->sk->sk_callback_lock);
+       ad->original_sk_state_change = s_listen->sk->sk_state_change;
+       s_listen->sk->sk_state_change = drbd_incoming_connection;
+       s_listen->sk->sk_user_data = ad;
+       write_unlock_bh(&s_listen->sk->sk_callback_lock);
 
+       what = "listen";
+       err = s_listen->ops->listen(s_listen, 5);
+       if (err < 0)
+               goto out;
+
+       return 0;
 out:
        if (s_listen)
                sock_release(s_listen);
@@ -756,6 +730,50 @@ out:
                }
        }
 
+       return -EIO;
+}
+
+static void unregister_state_change(struct sock *sk, struct accept_wait_data *ad)
+{
+       write_lock_bh(&sk->sk_callback_lock);
+       sk->sk_state_change = ad->original_sk_state_change;
+       sk->sk_user_data = NULL;
+       write_unlock_bh(&sk->sk_callback_lock);
+}
+
+static struct socket *drbd_wait_for_connect(struct drbd_tconn *tconn, struct accept_wait_data *ad)
+{
+       int timeo, connect_int, err = 0;
+       struct socket *s_estab = NULL;
+       struct net_conf *nc;
+
+       rcu_read_lock();
+       nc = rcu_dereference(tconn->net_conf);
+       if (!nc) {
+               rcu_read_unlock();
+               return NULL;
+       }
+       connect_int = nc->connect_int;
+       rcu_read_unlock();
+
+       timeo = connect_int * HZ;
+       timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
+
+       err = wait_for_completion_interruptible_timeout(&ad->door_bell, timeo);
+       if (err <= 0)
+               return NULL;
+
+       err = kernel_accept(ad->s_listen, &s_estab, 0);
+       if (err < 0) {
+               if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
+                       conn_err(tconn, "accept failed, err = %d\n", err);
+                       conn_request_state(tconn, NS(conn, C_DISCONNECTING), CS_HARD);
+               }
+       }
+
+       if (s_estab)
+               unregister_state_change(s_estab->sk, ad);
+
        return s_estab;
 }
 
@@ -811,9 +829,8 @@ static int drbd_socket_okay(struct socket **sock)
 }
 /* Gets called if a connection is established, or if a new minor gets created
    in a connection */
-int drbd_connected(int vnr, void *p, void *data)
+int drbd_connected(struct drbd_conf *mdev)
 {
-       struct drbd_conf *mdev = (struct drbd_conf *)p;
        int err;
 
        atomic_set(&mdev->packet_seq, 0);
@@ -829,7 +846,7 @@ int drbd_connected(int vnr, void *p, void *data)
        if (!err)
                err = drbd_send_uuids(mdev);
        if (!err)
-               err = drbd_send_state(mdev);
+               err = drbd_send_current_state(mdev);
        clear_bit(USE_DEGR_WFC_T, &mdev->flags);
        clear_bit(RESIZE_PENDING, &mdev->flags);
        mod_timer(&mdev->request_timer, jiffies + HZ); /* just start it here. */
@@ -844,78 +861,98 @@ int drbd_connected(int vnr, void *p, void *data)
  *     no point in trying again, please go standalone.
  *  -2 We do not have a network config...
  */
-static int drbd_connect(struct drbd_tconn *tconn)
+static int conn_connect(struct drbd_tconn *tconn)
 {
-       struct socket *sock, *msock;
+       struct drbd_socket sock, msock;
+       struct drbd_conf *mdev;
        struct net_conf *nc;
-       int timeout, try, h, ok;
+       int vnr, timeout, h, ok;
+       bool discard_my_data;
+       enum drbd_state_rv rv;
+       struct accept_wait_data ad = {
+               .tconn = tconn,
+               .door_bell = COMPLETION_INITIALIZER_ONSTACK(ad.door_bell),
+       };
 
+       clear_bit(DISCONNECT_SENT, &tconn->flags);
        if (conn_request_state(tconn, NS(conn, C_WF_CONNECTION), CS_VERBOSE) < SS_SUCCESS)
                return -2;
 
-       clear_bit(DISCARD_CONCURRENT, &tconn->flags);
+       mutex_init(&sock.mutex);
+       sock.sbuf = tconn->data.sbuf;
+       sock.rbuf = tconn->data.rbuf;
+       sock.socket = NULL;
+       mutex_init(&msock.mutex);
+       msock.sbuf = tconn->meta.sbuf;
+       msock.rbuf = tconn->meta.rbuf;
+       msock.socket = NULL;
 
        /* Assume that the peer only understands protocol 80 until we know better.  */
        tconn->agreed_pro_version = 80;
 
+       if (prepare_listen_socket(tconn, &ad))
+               return 0;
+
        do {
                struct socket *s;
 
-               for (try = 0;;) {
-                       /* 3 tries, this should take less than a second! */
-                       s = drbd_try_connect(tconn);
-                       if (s || ++try >= 3)
-                               break;
-                       /* give the other side time to call bind() & listen() */
-                       schedule_timeout_interruptible(HZ / 10);
-               }
-
+               s = drbd_try_connect(tconn);
                if (s) {
-                       if (!tconn->data.socket) {
-                               tconn->data.socket = s;
-                               send_first_packet(tconn, &tconn->data, P_INITIAL_DATA);
-                       } else if (!tconn->meta.socket) {
-                               tconn->meta.socket = s;
-                               send_first_packet(tconn, &tconn->meta, P_INITIAL_META);
+                       if (!sock.socket) {
+                               sock.socket = s;
+                               send_first_packet(tconn, &sock, P_INITIAL_DATA);
+                       } else if (!msock.socket) {
+                               clear_bit(RESOLVE_CONFLICTS, &tconn->flags);
+                               msock.socket = s;
+                               send_first_packet(tconn, &msock, P_INITIAL_META);
                        } else {
-                               conn_err(tconn, "Logic error in drbd_connect()\n");
+                               conn_err(tconn, "Logic error in conn_connect()\n");
                                goto out_release_sockets;
                        }
                }
 
-               if (tconn->data.socket && tconn->meta.socket) {
-                       schedule_timeout_interruptible(tconn->net_conf->ping_timeo*HZ/10);
-                       ok = drbd_socket_okay(&tconn->data.socket);
-                       ok = drbd_socket_okay(&tconn->meta.socket) && ok;
+               if (sock.socket && msock.socket) {
+                       rcu_read_lock();
+                       nc = rcu_dereference(tconn->net_conf);
+                       timeout = nc->ping_timeo * HZ / 10;
+                       rcu_read_unlock();
+                       schedule_timeout_interruptible(timeout);
+                       ok = drbd_socket_okay(&sock.socket);
+                       ok = drbd_socket_okay(&msock.socket) && ok;
                        if (ok)
                                break;
                }
 
 retry:
-               s = drbd_wait_for_connect(tconn);
+               s = drbd_wait_for_connect(tconn, &ad);
                if (s) {
-                       try = receive_first_packet(tconn, s);
-                       drbd_socket_okay(&tconn->data.socket);
-                       drbd_socket_okay(&tconn->meta.socket);
-                       switch (try) {
+                       int fp = receive_first_packet(tconn, s);
+                       drbd_socket_okay(&sock.socket);
+                       drbd_socket_okay(&msock.socket);
+                       switch (fp) {
                        case P_INITIAL_DATA:
-                               if (tconn->data.socket) {
+                               if (sock.socket) {
                                        conn_warn(tconn, "initial packet S crossed\n");
-                                       sock_release(tconn->data.socket);
+                                       sock_release(sock.socket);
+                                       sock.socket = s;
+                                       goto randomize;
                                }
-                               tconn->data.socket = s;
+                               sock.socket = s;
                                break;
                        case P_INITIAL_META:
-                               if (tconn->meta.socket) {
+                               set_bit(RESOLVE_CONFLICTS, &tconn->flags);
+                               if (msock.socket) {
                                        conn_warn(tconn, "initial packet M crossed\n");
-                                       sock_release(tconn->meta.socket);
+                                       sock_release(msock.socket);
+                                       msock.socket = s;
+                                       goto randomize;
                                }
-                               tconn->meta.socket = s;
-                               set_bit(DISCARD_CONCURRENT, &tconn->flags);
+                               msock.socket = s;
                                break;
                        default:
                                conn_warn(tconn, "Error receiving initial packet\n");
                                sock_release(s);
+randomize:
                                if (random32() & 1)
                                        goto retry;
                        }
@@ -930,48 +967,47 @@ retry:
                                goto out_release_sockets;
                }
 
-               if (tconn->data.socket && &tconn->meta.socket) {
-                       ok = drbd_socket_okay(&tconn->data.socket);
-                       ok = drbd_socket_okay(&tconn->meta.socket) && ok;
-                       if (ok)
-                               break;
-               }
-       } while (1);
+               ok = drbd_socket_okay(&sock.socket);
+               ok = drbd_socket_okay(&msock.socket) && ok;
+       } while (!ok);
 
-       sock  = tconn->data.socket;
-       msock = tconn->meta.socket;
+       if (ad.s_listen)
+               sock_release(ad.s_listen);
 
-       msock->sk->sk_reuse = 1; /* SO_REUSEADDR */
-       sock->sk->sk_reuse = 1; /* SO_REUSEADDR */
+       sock.socket->sk->sk_reuse = SK_CAN_REUSE; /* SO_REUSEADDR */
+       msock.socket->sk->sk_reuse = SK_CAN_REUSE; /* SO_REUSEADDR */
 
-       sock->sk->sk_allocation = GFP_NOIO;
-       msock->sk->sk_allocation = GFP_NOIO;
+       sock.socket->sk->sk_allocation = GFP_NOIO;
+       msock.socket->sk->sk_allocation = GFP_NOIO;
 
-       sock->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
-       msock->sk->sk_priority = TC_PRIO_INTERACTIVE;
+       sock.socket->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
+       msock.socket->sk->sk_priority = TC_PRIO_INTERACTIVE;
 
        /* NOT YET ...
-        * sock->sk->sk_sndtimeo = tconn->net_conf->timeout*HZ/10;
-        * sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
+        * sock.socket->sk->sk_sndtimeo = tconn->net_conf->timeout*HZ/10;
+        * sock.socket->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
         * first set it to the P_CONNECTION_FEATURES timeout,
         * which we set to 4x the configured ping_timeout. */
        rcu_read_lock();
        nc = rcu_dereference(tconn->net_conf);
 
-       sock->sk->sk_sndtimeo =
-       sock->sk->sk_rcvtimeo = nc->ping_timeo*4*HZ/10;
+       sock.socket->sk->sk_sndtimeo =
+       sock.socket->sk->sk_rcvtimeo = nc->ping_timeo*4*HZ/10;
 
-       msock->sk->sk_rcvtimeo = nc->ping_int*HZ;
+       msock.socket->sk->sk_rcvtimeo = nc->ping_int*HZ;
        timeout = nc->timeout * HZ / 10;
+       discard_my_data = nc->discard_my_data;
        rcu_read_unlock();
 
-       msock->sk->sk_sndtimeo = timeout;
+       msock.socket->sk->sk_sndtimeo = timeout;
 
        /* we don't want delays.
         * we use TCP_CORK where appropriate, though */
-       drbd_tcp_nodelay(sock);
-       drbd_tcp_nodelay(msock);
+       drbd_tcp_nodelay(sock.socket);
+       drbd_tcp_nodelay(msock.socket);
 
