44 #include <sys/socket.h>
45 #include <sys/types.h>
48 #include <netinet/in.h>
49 #include <arpa/inet.h>
50 #include <sys/param.h>
54 #include <qb/qbdefs.h>
63 #define TOKEN_RETRANSMITS_BEFORE_LOSS_CONST 4
64 #define TOKEN_TIMEOUT 1000
65 #define TOKEN_COEFFICIENT 650
66 #define JOIN_TIMEOUT 50
67 #define MERGE_TIMEOUT 200
68 #define DOWNCHECK_TIMEOUT 1000
69 #define FAIL_TO_RECV_CONST 2500
70 #define SEQNO_UNCHANGED_CONST 30
71 #define MINIMUM_TIMEOUT (int)(1000/HZ)*3
72 #define MAX_NETWORK_DELAY 50
73 #define WINDOW_SIZE 50
74 #define MAX_MESSAGES 17
75 #define MISS_COUNT_CONST 5
76 #define RRP_PROBLEM_COUNT_TIMEOUT 2000
77 #define RRP_PROBLEM_COUNT_THRESHOLD_DEFAULT 10
78 #define RRP_PROBLEM_COUNT_THRESHOLD_MIN 2
79 #define RRP_AUTORECOVERY_CHECK_TIMEOUT 1000
80 #define BLOCK_UNLISTED_IPS 1
82 #define DEFAULT_PORT 5405
84 static char error_string_response[768];
92 if (strcmp(param_name,
"totem.token") == 0)
94 if (strcmp(param_name,
"totem.token_retransmit") == 0)
96 if (strcmp(param_name,
"totem.hold") == 0)
98 if (strcmp(param_name,
"totem.token_retransmits_before_loss_const") == 0)
100 if (strcmp(param_name,
"totem.join") == 0)
102 if (strcmp(param_name,
"totem.send_join") == 0)
104 if (strcmp(param_name,
"totem.consensus") == 0)
106 if (strcmp(param_name,
"totem.merge") == 0)
108 if (strcmp(param_name,
"totem.downcheck") == 0)
110 if (strcmp(param_name,
"totem.fail_recv_const") == 0)
112 if (strcmp(param_name,
"totem.seqno_unchanged_const") == 0)
114 if (strcmp(param_name,
"totem.rrp_token_expired_timeout") == 0)
116 if (strcmp(param_name,
"totem.rrp_problem_count_timeout") == 0)
118 if (strcmp(param_name,
"totem.rrp_problem_count_threshold") == 0)
120 if (strcmp(param_name,
"totem.rrp_problem_count_mcast_threshold") == 0)
122 if (strcmp(param_name,
"totem.rrp_autorecovery_check_timeout") == 0)
124 if (strcmp(param_name,
"totem.heartbeat_failures_allowed") == 0)
126 if (strcmp(param_name,
"totem.max_network_delay") == 0)
128 if (strcmp(param_name,
"totem.window_size") == 0)
130 if (strcmp(param_name,
"totem.max_messages") == 0)
132 if (strcmp(param_name,
"totem.miss_count_const") == 0)
134 if (strcmp(param_name,
"totem.block_unlisted_ips") == 0)
144 static void totem_volatile_config_set_value (
struct totem_config *totem_config,
145 const char *key_name,
const char *deleted_key,
unsigned int default_value,
146 int allow_zero_value)