+       tconn->data.socket = sock.socket;
+       tconn->meta.socket = msock.socket;
        tconn->last_received = jiffies;
 
        h = drbd_do_features(tconn);
@@ -990,31 +1026,55 @@ retry:
                }
        }
 
-       if (conn_request_state(tconn, NS(conn, C_WF_REPORT_PARAMS), CS_VERBOSE) < SS_SUCCESS)
-               return 0;
+       tconn->data.socket->sk->sk_sndtimeo = timeout;
+       tconn->data.socket->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
+
+       if (drbd_send_protocol(tconn) == -EOPNOTSUPP)
+               return -1;
 
-       sock->sk->sk_sndtimeo = timeout;
-       sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
+       set_bit(STATE_SENT, &tconn->flags);
+
+       rcu_read_lock();
+       idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+               kref_get(&mdev->kref);
+               rcu_read_unlock();
+
+               if (discard_my_data)
+                       set_bit(DISCARD_MY_DATA, &mdev->flags);
+               else
+                       clear_bit(DISCARD_MY_DATA, &mdev->flags);
+
+               drbd_connected(mdev);
+               kref_put(&mdev->kref, &drbd_minor_destroy);
+               rcu_read_lock();
+       }
+       rcu_read_unlock();
+
+       rv = conn_request_state(tconn, NS(conn, C_WF_REPORT_PARAMS), CS_VERBOSE);
+       if (rv < SS_SUCCESS) {
+               clear_bit(STATE_SENT, &tconn->flags);
+               return 0;
+       }
 
        drbd_thread_start(&tconn->asender);
 
-       if (drbd_send_protocol(tconn) == -EOPNOTSUPP)
-               return -1;
+       mutex_lock(&tconn->conf_update);
+       /* The discard_my_data flag is a single-shot modifier to the next
+        * connection attempt, the handshake of which is now well underway.
+        * No need for rcu style copying of the whole struct
+        * just to clear a single value. */
+       tconn->net_conf->discard_my_data = 0;
+       mutex_unlock(&tconn->conf_update);
 
-       down_read(&drbd_cfg_rwsem);
-       h = !idr_for_each(&tconn->volumes, drbd_connected, tconn);
-       up_read(&drbd_cfg_rwsem);
        return h;
 
 out_release_sockets:
-       if (tconn->data.socket) {
-               sock_release(tconn->data.socket);
-               tconn->data.socket = NULL;
-       }
-       if (tconn->meta.socket) {
-               sock_release(tconn->meta.socket);
-               tconn->meta.socket = NULL;
-       }
+       if (ad.s_listen)
+               sock_release(ad.s_listen);
+       if (sock.socket)
+               sock_release(sock.socket);
+       if (msock.socket)
+               sock_release(msock.socket);
        return -1;
 }
 
@@ -1069,21 +1129,37 @@ static int drbd_recv_header(struct drbd_tconn *tconn, struct packet_info *pi)
        return err;
 }
 
-static void drbd_flush(struct drbd_conf *mdev)
+static void drbd_flush(struct drbd_tconn *tconn)
 {
        int rv;
+       struct drbd_conf *mdev;
+       int vnr;
 
-       if (mdev->write_ordering >= WO_bdev_flush && get_ldev(mdev)) {
-               rv = blkdev_issue_flush(mdev->ldev->backing_bdev, GFP_KERNEL,
-                                       NULL);
-               if (rv) {
-                       dev_err(DEV, "local disk flush failed with status %d\n", rv);
-                       /* would rather check on EOPNOTSUPP, but that is not reliable.
-                        * don't try again for ANY return value != 0
-                        * if (rv == -EOPNOTSUPP) */
-                       drbd_bump_write_ordering(mdev, WO_drain_io);
+       if (tconn->write_ordering >= WO_bdev_flush) {
+               rcu_read_lock();
+               idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+                       if (!get_ldev(mdev))
+                               continue;
+                       kref_get(&mdev->kref);
+                       rcu_read_unlock();
+
+                       rv = blkdev_issue_flush(mdev->ldev->backing_bdev,
+                                       GFP_NOIO, NULL);
+                       if (rv) {
+                               dev_info(DEV, "local disk flush failed with status %d\n", rv);
+                               /* would rather check on EOPNOTSUPP, but that is not reliable.
+                                * don't try again for ANY return value != 0
+                                * if (rv == -EOPNOTSUPP) */
+                               drbd_bump_write_ordering(tconn, WO_drain_io);
+                       }
+                       put_ldev(mdev);
+                       kref_put(&mdev->kref, &drbd_minor_destroy);
+
+                       rcu_read_lock();
+                       if (rv)
+                               break;
                }
-               put_ldev(mdev);
+               rcu_read_unlock();
        }
 }
 
@@ -1093,7 +1169,7 @@ static void drbd_flush(struct drbd_conf *mdev)
  * @epoch:     Epoch object.
  * @ev:                Epoch event.
  */
-static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
+static enum finish_epoch drbd_may_finish_epoch(struct drbd_tconn *tconn,
                                               struct drbd_epoch *epoch,
                                               enum epoch_event ev)
 {
@@ -1101,7 +1177,7 @@ static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
        struct drbd_epoch *next_epoch;
        enum finish_epoch rv = FE_STILL_LIVE;
 
-       spin_lock(&mdev->epoch_lock);
+       spin_lock(&tconn->epoch_lock);
        do {
                next_epoch = NULL;
 
@@ -1121,19 +1197,24 @@ static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
 
                if (epoch_size != 0 &&
                    atomic_read(&epoch->active) == 0 &&
-                   test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags)) {
+                   (test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags) || ev & EV_CLEANUP)) {
                        if (!(ev & EV_CLEANUP)) {
-                               spin_unlock(&mdev->epoch_lock);
-                               drbd_send_b_ack(mdev, epoch->barrier_nr, epoch_size);
-                               spin_lock(&mdev->epoch_lock);
+                               spin_unlock(&tconn->epoch_lock);
+                               drbd_send_b_ack(epoch->tconn, epoch->barrier_nr, epoch_size);
+                               spin_lock(&tconn->epoch_lock);
                        }
-                       dec_unacked(mdev);
+#if 0
+                       /* FIXME: dec unacked on connection, once we have
+                        * something to count pending connection packets in. */
+                       if (test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags))
+                               dec_unacked(epoch->tconn);
+#endif
 
-                       if (mdev->current_epoch != epoch) {
+                       if (tconn->current_epoch != epoch) {
                                next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
                                list_del(&epoch->list);
                                ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
-                               mdev->epochs--;
+                               tconn->epochs--;
                                kfree(epoch);
 
                                if (rv == FE_STILL_LIVE)
@@ -1144,7 +1225,6 @@ static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
                                /* atomic_set(&epoch->active, 0); is already zero */
                                if (rv == FE_STILL_LIVE)
                                        rv = FE_RECYCLED;
-                               wake_up(&mdev->ee_wait);
                        }
                }
 
@@ -1154,34 +1234,46 @@ static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
                epoch = next_epoch;
        } while (1);
 
-       spin_unlock(&mdev->epoch_lock);
+       spin_unlock(&tconn->epoch_lock);
 
        return rv;
 }
 
 /**
  * drbd_bump_write_ordering() - Fall back to an other write ordering method
- * @mdev:      DRBD device.
+ * @tconn:     DRBD connection.
  * @wo:                Write ordering method to try.
  */
-void drbd_bump_write_ordering(struct drbd_conf *mdev, enum write_ordering_e wo) __must_hold(local)
+void drbd_bump_write_ordering(struct drbd_tconn *tconn, enum write_ordering_e wo)
 {
+       struct disk_conf *dc;
+       struct drbd_conf *mdev;
        enum write_ordering_e pwo;
+       int vnr;
        static char *write_ordering_str[] = {
                [WO_none] = "none",
                [WO_drain_io] = "drain",
                [WO_bdev_flush] = "flush",
        };
 
-       pwo = mdev->write_ordering;
+       pwo = tconn->write_ordering;
        wo = min(pwo, wo);
-       if (wo == WO_bdev_flush && mdev->ldev->dc.no_disk_flush)
-               wo = WO_drain_io;
-       if (wo == WO_drain_io && mdev->ldev->dc.no_disk_drain)
-               wo = WO_none;
-       mdev->write_ordering = wo;
-       if (pwo != mdev->write_ordering || wo == WO_bdev_flush)
-               dev_info(DEV, "Method to ensure write ordering: %s\n", write_ordering_str[mdev->write_ordering]);
+       rcu_read_lock();
+       idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+               if (!get_ldev_if_state(mdev, D_ATTACHING))
+                       continue;
+               dc = rcu_dereference(mdev->ldev->disk_conf);
+
+               if (wo == WO_bdev_flush && !dc->disk_flushes)
+                       wo = WO_drain_io;
+               if (wo == WO_drain_io && !dc->disk_drain)
+                       wo = WO_none;
+               put_ldev(mdev);
+       }
+       rcu_read_unlock();
+       tconn->write_ordering = wo;
+       if (pwo != tconn->write_ordering || wo == WO_bdev_flush)
+               conn_info(tconn, "Method to ensure write ordering: %s\n", write_ordering_str[tconn->write_ordering]);
 }
 
 /**
@@ -1294,28 +1386,41 @@ static void drbd_remove_epoch_entry_interval(struct drbd_conf *mdev,
                wake_up(&mdev->misc_wait);
 }
 
-static int receive_Barrier(struct drbd_tconn *tconn, struct packet_info *pi)
+void conn_wait_active_ee_empty(struct drbd_tconn *tconn)
 {
        struct drbd_conf *mdev;
+       int vnr;
+
+       rcu_read_lock();
+       idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+               kref_get(&mdev->kref);
+               rcu_read_unlock();
+               drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
+               kref_put(&mdev->kref, &drbd_minor_destroy);
+               rcu_read_lock();
+       }
+       rcu_read_unlock();
+}
+
+static int receive_Barrier(struct drbd_tconn *tconn, struct packet_info *pi)
+{
        int rv;
        struct p_barrier *p = pi->data;
        struct drbd_epoch *epoch;
 
-       mdev = vnr_to_mdev(tconn, pi->vnr);
-       if (!mdev)
-               return -EIO;
-
-       inc_unacked(mdev);
-
-       mdev->current_epoch->barrier_nr = p->barrier;
-       rv = drbd_may_finish_epoch(mdev, mdev->current_epoch, EV_GOT_BARRIER_NR);
+       /* FIXME these are unacked on connection,
+        * not a specific (peer)device.
+        */
+       tconn->current_epoch->barrier_nr = p->barrier;
+       tconn->current_epoch->tconn = tconn;
+       rv = drbd_may_finish_epoch(tconn, tconn->current_epoch, EV_GOT_BARRIER_NR);
 
        /* P_BARRIER_ACK may imply that the corresponding extent is dropped from
         * the activity log, which means it would not be resynced in case the
         * R_PRIMARY crashes now.
         * Therefore we must send the barrier_ack after the barrier request was
         * completed. */
-       switch (mdev->write_ordering) {
+       switch (tconn->write_ordering) {
        case WO_none:
                if (rv == FE_RECYCLED)
                        return 0;
@@ -1326,29 +1431,23 @@ static int receive_Barrier(struct drbd_tconn *tconn, struct packet_info *pi)
                if (epoch)
                        break;
                else
-                       dev_warn(DEV, "Allocation of an epoch failed, slowing down\n");
+                       conn_warn(tconn, "Allocation of an epoch failed, slowing down\n");
                        /* Fall through */
 
        case WO_bdev_flush:
        case WO_drain_io:
-               drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
-               drbd_flush(mdev);
+               conn_wait_active_ee_empty(tconn);
+               drbd_flush(tconn);
 
-               if (atomic_read(&mdev->current_epoch->epoch_size)) {
+               if (atomic_read(&tconn->current_epoch->epoch_size)) {
                        epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
                        if (epoch)
                                break;
                }
 
-               epoch = mdev->current_epoch;
-               wait_event(mdev->ee_wait, atomic_read(&epoch->epoch_size) == 0);
-
-               D_ASSERT(atomic_read(&epoch->active) == 0);
-               D_ASSERT(epoch->flags == 0);
-
                return 0;
        default:
-               dev_err(DEV, "Strangeness in mdev->write_ordering %d\n", mdev->write_ordering);
+               conn_err(tconn, "Strangeness in tconn->write_ordering %d\n", tconn->write_ordering);
                return -EIO;
        }
 
@@ -1356,16 +1455,16 @@ static int receive_Barrier(struct drbd_tconn *tconn, struct packet_info *pi)
        atomic_set(&epoch->epoch_size, 0);
        atomic_set(&epoch->active, 0);
 
-       spin_lock(&mdev->epoch_lock);
-       if (atomic_read(&mdev->current_epoch->epoch_size)) {
-               list_add(&epoch->list, &mdev->current_epoch->list);
-               mdev->current_epoch = epoch;
-               mdev->epochs++;
+       spin_lock(&tconn->epoch_lock);
+       if (atomic_read(&tconn->current_epoch->epoch_size)) {
+               list_add(&epoch->list, &tconn->current_epoch->list);
+               tconn->current_epoch = epoch;
+               tconn->epochs++;
        } else {
                /* The current_epoch got recycled while we allocated this one... */
                kfree(epoch);
        }
-       spin_unlock(&mdev->epoch_lock);
+       spin_unlock(&tconn->epoch_lock);
 
        return 0;
 }
@@ -1384,10 +1483,9 @@ read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector,
        void *dig_vv = mdev->tconn->int_dig_vv;
        unsigned long *data;
 
-       dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
-               crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
-
-       if (dgs) {
+       dgs = 0;
+       if (mdev->tconn->peer_integrity_tfm) {
+               dgs = crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm);
                /*
                 * FIXME: Receive the incoming digest into the receive buffer
                 *        here, together with its struct p_data?
@@ -1395,12 +1493,9 @@ read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector,
                err = drbd_recv_all_warn(mdev->tconn, dig_in, dgs);
                if (err)
                        return NULL;
+               data_size -= dgs;
        }
 
-       data_size -= dgs;
-
-       if (!expect(data_size != 0))
-               return NULL;
        if (!expect(IS_ALIGNED(data_size, 512)))
                return NULL;
        if (!expect(data_size <= DRBD_MAX_BIO_SIZE))
@@ -1423,6 +1518,9 @@ read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector,
        if (!peer_req)
                return NULL;
 
+       if (!data_size)
+               return peer_req;
+
        ds = data_size;
        page = peer_req->pages;
        page_chain_for_each(page) {
@@ -1442,7 +1540,7 @@ read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector,
        }
 
        if (dgs) {
-               drbd_csum_ee(mdev, mdev->tconn->integrity_r_tfm, peer_req, dig_vv);
+               drbd_csum_ee(mdev, mdev->tconn->peer_integrity_tfm, peer_req, dig_vv);
                if (memcmp(dig_in, dig_vv, dgs)) {
                        dev_err(DEV, "Digest integrity check FAILED: %llus +%u\n",
                                (unsigned long long)sector, data_size);
@@ -1491,17 +1589,15 @@ static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
        void *dig_in = mdev->tconn->int_dig_in;
        void *dig_vv = mdev->tconn->int_dig_vv;
 
-       dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
-               crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
-
-       if (dgs) {
+       dgs = 0;
+       if (mdev->tconn->peer_integrity_tfm) {
+               dgs = crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm);
                err = drbd_recv_all_warn(mdev->tconn, dig_in, dgs);
                if (err)
                        return err;
+               data_size -= dgs;
        }
 
-       data_size -= dgs;
-
        /* optimistically update recv_cnt.  if receiving fails below,
         * we disconnect anyways, and counters will be reset. */
        mdev->recv_cnt += data_size>>9;
@@ -1520,7 +1616,7 @@ static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
        }
 
        if (dgs) {
-               drbd_csum_bio(mdev, mdev->tconn->integrity_r_tfm, bio, dig_vv);
+               drbd_csum_bio(mdev, mdev->tconn->peer_integrity_tfm, bio, dig_vv);
                if (memcmp(dig_in, dig_vv, dgs)) {
                        dev_err(DEV, "Digest integrity check FAILED. Broken NICs?\n");
                        return -EINVAL;
@@ -1606,7 +1702,7 @@ find_request(struct drbd_conf *mdev, struct rb_root *root, u64 id,
        if (drbd_contains_interval(root, sector, &req->i) && req->i.local)
                return req;
        if (!missing_ok) {
-               dev_err(DEV, "%s: failed to find request %lu, sector %llus\n", func,
+               dev_err(DEV, "%s: failed to find request 0x%lx, sector %llus\n", func,
                        (unsigned long)id, (unsigned long long)sector);
        }
        return NULL;
@@ -1678,30 +1774,6 @@ static int receive_RSDataReply(struct drbd_tconn *tconn, struct packet_info *pi)
        return err;
 }
 
-static int w_restart_write(struct drbd_work *w, int cancel)
-{
-       struct drbd_request *req = container_of(w, struct drbd_request, w);
-       struct drbd_conf *mdev = w->mdev;
-       struct bio *bio;
-       unsigned long start_time;
-       unsigned long flags;
-
-       spin_lock_irqsave(&mdev->tconn->req_lock, flags);
-       if (!expect(req->rq_state & RQ_POSTPONED)) {
-               spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
-               return -EIO;
-       }
-       bio = req->master_bio;
-       start_time = req->start_time;
-       /* Postponed requests will not have their master_bio completed!  */
-       __req_mod(req, DISCARD_WRITE, NULL);
-       spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
-
-       while (__drbd_make_request(mdev, bio, start_time))
-               /* retry */ ;
-       return 0;
-}
-
 static void restart_conflicting_writes(struct drbd_conf *mdev,
                                       sector_t sector, int size)
 {
@@ -1715,11 +1787,9 @@ static void restart_conflicting_writes(struct drbd_conf *mdev,
                if (req->rq_state & RQ_LOCAL_PENDING ||
                    !(req->rq_state & RQ_POSTPONED))
                        continue;
-               if (expect(list_empty(&req->w.list))) {
-                       req->w.mdev = mdev;
-                       req->w.cb = w_restart_write;
-                       drbd_queue_work(&mdev->tconn->data.work, &req->w);
-               }
+               /* as it is RQ_POSTPONED, this will cause it to
+                * be queued on the retry workqueue. */
+               __req_mod(req, CONFLICT_RESOLVED, NULL);
        }
 }
 
@@ -1752,7 +1822,7 @@ static int e_end_block(struct drbd_work *w, int cancel)
        }
        /* we delete from the conflict detection hash _after_ we sent out the
         * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right.  */
-       if (mdev->tconn->net_conf->two_primaries) {
+       if (peer_req->flags & EE_IN_INTERVAL_TREE) {
                spin_lock_irq(&mdev->tconn->req_lock);
                D_ASSERT(!drbd_interval_empty(&peer_req->i));
                drbd_remove_epoch_entry_interval(mdev, peer_req);
@@ -1762,7 +1832,7 @@ static int e_end_block(struct drbd_work *w, int cancel)
        } else
                D_ASSERT(drbd_interval_empty(&peer_req->i));
 
-       drbd_may_finish_epoch(mdev, peer_req->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
+       drbd_may_finish_epoch(mdev->tconn, peer_req->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
 
        return err;
 }
@@ -1780,9 +1850,9 @@ static int e_send_ack(struct drbd_work *w, enum drbd_packet ack)
        return err;
 }
 
-static int e_send_discard_write(struct drbd_work *w, int unused)
+static int e_send_superseded(struct drbd_work *w, int unused)
 {
-       return e_send_ack(w, P_DISCARD_WRITE);
+       return e_send_ack(w, P_SUPERSEDED);
 }
 
 static int e_send_retry_write(struct drbd_work *w, int unused)
@@ -1790,7 +1860,7 @@ static int e_send_retry_write(struct drbd_work *w, int unused)
        struct drbd_tconn *tconn = w->mdev->tconn;
 
        return e_send_ack(w, tconn->agreed_pro_version >= 100 ?
-                            P_RETRY_WRITE : P_DISCARD_WRITE);
+                            P_RETRY_WRITE : P_SUPERSEDED);
 }
 
 static bool seq_greater(u32 a, u32 b)
@@ -1811,14 +1881,19 @@ static u32 seq_max(u32 a, u32 b)
 static bool need_peer_seq(struct drbd_conf *mdev)
 {
        struct drbd_tconn *tconn = mdev->tconn;
+       int tp;
 
        /*
         * We only need to keep track of the last packet_seq number of our peer
-        * if we are in dual-primary mode and we have the discard flag set; see
+        * if we are in dual-primary mode and we have the resolve-conflicts flag set; see
         * handle_write_conflicts().
         */
-       return tconn->net_conf->two_primaries &&
-              test_bit(DISCARD_CONCURRENT, &tconn->flags);
+
+       rcu_read_lock();
+       tp = rcu_dereference(mdev->tconn->net_conf)->two_primaries;
+       rcu_read_unlock();
+
+       return tp && test_bit(RESOLVE_CONFLICTS, &tconn->flags);
 }
 
 static void update_peer_seq(struct drbd_conf *mdev, unsigned int peer_seq)
@@ -1836,6 +1911,30 @@ static void update_peer_seq(struct drbd_conf *mdev, unsigned int peer_seq)
        }
 }
 
+static inline int overlaps(sector_t s1, int l1, sector_t s2, int l2)
+{
+       return !((s1 + (l1>>9) <= s2) || (s1 >= s2 + (l2>>9)));
+}
+
+/* maybe change sync_ee into interval trees as well? */
+static bool overlapping_resync_write(struct drbd_conf *mdev, struct drbd_peer_request *peer_req)
+{
+       struct drbd_peer_request *rs_req;
+       bool rv = 0;
+
+       spin_lock_irq(&mdev->tconn->req_lock);
+       list_for_each_entry(rs_req, &mdev->sync_ee, w.list) {
+               if (overlaps(peer_req->i.sector, peer_req->i.size,
+                            rs_req->i.sector, rs_req->i.size)) {
+                       rv = 1;
+                       break;
+               }
+       }
+       spin_unlock_irq(&mdev->tconn->req_lock);
+
+       return rv;
+}
+
 /* Called from receive_Data.
  * Synchronize packets on sock with packets on msock.
  *
@@ -1935,7 +2034,7 @@ static int handle_write_conflicts(struct drbd_conf *mdev,
                                  struct drbd_peer_request *peer_req)
 {
        struct drbd_tconn *tconn = mdev->tconn;
-       bool resolve_conflicts = test_bit(DISCARD_CONCURRENT, &tconn->flags);
+       bool resolve_conflicts = test_bit(RESOLVE_CONFLICTS, &tconn->flags);
        sector_t sector = peer_req->i.sector;
        const unsigned int size = peer_req->i.size;
        struct drbd_interval *i;
@@ -1969,11 +2068,11 @@ static int handle_write_conflicts(struct drbd_conf *mdev,
                if (resolve_conflicts) {
                        /*
                         * If the peer request is fully contained within the
-                        * overlapping request, it can be discarded; otherwise,
-                        * it will be retried once all overlapping requests
-                        * have completed.
+                        * overlapping request, it can be considered overwritten
+                        * and thus superseded; otherwise, it will be retried
+                        * once all overlapping requests have completed.
                         */
-                       bool discard = i->sector <= sector && i->sector +
+                       bool superseded = i->sector <= sector && i->sector +
                                       (i->size >> 9) >= sector + (size >> 9);
 
                        if (!equal)
@@ -1982,10 +2081,10 @@ static int handle_write_conflicts(struct drbd_conf *mdev,
                                               "assuming %s came first\n",
                                          (unsigned long long)i->sector, i->size,
                                          (unsigned long long)sector, size,
-                                         discard ? "local" : "remote");
+                                         superseded ? "local" : "remote");
 
                        inc_unacked(mdev);
-                       peer_req->w.cb = discard ? e_send_discard_write :
+                       peer_req->w.cb = superseded ? e_send_superseded :
                                                   e_send_retry_write;
                        list_add_tail(&peer_req->w.list, &mdev->done_ee);
                        wake_asender(mdev->tconn);
@@ -2006,8 +2105,9 @@ static int handle_write_conflicts(struct drbd_conf *mdev,
                            !(req->rq_state & RQ_POSTPONED)) {
                                /*
                                 * Wait for the node with the discard flag to
-                                * decide if this request will be discarded or
-                                * retried.  Requests that are discarded will
+                                * decide if this request has been superseded
+                                * or needs to be retried.
+                                * Requests that have been superseded will
                                 * disappear from the write_requests tree.
                                 *
                                 * In addition, wait for the conflicting
@@ -2049,7 +2149,7 @@ static int receive_Data(struct drbd_tconn *tconn, struct packet_info *pi)
        u32 peer_seq = be32_to_cpu(p->seq_num);
        int rw = WRITE;
        u32 dp_flags;
-       int err;
+       int err, tp;
 
        mdev = vnr_to_mdev(tconn, pi->vnr);
        if (!mdev)
@@ -2060,7 +2160,7 @@ static int receive_Data(struct drbd_tconn *tconn, struct packet_info *pi)
 
                err = wait_for_and_update_peer_seq(mdev, peer_seq);
                drbd_send_ack_dp(mdev, P_NEG_ACK, p, pi->size);
-               atomic_inc(&mdev->current_epoch->epoch_size);
+               atomic_inc(&tconn->current_epoch->epoch_size);
                err2 = drbd_drain_block(mdev, pi->size);
                if (!err)
                        err = err2;
@@ -2084,17 +2184,25 @@ static int receive_Data(struct drbd_tconn *tconn, struct packet_info *pi)
 
        dp_flags = be32_to_cpu(p->dp_flags);
        rw |= wire_flags_to_bio(mdev, dp_flags);
+       if (peer_req->pages == NULL) {
+               D_ASSERT(peer_req->i.size == 0);
+               D_ASSERT(dp_flags & DP_FLUSH);
+       }
 
        if (dp_flags & DP_MAY_SET_IN_SYNC)
                peer_req->flags |= EE_MAY_SET_IN_SYNC;
 
-       spin_lock(&mdev->epoch_lock);
-       peer_req->epoch = mdev->current_epoch;
+       spin_lock(&tconn->epoch_lock);
+       peer_req->epoch = tconn->current_epoch;
        atomic_inc(&peer_req->epoch->epoch_size);
        atomic_inc(&peer_req->epoch->active);
-       spin_unlock(&mdev->epoch_lock);
+       spin_unlock(&tconn->epoch_lock);
 
-       if (mdev->tconn->net_conf->two_primaries) {
+       rcu_read_lock();
+       tp = rcu_dereference(mdev->tconn->net_conf)->two_primaries;
+       rcu_read_unlock();
+       if (tp) {
+               peer_req->flags |= EE_IN_INTERVAL_TREE;
                err = wait_for_and_update_peer_seq(mdev, peer_seq);
                if (err)
                        goto out_interrupted;
@@ -2113,6 +2221,9 @@ static int receive_Data(struct drbd_tconn *tconn, struct packet_info *pi)
        list_add(&peer_req->w.list, &mdev->active_ee);
        spin_unlock_irq(&mdev->tconn->req_lock);
 
+       if (mdev->state.conn == C_SYNC_TARGET)
+               wait_event(mdev->ee_wait, !overlapping_resync_write(mdev, peer_req));
+
        if (mdev->tconn->agreed_pro_version < 100) {
                rcu_read_lock();
                switch (rcu_dereference(mdev->tconn->net_conf)->wire_protocol) {
@@ -2161,7 +2272,7 @@ static int receive_Data(struct drbd_tconn *tconn, struct packet_info *pi)
                drbd_al_complete_io(mdev, &peer_req->i);
 
 out_interrupted:
-       drbd_may_finish_epoch(mdev, peer_req->epoch, EV_PUT + EV_CLEANUP);
+       drbd_may_finish_epoch(tconn, peer_req->epoch, EV_PUT + EV_CLEANUP);
        put_ldev(mdev);
        drbd_free_peer_req(mdev, peer_req);
        return err;
@@ -2185,9 +2296,14 @@ int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
        struct lc_element *tmp;
        int curr_events;
        int throttle = 0;
+       unsigned int c_min_rate;
+
+       rcu_read_lock();
+       c_min_rate = rcu_dereference(mdev->ldev->disk_conf)->c_min_rate;
+       rcu_read_unlock();
 
        /* feature disabled? */
-       if (mdev->ldev->dc.c_min_rate == 0)
+       if (c_min_rate == 0)
                return 0;
 
        spin_lock_irq(&mdev->al_lock);
@@ -2227,7 +2343,7 @@ int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
                db = mdev->rs_mark_left[i] - rs_left;
                dbdt = Bit2KB(db/dt);
 
-               if (dbdt > mdev->ldev->dc.c_min_rate)
+               if (dbdt > c_min_rate)
                        throttle = 1;
        }
        return throttle;
@@ -2470,7 +2586,7 @@ static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
                     "Using discard-least-changes instead\n");
        case ASB_DISCARD_ZERO_CHG:
                if (ch_peer == 0 && ch_self == 0) {
-                       rv = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags)
+                       rv = test_bit(RESOLVE_CONFLICTS, &mdev->tconn->flags)
                                ? -1 : 1;
                        break;
                } else {
@@ -2486,7 +2602,7 @@ static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
                        rv =  1;
                else /* ( ch_self == ch_peer ) */
                     /* Well, then use something else. */
-                       rv = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags)
+                       rv = test_bit(RESOLVE_CONFLICTS, &mdev->tconn->flags)
                                ? -1 : 1;
                break;
        case ASB_DISCARD_LOCAL:
@@ -2661,7 +2777,9 @@ static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(l
                        if ((mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
                            (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
                                dev_info(DEV, "was SyncSource, missed the resync finished event, corrected myself:\n");
-                               drbd_uuid_set_bm(mdev, 0UL);
+                               drbd_uuid_move_history(mdev);
+                               mdev->ldev->md.uuid[UI_HISTORY_START] = mdev->ldev->md.uuid[UI_BITMAP];
+                               mdev->ldev->md.uuid[UI_BITMAP] = 0;
 
                                drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
                                               mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
@@ -2709,7 +2827,7 @@ static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(l
                case 1: /*  self_pri && !peer_pri */ return 1;
                case 2: /* !self_pri &&  peer_pri */ return -1;
                case 3: /*  self_pri &&  peer_pri */
-                       dc = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
+                       dc = test_bit(RESOLVE_CONFLICTS, &mdev->tconn->flags);
                        return dc ? -1 : 1;
                }
        }
@@ -2735,7 +2853,7 @@ static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(l
                        mdev->p_uuid[UI_BITMAP] = mdev->p_uuid[UI_HISTORY_START];
                        mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_HISTORY_START + 1];
 
-                       dev_info(DEV, "Did not got last syncUUID packet, corrected:\n");
+                       dev_info(DEV, "Lost last syncUUID packet, corrected:\n");
                        drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
 
                        return -1;
@@ -2769,8 +2887,8 @@ static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(l
                        if (mdev->tconn->agreed_pro_version < 91)
                                return -1091;
 
-                       _drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
-                       _drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
+                       __drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
+                       __drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
 
                        dev_info(DEV, "Last syncUUID did not get through, corrected:\n");
                        drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
@@ -2817,18 +2935,21 @@ static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_rol
        enum drbd_conns rv = C_MASK;
        enum drbd_disk_state mydisk;
        struct net_conf *nc;
-       int hg, rule_nr, rr_conflict, dry_run;
+       int hg, rule_nr, rr_conflict, tentative;
 
        mydisk = mdev->state.disk;
        if (mydisk == D_NEGOTIATING)
                mydisk = mdev->new_state_tmp.disk;
 
        dev_info(DEV, "drbd_sync_handshake:\n");
+
+       spin_lock_irq(&mdev->ldev->md.uuid_lock);
        drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid, mdev->comm_bm_set, 0);
        drbd_uuid_dump(mdev, "peer", mdev->p_uuid,
                       mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
 
        hg = drbd_uuid_compare(mdev, &rule_nr);
+       spin_unlock_irq(&mdev->ldev->md.uuid_lock);
 
        dev_info(DEV, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
 
@@ -2886,9 +3007,9 @@ static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_rol
        }
 
        if (hg == -100) {
-               if (nc->want_lose && !(mdev->p_uuid[UI_FLAGS]&1))
+               if (test_bit(DISCARD_MY_DATA, &mdev->flags) && !(mdev->p_uuid[UI_FLAGS]&1))
                        hg = -1;
-               if (!nc->want_lose && (mdev->p_uuid[UI_FLAGS]&1))
+               if (!test_bit(DISCARD_MY_DATA, &mdev->flags) && (mdev->p_uuid[UI_FLAGS]&1))
                        hg = 1;
 
                if (abs(hg) < 100)
@@ -2897,7 +3018,7 @@ static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_rol
                             (hg < 0) ? "peer" : "this");
        }
        rr_conflict = nc->rr_conflict;
-       dry_run = nc->dry_run;
+       tentative = nc->tentative;
        rcu_read_unlock();
 
        if (hg == -100) {
@@ -2930,7 +3051,7 @@ static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_rol
                }
        }
 
-       if (dry_run || test_bit(CONN_DRY_RUN, &mdev->tconn->flags)) {
+       if (tentative || test_bit(CONN_DRY_RUN, &mdev->tconn->flags)) {
                if (hg == 0)
                        dev_info(DEV, "dry-run connect: No resync, would become Connected immediately.\n");
                else
@@ -2962,35 +3083,29 @@ static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_rol
        return rv;
 }
 
-/* returns 1 if invalid */
-static int cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self)
+static enum drbd_after_sb_p convert_after_sb(enum drbd_after_sb_p peer)
 {
        /* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
-       if ((peer == ASB_DISCARD_REMOTE && self == ASB_DISCARD_LOCAL) ||
-           (self == ASB_DISCARD_REMOTE && peer == ASB_DISCARD_LOCAL))
-               return 0;
+       if (peer == ASB_DISCARD_REMOTE)
+               return ASB_DISCARD_LOCAL;
 
        /* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
-       if (peer == ASB_DISCARD_REMOTE || peer == ASB_DISCARD_LOCAL ||
-           self == ASB_DISCARD_REMOTE || self == ASB_DISCARD_LOCAL)
-               return 1;
+       if (peer == ASB_DISCARD_LOCAL)
+               return ASB_DISCARD_REMOTE;
 
        /* everything else is valid if they are equal on both sides. */
-       if (peer == self)
-               return 0;
-
-       /* everything es is invalid. */
-       return 1;
+       return peer;
 }
 
 static int receive_protocol(struct drbd_tconn *tconn, struct packet_info *pi)
 {
        struct p_protocol *p = pi->data;
-       int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
-       int p_want_lose, p_two_primaries, cf;
-       char p_integrity_alg[SHARED_SECRET_MAX] = "";
-       unsigned char *my_alg;
-       struct net_conf *nc;
+       enum drbd_after_sb_p p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
+       int p_proto, p_discard_my_data, p_two_primaries, cf;
+       struct net_conf *nc, *old_net_conf, *new_net_conf = NULL;
+       char integrity_alg[SHARED_SECRET_MAX] = "";
+       struct crypto_hash *peer_integrity_tfm = NULL;
+       void *int_dig_in = NULL, *int_dig_vv = NULL;
 
        p_proto         = be32_to_cpu(p->protocol);
        p_after_sb_0p   = be32_to_cpu(p->after_sb_0p);
@@ -2998,70 +3113,136 @@ static int receive_protocol(struct drbd_tconn *tconn, struct packet_info *pi)
        p_after_sb_2p   = be32_to_cpu(p->after_sb_2p);
        p_two_primaries = be32_to_cpu(p->two_primaries);
        cf              = be32_to_cpu(p->conn_flags);
-       p_want_lose = cf & CF_WANT_LOSE;
+       p_discard_my_data = cf & CF_DISCARD_MY_DATA;
+
+       if (tconn->agreed_pro_version >= 87) {
+               int err;
+
+               if (pi->size > sizeof(integrity_alg))
+                       return -EIO;
+               err = drbd_recv_all(tconn, integrity_alg, pi->size);
+               if (err)
+                       return err;
+               integrity_alg[SHARED_SECRET_MAX - 1] = 0;
+       }
 
-       clear_bit(CONN_DRY_RUN, &tconn->flags);
+       if (pi->cmd != P_PROTOCOL_UPDATE) {
+               clear_bit(CONN_DRY_RUN, &tconn->flags);
 
-       if (cf & CF_DRY_RUN)
-               set_bit(CONN_DRY_RUN, &tconn->flags);
+               if (cf & CF_DRY_RUN)
+                       set_bit(CONN_DRY_RUN, &tconn->flags);
 
-       rcu_read_lock();
-       nc = rcu_dereference(tconn->net_conf);
+               rcu_read_lock();
+               nc = rcu_dereference(tconn->net_conf);
 
-       if (p_proto != nc->wire_protocol && tconn->agreed_pro_version < 100) {
-               conn_err(tconn, "incompatible communication protocols\n");
-               goto disconnect_rcu_unlock;
-       }
+               if (p_proto != nc->wire_protocol) {
+                       conn_err(tconn, "incompatible %s settings\n", "protocol");
+                       goto disconnect_rcu_unlock;
+               }
 
-       if (cmp_after_sb(p_after_sb_0p, nc->after_sb_0p)) {
-               conn_err(tconn, "incompatible after-sb-0pri settings\n");
-               goto disconnect_rcu_unlock;
-       }
+               if (convert_after_sb(p_after_sb_0p) != nc->after_sb_0p) {
+                       conn_err(tconn, "incompatible %s settings\n", "after-sb-0pri");
+                       goto disconnect_rcu_unlock;
+               }
 
-       if (cmp_after_sb(p_after_sb_1p, nc->after_sb_1p)) {
-               conn_err(tconn, "incompatible after-sb-1pri settings\n");
-               goto disconnect_rcu_unlock;
-       }
+               if (convert_after_sb(p_after_sb_1p) != nc->after_sb_1p) {
+                       conn_err(tconn, "incompatible %s settings\n", "after-sb-1pri");
+                       goto disconnect_rcu_unlock;
+               }
 
-       if (cmp_after_sb(p_after_sb_2p, nc->after_sb_2p)) {
-               conn_err(tconn, "incompatible after-sb-2pri settings\n");
-               goto disconnect_rcu_unlock;
-       }
+               if (convert_after_sb(p_after_sb_2p) != nc->after_sb_2p) {
+                       conn_err(tconn, "incompatible %s settings\n", "after-sb-2pri");
+                       goto disconnect_rcu_unlock;
+               }
 
-       if (p_want_lose && nc->want_lose) {
-               conn_err(tconn, "both sides have the 'want_lose' flag set\n");
-               goto disconnect_rcu_unlock;
-       }
+               if (p_discard_my_data && nc->discard_my_data) {
+                       conn_err(tconn, "incompatible %s settings\n", "discard-my-data");
+                       goto disconnect_rcu_unlock;
+               }
+
+               if (p_two_primaries != nc->two_primaries) {
+                       conn_err(tconn, "incompatible %s settings\n", "allow-two-primaries");
+                       goto disconnect_rcu_unlock;
+               }
 
-       if (p_two_primaries != nc->two_primaries) {
-               conn_err(tconn, "incompatible setting of the two-primaries options\n");
-               goto disconnect_rcu_unlock;
+               if (strcmp(integrity_alg, nc->integrity_alg)) {
+                       conn_err(tconn, "incompatible %s settings\n", "data-integrity-alg");
+                       goto disconnect_rcu_unlock;
+               }
+
+               rcu_read_unlock();
        }
 
-       my_alg = nc->integrity_alg;
-       rcu_read_unlock();
+       if (integrity_alg[0]) {
+               int hash_size;
 
-       if (tconn->agreed_pro_version >= 87) {
-               int err;
+               /*
+                * We can only change the peer data integrity algorithm
+                * here.  Changing our own data integrity algorithm
+                * requires that we send a P_PROTOCOL_UPDATE packet at
+                * the same time; otherwise, the peer has no way to
+                * tell between which packets the algorithm should
+                * change.
+                */
 
-               err = drbd_recv_all(tconn, p_integrity_alg, pi->size);
-               if (err)
-                       return err;
+               peer_integrity_tfm = crypto_alloc_hash(integrity_alg, 0, CRYPTO_ALG_ASYNC);
+               if (!peer_integrity_tfm) {
+                       conn_err(tconn, "peer data-integrity-alg %s not supported\n",
+                                integrity_alg);
+                       goto disconnect;
+               }
 
-               p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
-               if (strcmp(p_integrity_alg, my_alg)) {
-                       conn_err(tconn, "incompatible setting of the data-integrity-alg\n");
+               hash_size = crypto_hash_digestsize(peer_integrity_tfm);
+               int_dig_in = kmalloc(hash_size, GFP_KERNEL);
+               int_dig_vv = kmalloc(hash_size, GFP_KERNEL);
+               if (!(int_dig_in && int_dig_vv)) {
+                       conn_err(tconn, "Allocation of buffers for data integrity checking failed\n");
                        goto disconnect;
                }
-               conn_info(tconn, "data-integrity-alg: %s\n",
-                    my_alg[0] ? my_alg : (unsigned char *)"<not-used>");
        }
 
+       new_net_conf = kmalloc(sizeof(struct net_conf), GFP_KERNEL);
+       if (!new_net_conf) {
+               conn_err(tconn, "Allocation of new net_conf failed\n");
+               goto disconnect;
+       }
+
+       mutex_lock(&tconn->data.mutex);
+       mutex_lock(&tconn->conf_update);
+       old_net_conf = tconn->net_conf;
+       *new_net_conf = *old_net_conf;
+
+       new_net_conf->wire_protocol = p_proto;
+       new_net_conf->after_sb_0p = convert_after_sb(p_after_sb_0p);
+       new_net_conf->after_sb_1p = convert_after_sb(p_after_sb_1p);
+       new_net_conf->after_sb_2p = convert_after_sb(p_after_sb_2p);
+       new_net_conf->two_primaries = p_two_primaries;
+
+       rcu_assign_pointer(tconn->net_conf, new_net_conf);
+       mutex_unlock(&tconn->conf_update);
+       mutex_unlock(&tconn->data.mutex);
+
+       crypto_free_hash(tconn->peer_integrity_tfm);
+       kfree(tconn->int_dig_in);
+       kfree(tconn->int_dig_vv);
+       tconn->peer_integrity_tfm = peer_integrity_tfm;
+       tconn->int_dig_in = int_dig_in;
+       tconn->int_dig_vv = int_dig_vv;
+
+       if (strcmp(old_net_conf->integrity_alg, integrity_alg))
+               conn_info(tconn, "peer data-integrity-alg: %s\n",
+                         integrity_alg[0] ? integrity_alg : "(none)");
+
+       synchronize_rcu();
+       kfree(old_net_conf);
        return 0;
 
 disconnect_rcu_unlock:
        rcu_read_unlock();
 disconnect:
+       crypto_free_hash(peer_integrity_tfm);
+       kfree(int_dig_in);
+       kfree(int_dig_vv);
        conn_request_state(tconn, NS(conn, C_DISCONNECTING), CS_HARD);
        return -EIO;
 }
@@ -3085,11 +3266,6 @@ struct crypto_hash *drbd_crypto_alloc_digest_safe(const struct drbd_conf *mdev,
                        alg, name, PTR_ERR(tfm));
                return tfm;
        }
-       if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
-               crypto_free_hash(tfm);
-               dev_err(DEV, "\"%s\" is not a digest (%s)\n", alg, name);
-               return ERR_PTR(-EINVAL);
-       }
        return tfm;
 }
 
@@ -3126,8 +3302,8 @@ static int ignore_remaining_packet(struct drbd_tconn *tconn, struct packet_info
  */
 static int config_unknown_volume(struct drbd_tconn *tconn, struct packet_info *pi)
 {
-       conn_warn(tconn, "Volume %u unknown; ignoring %s packet\n",
-                 pi->vnr, cmdname(pi->cmd));
+       conn_warn(tconn, "%s packet received for volume %u, which is not configured locally\n",
+                 cmdname(pi->cmd), pi->vnr);
        return ignore_remaining_packet(tconn, pi);
 }
 
@@ -3138,8 +3314,10 @@ static int receive_SyncParam(struct drbd_tconn *tconn, struct packet_info *pi)
        unsigned int header_size, data_size, exp_max_sz;
        struct crypto_hash *verify_tfm = NULL;
        struct crypto_hash *csums_tfm = NULL;
+       struct net_conf *old_net_conf, *new_net_conf = NULL;
+       struct disk_conf *old_disk_conf = NULL, *new_disk_conf = NULL;
        const int apv = tconn->agreed_pro_version;
-       int *rs_plan_s = NULL;
+       struct fifo_buffer *old_plan = NULL, *new_plan = NULL;
        int fifo_size = 0;
        int err;
 
@@ -3180,24 +3358,36 @@ static int receive_SyncParam(struct drbd_tconn *tconn, struct packet_info *pi)
        if (err)
                return err;
 
+       mutex_lock(&mdev->tconn->conf_update);
+       old_net_conf = mdev->tconn->net_conf;
        if (get_ldev(mdev)) {
-               mdev->ldev->dc.resync_rate = be32_to_cpu(p->rate);
-               put_ldev(mdev);
+               new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
+               if (!new_disk_conf) {
+                       put_ldev(mdev);
+                       mutex_unlock(&mdev->tconn->conf_update);
+                       dev_err(DEV, "Allocation of new disk_conf failed\n");
+                       return -ENOMEM;
+               }
+
+               old_disk_conf = mdev->ldev->disk_conf;
+               *new_disk_conf = *old_disk_conf;
+
+               new_disk_conf->resync_rate = be32_to_cpu(p->resync_rate);
        }
 
        if (apv >= 88) {
                if (apv == 88) {
-                       if (data_size > SHARED_SECRET_MAX) {
-                               dev_err(DEV, "verify-alg too long, "
-                                   "peer wants %u, accepting only %u byte\n",
-                                               data_size, SHARED_SECRET_MAX);
-                               return -EIO;
+                       if (data_size > SHARED_SECRET_MAX || data_size == 0) {
+                               dev_err(DEV, "verify-alg of wrong size, "
+                                       "peer wants %u, accepting only up to %u byte\n",
+                                       data_size, SHARED_SECRET_MAX);
+                               err = -EIO;
+                               goto reconnect;
                        }
 
                        err = drbd_recv_all(mdev->tconn, p->verify_alg, data_size);
                        if (err)
-                               return err;
-
+                               goto reconnect;
                        /* we expect NUL terminated string */
                        /* but just in case someone tries to be evil */
                        D_ASSERT(p->verify_alg[data_size-1] == 0);
@@ -3212,10 +3402,10 @@ static int receive_SyncParam(struct drbd_tconn *tconn, struct packet_info *pi)
                        p->csums_alg[SHARED_SECRET_MAX-1] = 0;
                }
 
-               if (strcmp(mdev->tconn->net_conf->verify_alg, p->verify_alg)) {
+               if (strcmp(old_net_conf->verify_alg, p->verify_alg)) {
                        if (mdev->state.conn == C_WF_REPORT_PARAMS) {
                                dev_err(DEV, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
-                                   mdev->tconn->net_conf->verify_alg, p->verify_alg);
+                                   old_net_conf->verify_alg, p->verify_alg);
                                goto disconnect;
                        }
                        verify_tfm = drbd_crypto_alloc_digest_safe(mdev,
@@ -3226,10 +3416,10 @@ static int receive_SyncParam(struct drbd_tconn *tconn, struct packet_info *pi)
                        }
                }
 
-               if (apv >= 89 && strcmp(mdev->tconn->net_conf->csums_alg, p->csums_alg)) {
+               if (apv >= 89 && strcmp(old_net_conf->csums_alg, p->csums_alg)) {
                        if (mdev->state.conn == C_WF_REPORT_PARAMS) {
                                dev_err(DEV, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
-                                   mdev->tconn->net_conf->csums_alg, p->csums_alg);
+                                   old_net_conf->csums_alg, p->csums_alg);
                                goto disconnect;
                        }
                        csums_tfm = drbd_crypto_alloc_digest_safe(mdev,
@@ -3240,52 +3430,84 @@ static int receive_SyncParam(struct drbd_tconn *tconn, struct packet_info *pi)
                        }
                }
 
-               if (apv > 94 && get_ldev(mdev)) {
-                       mdev->ldev->dc.resync_rate = be32_to_cpu(p->rate);
-                       mdev->ldev->dc.c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
-                       mdev->ldev->dc.c_delay_target = be32_to_cpu(p->c_delay_target);
-                       mdev->ldev->dc.c_fill_target = be32_to_cpu(p->c_fill_target);
-                       mdev->ldev->dc.c_max_rate = be32_to_cpu(p->c_max_rate);
-
-                       fifo_size = (mdev->ldev->dc.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
-                       if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
-                               rs_plan_s   = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
-                               if (!rs_plan_s) {
+               if (apv > 94 && new_disk_conf) {
+                       new_disk_conf->c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
+                       new_disk_conf->c_delay_target = be32_to_cpu(p->c_delay_target);
+                       new_disk_conf->c_fill_target = be32_to_cpu(p->c_fill_target);
+                       new_disk_conf->c_max_rate = be32_to_cpu(p->c_max_rate);
+
+                       fifo_size = (new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ;
+                       if (fifo_size != mdev->rs_plan_s->size) {
+                               new_plan = fifo_alloc(fifo_size);
+                               if (!new_plan) {
                                        dev_err(DEV, "kmalloc of fifo_buffer failed");
                                        put_ldev(mdev);
                                        goto disconnect;
                                }
                        }
-                       put_ldev(mdev);
                }
 
-               spin_lock(&mdev->peer_seq_lock);
-               /* lock against drbd_nl_syncer_conf() */
-               if (verify_tfm) {
-                       strcpy(mdev->tconn->net_conf->verify_alg, p->verify_alg);
-                       mdev->tconn->net_conf->verify_alg_len = strlen(p->verify_alg) + 1;
-                       crypto_free_hash(mdev->tconn->verify_tfm);
-                       mdev->tconn->verify_tfm = verify_tfm;
-                       dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
-               }
-               if (csums_tfm) {
-                       strcpy(mdev->tconn->net_conf->csums_alg, p->csums_alg);
-                       mdev->tconn->net_conf->csums_alg_len = strlen(p->csums_alg) + 1;
-                       crypto_free_hash(mdev->tconn->csums_tfm);
-                       mdev->tconn->csums_tfm = csums_tfm;
-                       dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
-               }
-               if (fifo_size != mdev->rs_plan_s.size) {
-                       kfree(mdev->rs_plan_s.values);
-                       mdev->rs_plan_s.values = rs_plan_s;
-                       mdev->rs_plan_s.size   = fifo_size;
-                       mdev->rs_planed = 0;
+               if (verify_tfm || csums_tfm) {
+                       new_net_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
+                       if (!new_net_conf) {
+                               dev_err(DEV, "Allocation of new net_conf failed\n");
+                               goto disconnect;
+                       }
+
+                       *new_net_conf = *old_net_conf;
+
+                       if (verify_tfm) {
+                               strcpy(new_net_conf->verify_alg, p->verify_alg);
+                               new_net_conf->verify_alg_len = strlen(p->verify_alg) + 1;
+                               crypto_free_hash(mdev->tconn->verify_tfm);
+                               mdev->tconn->verify_tfm = verify_tfm;
+                               dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
+                       }
+                       if (csums_tfm) {
+                               strcpy(new_net_conf->csums_alg, p->csums_alg);
+                               new_net_conf->csums_alg_len = strlen(p->csums_alg) + 1;
+                               crypto_free_hash(mdev->tconn->csums_tfm);
+                               mdev->tconn->csums_tfm = csums_tfm;
+                               dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
+                       }
+                       rcu_assign_pointer(tconn->net_conf, new_net_conf);
                }
-               spin_unlock(&mdev->peer_seq_lock);
        }
+
+       if (new_disk_conf) {
+               rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
+               put_ldev(mdev);
+       }
+
+       if (new_plan) {
+               old_plan = mdev->rs_plan_s;
+               rcu_assign_pointer(mdev->rs_plan_s, new_plan);
+       }
+
+       mutex_unlock(&mdev->tconn->conf_update);
+       synchronize_rcu();
+       if (new_net_conf)
+               kfree(old_net_conf);
+       kfree(old_disk_conf);
+       kfree(old_plan);
+
        return 0;
 
+reconnect:
+       if (new_disk_conf) {
+               put_ldev(mdev);
+               kfree(new_disk_conf);
+       }
+       mutex_unlock(&mdev->tconn->conf_update);
+       return -EIO;
+
 disconnect:
+       kfree(new_plan);
+       if (new_disk_conf) {
+               put_ldev(mdev);
+               kfree(new_disk_conf);
+       }
+       mutex_unlock(&mdev->tconn->conf_update);
        /* just for completeness: actually not needed,
         * as this is not reached if csums_tfm was ok. */
        crypto_free_hash(csums_tfm);
@@ -3329,37 +3551,56 @@ static int receive_sizes(struct drbd_tconn *tconn, struct packet_info *pi)
        mdev->p_size = p_size;
 
        if (get_ldev(mdev)) {
+               rcu_read_lock();
+               my_usize = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
+               rcu_read_unlock();
+
                warn_if_differ_considerably(mdev, "lower level device sizes",
                           p_size, drbd_get_max_capacity(mdev->ldev));
                warn_if_differ_considerably(mdev, "user requested size",
-                                           p_usize, mdev->ldev->dc.disk_size);
+                                           p_usize, my_usize);
 
                /* if this is the first connect, or an otherwise expected
                 * param exchange, choose the minimum */
                if (mdev->state.conn == C_WF_REPORT_PARAMS)
-                       p_usize = min_not_zero((sector_t)mdev->ldev->dc.disk_size,
-                                            p_usize);
-
-               my_usize = mdev->ldev->dc.disk_size;
-
-               if (mdev->ldev->dc.disk_size != p_usize) {
-                       mdev->ldev->dc.disk_size = p_usize;
-                       dev_info(DEV, "Peer sets u_size to %lu sectors\n",
-                            (unsigned long)mdev->ldev->dc.disk_size);
-               }
+                       p_usize = min_not_zero(my_usize, p_usize);
 
                /* Never shrink a device with usable data during connect.
                   But allow online shrinking if we are connected. */
-               if (drbd_new_dev_size(mdev, mdev->ldev, 0) <
-                  drbd_get_capacity(mdev->this_bdev) &&
-                  mdev->state.disk >= D_OUTDATED &&
-                  mdev->state.conn < C_CONNECTED) {
+               if (drbd_new_dev_size(mdev, mdev->ldev, p_usize, 0) <
+                   drbd_get_capacity(mdev->this_bdev) &&
+                   mdev->state.disk >= D_OUTDATED &&
+                   mdev->state.conn < C_CONNECTED) {
                        dev_err(DEV, "The peer's disk size is too small!\n");
                        conn_request_state(mdev->tconn, NS(conn, C_DISCONNECTING), CS_HARD);
-                       mdev->ldev->dc.disk_size = my_usize;
                        put_ldev(mdev);
                        return -EIO;
                }
+
+               if (my_usize != p_usize) {
+                       struct disk_conf *old_disk_conf, *new_disk_conf = NULL;
+
+                       new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
+                       if (!new_disk_conf) {
+                               dev_err(DEV, "Allocation of new disk_conf failed\n");
+                               put_ldev(mdev);
+                               return -ENOMEM;
+                       }
+
+                       mutex_lock(&mdev->tconn->conf_update);
+                       old_disk_conf = mdev->ldev->disk_conf;
+                       *new_disk_conf = *old_disk_conf;
+                       new_disk_conf->disk_size = p_usize;
+
+                       rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
+                       mutex_unlock(&mdev->tconn->conf_update);
+                       synchronize_rcu();
+                       kfree(old_disk_conf);
+
+                       dev_info(DEV, "Peer sets u_size to %lu sectors\n",
+                                (unsigned long)my_usize);
+               }
+
                put_ldev(mdev);
        }
 
@@ -3489,6 +3730,7 @@ static union drbd_state convert_state(union drbd_state ps)
        union drbd_state ms;
 
        static enum drbd_conns c_tab[] = {
+               [C_WF_REPORT_PARAMS] = C_WF_REPORT_PARAMS,
                [C_CONNECTED] = C_CONNECTED,
 
                [C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
@@ -3524,7 +3766,7 @@ static int receive_req_state(struct drbd_tconn *tconn, struct packet_info *pi)
        mask.i = be32_to_cpu(p->mask);
        val.i = be32_to_cpu(p->val);
 
-       if (test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags) &&
+       if (test_bit(RESOLVE_CONFLICTS, &mdev->tconn->flags) &&
            mutex_is_locked(mdev->state_mutex)) {
                drbd_send_sr_reply(mdev, SS_CONCURRENT_ST_CHG);
                return 0;
@@ -3550,7 +3792,7 @@ static int receive_req_conn_state(struct drbd_tconn *tconn, struct packet_info *
        mask.i = be32_to_cpu(p->mask);
        val.i = be32_to_cpu(p->val);
 
-       if (test_bit(DISCARD_CONCURRENT, &tconn->flags) &&
+       if (test_bit(RESOLVE_CONFLICTS, &tconn->flags) &&
            mutex_is_locked(&tconn->cstate_mutex)) {
                conn_send_sr_reply(tconn, SS_CONCURRENT_ST_CHG);
                return 0;
@@ -3591,9 +3833,20 @@ static int receive_state(struct drbd_tconn *tconn, struct packet_info *pi)
        os = ns = drbd_read_state(mdev);
        spin_unlock_irq(&mdev->tconn->req_lock);
 
-       /* peer says his disk is uptodate, while we think it is inconsistent,
-        * and this happens while we think we have a sync going on. */
-       if (os.pdsk == D_INCONSISTENT && real_peer_disk == D_UP_TO_DATE &&
+       /* If some other part of the code (asender thread, timeout)
+        * already decided to close the connection again,
+        * we must not "re-establish" it here. */
+       if (os.conn <= C_TEAR_DOWN)
+               return -ECONNRESET;
+
+       /* If this is the "end of sync" confirmation, usually the peer disk
+        * transitions from D_INCONSISTENT to D_UP_TO_DATE. For empty (0 bits
+        * set) resync started in PausedSyncT, or if the timing of pause-/
+        * unpause-sync events has been "just right", the peer disk may
+        * transition from D_CONSISTENT to D_UP_TO_DATE as well.
+        */
+       if ((os.pdsk == D_INCONSISTENT || os.pdsk == D_CONSISTENT) &&
+           real_peer_disk == D_UP_TO_DATE &&
            os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
                /* If we are (becoming) SyncSource, but peer is still in sync
                 * preparation, ignore its uptodate-ness to avoid flapping, it
@@ -3616,6 +3869,14 @@ static int receive_state(struct drbd_tconn *tconn, struct packet_info *pi)
                }
        }
 
+       /* explicit verify finished notification, stop sector reached. */
+       if (os.conn == C_VERIFY_T && os.disk == D_UP_TO_DATE &&
+           peer_state.conn == C_CONNECTED && real_peer_disk == D_UP_TO_DATE) {
+               ov_out_of_sync_print(mdev);
+               drbd_resync_finished(mdev);
+               return 0;
+       }
+
        /* peer says his disk is inconsistent, while we think it is uptodate,
         * and this happens while the peer still thinks we have a sync going on,
         * but we think we are already done with the sync.
@@ -3711,11 +3972,11 @@ static int receive_state(struct drbd_tconn *tconn, struct packet_info *pi)
                        /* Nowadays only used when forcing a node into primary role and
                           setting its disk to UpToDate with that */
                        drbd_send_uuids(mdev);
-                       drbd_send_state(mdev);
+                       drbd_send_current_state(mdev);
                }
        }
 
-       mdev->tconn->net_conf->want_lose = 0;
+       clear_bit(DISCARD_MY_DATA, &mdev->flags);
 
        drbd_md_sync(mdev); /* update connected indicator, la_size, ... */
 
@@ -4097,6 +4358,7 @@ static struct data_cmd drbd_cmd_handler[] = {
        [P_DELAY_PROBE]     = { 0, sizeof(struct p_delay_probe93), receive_skip },
        [P_OUT_OF_SYNC]     = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
        [P_CONN_ST_CHG_REQ] = { 0, sizeof(struct p_req_state), receive_req_conn_state },
+       [P_PROTOCOL_UPDATE] = { 1, sizeof(struct p_protocol), receive_protocol },
 };
 
 static void drbdd(struct drbd_tconn *tconn)
@@ -4114,13 +4376,15 @@ static void drbdd(struct drbd_tconn *tconn)
 
                cmd = &drbd_cmd_handler[pi.cmd];
                if (unlikely(pi.cmd >= ARRAY_SIZE(drbd_cmd_handler) || !cmd->fn)) {
-                       conn_err(tconn, "unknown packet type %d, l: %d!\n", pi.cmd, pi.size);
+                       conn_err(tconn, "Unexpected data packet %s (0x%04x)",
+                                cmdname(pi.cmd), pi.cmd);
                        goto err_out;
                }
 
                shs = cmd->pkt_size;
                if (pi.size > shs && !cmd->expect_payload) {
-                       conn_err(tconn, "No payload expected %s l:%d\n", cmdname(pi.cmd), pi.size);
+                       conn_err(tconn, "No payload expected %s l:%d\n",
+                                cmdname(pi.cmd), pi.size);
                        goto err_out;
                }
 
@@ -4151,25 +4415,46 @@ void conn_flush_workqueue(struct drbd_tconn *tconn)
        barr.w.cb = w_prev_work_done;
        barr.w.tconn = tconn;
        init_completion(&barr.done);
-       drbd_queue_work(&tconn->data.work, &barr.w);
+       drbd_queue_work(&tconn->sender_work, &barr.w);
        wait_for_completion(&barr.done);
 }
 
-static void drbd_disconnect(struct drbd_tconn *tconn)
+static void conn_disconnect(struct drbd_tconn *tconn)
 {
+       struct drbd_conf *mdev;
        enum drbd_conns oc;
-       int rv = SS_UNKNOWN_ERROR;
+       int vnr;
 
        if (tconn->cstate == C_STANDALONE)
                return;
 
+       /* We are about to start the cleanup after connection loss.
+        * Make sure drbd_make_request knows about that.
+        * Usually we should be in some network failure state already,
+        * but just in case we are not, we fix it up here.
+        */
+       conn_request_state(tconn, NS(conn, C_NETWORK_FAILURE), CS_HARD);
+
        /* asender does not clean up anything. it must not interfere, either */
        drbd_thread_stop(&tconn->asender);
        drbd_free_sock(tconn);
 
-       down_read(&drbd_cfg_rwsem);
-       idr_for_each(&tconn->volumes, drbd_disconnected, tconn);
-       up_read(&drbd_cfg_rwsem);
+       rcu_read_lock();
+       idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+               kref_get(&mdev->kref);
+               rcu_read_unlock();
+               drbd_disconnected(mdev);
+               kref_put(&mdev->kref, &drbd_minor_destroy);
+               rcu_read_lock();
+       }
+       rcu_read_unlock();
+
+       if (!list_empty(&tconn->current_epoch->list))
+               conn_err(tconn, "ASSERTION FAILED: tconn->current_epoch->list not empty\n");
+       /* ok, no more ee's on the fly, it is safe to reset the epoch_size */
+       atomic_set(&tconn->current_epoch->epoch_size, 0);
+       tconn->send.seen_any_write_yet = false;
+
        conn_info(tconn, "Connection closed\n");
 
        if (conn_highest_role(tconn) == R_PRIMARY && conn_highest_pdsk(tconn) >= D_UNKNOWN)
@@ -4178,26 +4463,16 @@ static void drbd_disconnect(struct drbd_tconn *tconn)
        spin_lock_irq(&tconn->req_lock);
        oc = tconn->cstate;
        if (oc >= C_UNCONNECTED)
-               rv = _conn_request_state(tconn, NS(conn, C_UNCONNECTED), CS_VERBOSE);
+               _conn_request_state(tconn, NS(conn, C_UNCONNECTED), CS_VERBOSE);
 
        spin_unlock_irq(&tconn->req_lock);
 
-       if (oc == C_DISCONNECTING) {
-               wait_event(tconn->net_cnt_wait, atomic_read(&tconn->net_cnt) == 0);
-
-               crypto_free_hash(tconn->cram_hmac_tfm);
-               tconn->cram_hmac_tfm = NULL;
-
-               kfree(tconn->net_conf);
-               tconn->net_conf = NULL;
-               conn_request_state(tconn, NS(conn, C_STANDALONE), CS_VERBOSE);
-       }
+       if (oc == C_DISCONNECTING)
+               conn_request_state(tconn, NS(conn, C_STANDALONE), CS_VERBOSE | CS_HARD);
 }
 
-static int drbd_disconnected(int vnr, void *p, void *data)
+static int drbd_disconnected(struct drbd_conf *mdev)
 {
-       struct drbd_conf *mdev = (struct drbd_conf *)p;
-       enum drbd_fencing_p fp;
        unsigned int i;
 
        /* wait for current activity to cease. */
@@ -4223,8 +4498,6 @@ static int drbd_disconnected(int vnr, void *p, void *data)
        atomic_set(&mdev->rs_pending_cnt, 0);
        wake_up(&mdev->misc_wait);
 
-       del_timer(&mdev->request_timer);
-
        del_timer_sync(&mdev->resync_timer);
        resync_timer_fn((unsigned long)mdev);
 
@@ -4235,6 +4508,15 @@ static int drbd_disconnected(int vnr, void *p, void *data)
 
        drbd_finish_peer_reqs(mdev);
 
+       /* This second workqueue flush is necessary, since drbd_finish_peer_reqs()
+          might have issued a work again. The one before drbd_finish_peer_reqs() is
+          necessary to reclain net_ee in drbd_finish_peer_reqs(). */
+       drbd_flush_workqueue(mdev);
+
+       /* need to do it again, drbd_finish_peer_reqs() may have populated it
+        * again via drbd_try_clear_on_disk_bm(). */
+       drbd_rs_cancel_all(mdev);
+
        kfree(mdev->p_uuid);
        mdev->p_uuid = NULL;
 
@@ -4243,12 +4525,6 @@ static int drbd_disconnected(int vnr, void *p, void *data)
 
        drbd_md_sync(mdev);
 
-       fp = FP_DONT_CARE;
-       if (get_ldev(mdev)) {
-               fp = mdev->ldev->dc.fencing;
-               put_ldev(mdev);
-       }
-
        /* serialize with bitmap writeout triggered by the state change,
         * if any. */
        wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
@@ -4275,10 +4551,6 @@ static int drbd_disconnected(int vnr, void *p, void *data)
        D_ASSERT(list_empty(&mdev->sync_ee));
        D_ASSERT(list_empty(&mdev->done_ee));
 
-       /* ok, no more ee's on the fly, it is safe to reset the epoch_size */
-       atomic_set(&mdev->current_epoch->epoch_size, 0);
-       D_ASSERT(list_empty(&mdev->current_epoch->list));
-
        return 0;
 }
 
@@ -4331,7 +4603,7 @@ static int drbd_do_features(struct drbd_tconn *tconn)
 
        if (pi.cmd != P_CONNECTION_FEATURES) {
                conn_err(tconn, "expected ConnectionFeatures packet, received: %s (0x%04x)\n",
-                    cmdname(pi.cmd), pi.cmd);
+                        cmdname(pi.cmd), pi.cmd);
                return -1;
        }
 
@@ -4440,7 +4712,7 @@ static int drbd_do_auth(struct drbd_tconn *tconn)
 
        if (pi.cmd != P_AUTH_CHALLENGE) {
                conn_err(tconn, "expected AuthChallenge packet, received: %s (0x%04x)\n",
-                   cmdname(pi.cmd), pi.cmd);
+                        cmdname(pi.cmd), pi.cmd);
                rv = 0;
                goto fail;
        }
@@ -4499,7 +4771,7 @@ static int drbd_do_auth(struct drbd_tconn *tconn)
 
        if (pi.cmd != P_AUTH_RESPONSE) {
                conn_err(tconn, "expected AuthResponse packet, received: %s (0x%04x)\n",
-                       cmdname(pi.cmd), pi.cmd);
+                        cmdname(pi.cmd), pi.cmd);
                rv = 0;
                goto fail;
        }
@@ -4557,9 +4829,9 @@ int drbdd_init(struct drbd_thread *thi)
        conn_info(tconn, "receiver (re)started\n");
 
        do {
-               h = drbd_connect(tconn);
+               h = conn_connect(tconn);
                if (h == 0) {
-                       drbd_disconnect(tconn);
+                       conn_disconnect(tconn);
                        schedule_timeout_interruptible(HZ);
                }
                if (h == -1) {
@@ -4568,14 +4840,10 @@ int drbdd_init(struct drbd_thread *thi)
                }
        } while (h == 0);
 
-       if (h > 0) {
-               if (get_net_conf(tconn)) {
-                       drbdd(tconn);
-                       put_net_conf(tconn);
-               }
-       }
+       if (h > 0)
+               drbdd(tconn);
 
-       drbd_disconnect(tconn);
+       conn_disconnect(tconn);
 
        conn_info(tconn, "receiver terminated\n");
        return 0;
@@ -4610,6 +4878,11 @@ static int got_RqSReply(struct drbd_tconn *tconn, struct packet_info *pi)
        if (!mdev)
                return -EIO;
 
+       if (test_bit(CONN_WD_ST_CHG_REQ, &tconn->flags)) {
+               D_ASSERT(tconn->agreed_pro_version < 100);
+               return got_conn_RqSReply(tconn, pi);
+       }
+
        if (retcode >= SS_SUCCESS) {
                set_bit(CL_ST_CHG_SUCCESS, &mdev->flags);
        } else {
@@ -4717,8 +4990,8 @@ static int got_BlockAck(struct drbd_tconn *tconn, struct packet_info *pi)
        case P_RECV_ACK:
                what = RECV_ACKED_BY_PEER;
                break;
-       case P_DISCARD_WRITE:
-               what = DISCARD_WRITE;
+       case P_SUPERSEDED:
+               what = CONFLICT_RESOLVED;
                break;
        case P_RETRY_WRITE:
                what = POSTPONE_WRITE;
@@ -4778,7 +5051,7 @@ static int got_NegDReply(struct drbd_tconn *tconn, struct packet_info *pi)
 
        update_peer_seq(mdev, be32_to_cpu(p->seq_num));
 
-       dev_err(DEV, "Got NegDReply; Sector %llus, len %u; Fail original request.\n",
+       dev_err(DEV, "Got NegDReply; Sector %llus, len %u.\n",
            (unsigned long long)sector, be32_to_cpu(p->blksize));
 
        return validate_req_change_req_state(mdev, p->block_id, sector,
@@ -4822,21 +5095,22 @@ static int got_NegRSDReply(struct drbd_tconn *tconn, struct packet_info *pi)
 
 static int got_BarrierAck(struct drbd_tconn *tconn, struct packet_info *pi)
 {
-       struct drbd_conf *mdev;
        struct p_barrier_ack *p = pi->data;
+       struct drbd_conf *mdev;
+       int vnr;
 
-       mdev = vnr_to_mdev(tconn, pi->vnr);
-       if (!mdev)
-               return -EIO;
-
-       tl_release(mdev->tconn, p->barrier, be32_to_cpu(p->set_size));
+       tl_release(tconn, p->barrier, be32_to_cpu(p->set_size));
 
-       if (mdev->state.conn == C_AHEAD &&
-           atomic_read(&mdev->ap_in_flight) == 0 &&
-           !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->current_epoch->flags)) {
-               mdev->start_resync_timer.expires = jiffies + HZ;
-               add_timer(&mdev->start_resync_timer);
+       rcu_read_lock();
+       idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+               if (mdev->state.conn == C_AHEAD &&
+                   atomic_read(&mdev->ap_in_flight) == 0 &&
+                   !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->flags)) {
+                       mdev->start_resync_timer.expires = jiffies + HZ;
+                       add_timer(&mdev->start_resync_timer);
+               }
        }
+       rcu_read_unlock();
 
        return 0;
 }
@@ -4880,7 +5154,7 @@ static int got_OVResult(struct drbd_tconn *tconn, struct packet_info *pi)
                if (w) {
                        w->cb = w_ov_finished;
                        w->mdev = mdev;
-                       drbd_queue_work_front(&mdev->tconn->data.work, w);
+                       drbd_queue_work(&mdev->tconn->sender_work, w);
                } else {
                        dev_err(DEV, "kmalloc(w) failed.");
                        ov_out_of_sync_print(mdev);
@@ -4899,30 +5173,33 @@ static int got_skip(struct drbd_tconn *tconn, struct packet_info *pi)
 static int tconn_finish_peer_reqs(struct drbd_tconn *tconn)
 {
        struct drbd_conf *mdev;
-       int i, not_empty = 0;
+       int vnr, not_empty = 0;
 
        do {
                clear_bit(SIGNAL_ASENDER, &tconn->flags);
                flush_signals(current);
-               down_read(&drbd_cfg_rwsem);
-               idr_for_each_entry(&tconn->volumes, mdev, i) {
+
+               rcu_read_lock();
+               idr_for_each_entry(&tconn->volumes, mdev, vnr) {
+                       kref_get(&mdev->kref);
+                       rcu_read_unlock();
                        if (drbd_finish_peer_reqs(mdev)) {
-                               up_read(&drbd_cfg_rwsem);
-                               return 1; /* error */
+                               kref_put(&mdev->kref, &drbd_minor_destroy);
+                               return 1;
                        }
+                       kref_put(&mdev->kref, &drbd_minor_destroy);
+                       rcu_read_lock();
                }
-               up_read(&drbd_cfg_rwsem);
                set_bit(SIGNAL_ASENDER, &tconn->flags);
 
                spin_lock_irq(&tconn->req_lock);
-               rcu_read_lock();
-               idr_for_each_entry(&tconn->volumes, mdev, i) {
+               idr_for_each_entry(&tconn->volumes, mdev, vnr) {
                        not_empty = !list_empty(&mdev->done_ee);
                        if (not_empty)
                                break;
                }
-               rcu_read_unlock();
                spin_unlock_irq(&tconn->req_lock);
+               rcu_read_unlock();
        } while (not_empty);
 
        return 0;
@@ -4939,7 +5216,7 @@ static struct asender_cmd asender_tbl[] = {
        [P_RECV_ACK]        = { sizeof(struct p_block_ack), got_BlockAck },
        [P_WRITE_ACK]       = { sizeof(struct p_block_ack), got_BlockAck },
        [P_RS_WRITE_ACK]    = { sizeof(struct p_block_ack), got_BlockAck },
-       [P_DISCARD_WRITE]   = { sizeof(struct p_block_ack), got_BlockAck },
+       [P_SUPERSEDED]   = { sizeof(struct p_block_ack), got_BlockAck },
        [P_NEG_ACK]         = { sizeof(struct p_block_ack), got_NegAck },
        [P_NEG_DREPLY]      = { sizeof(struct p_block_ack), got_NegDReply },
        [P_NEG_RS_DREPLY]   = { sizeof(struct p_block_ack), got_NegRSDReply },
@@ -4965,7 +5242,7 @@ int drbd_asender(struct drbd_thread *thi)
        int expect   = header_size;
        bool ping_timeout_active = false;
        struct net_conf *nc;
-       int ping_timeo, no_cork, ping_int;
+       int ping_timeo, tcp_cork, ping_int;
 
        current->policy = SCHED_RR;  /* Make this a realtime task! */
        current->rt_priority = 2;    /* more important than all other tasks */
@@ -4976,7 +5253,7 @@ int drbd_asender(struct drbd_thread *thi)
                rcu_read_lock();
                nc = rcu_dereference(tconn->net_conf);
                ping_timeo = nc->ping_timeo;
-               no_cork = nc->no_cork;
+               tcp_cork = nc->tcp_cork;
                ping_int = nc->ping_int;
                rcu_read_unlock();
 
@@ -4991,14 +5268,14 @@ int drbd_asender(struct drbd_thread *thi)
 
                /* TODO: conditionally cork; it may hurt latency if we cork without
                   much to send */
-               if (!no_cork)
+               if (tcp_cork)
                        drbd_tcp_cork(tconn->meta.socket);
                if (tconn_finish_peer_reqs(tconn)) {
                        conn_err(tconn, "tconn_finish_peer_reqs() failed\n");
                        goto reconnect;
                }
                /* but unconditionally uncork unless disabled */
-               if (!no_cork)
+               if (tcp_cork)
                        drbd_tcp_uncork(tconn->meta.socket);
 
                /* short circuit, recv_msg would return EINTR anyways. */
@@ -5024,6 +5301,18 @@ int drbd_asender(struct drbd_thread *thi)
                        received += rv;
                        buf      += rv;
                } else if (rv == 0) {
+                       if (test_bit(DISCONNECT_SENT, &tconn->flags)) {
+                               long t;
+                               rcu_read_lock();
+                               t = rcu_dereference(tconn->net_conf)->ping_timeo * HZ/10;
+                               rcu_read_unlock();
+
+                               t = wait_event_timeout(tconn->ping_wait,
+                                                      tconn->cstate < C_WF_REPORT_PARAMS,
+                                                      t);
+                               if (t)
+                                       break;
+                       }
                        conn_err(tconn, "meta connection shut down by peer.\n");
                        goto reconnect;
                } else if (rv == -EAGAIN) {
@@ -5050,8 +5339,8 @@ int drbd_asender(struct drbd_thread *thi)
                                goto reconnect;
                        cmd = &asender_tbl[pi.cmd];
                        if (pi.cmd >= ARRAY_SIZE(asender_tbl) || !cmd->fn) {
-                               conn_err(tconn, "unknown command %d on meta (l: %d)\n",
-                                       pi.cmd, pi.size);
+                               conn_err(tconn, "Unexpected meta packet %s (0x%04x)\n",
+                                        cmdname(pi.cmd), pi.cmd);
                                goto disconnect;
                        }
                        expect = header_size + cmd->pkt_size;
@@ -5088,6 +5377,7 @@ int drbd_asender(struct drbd_thread *thi)
        if (0) {
 reconnect:
                conn_request_state(tconn, NS(conn, C_NETWORK_FAILURE), CS_HARD);
+               conn_md_sync(tconn);
        }
        if (0) {
 disconnect: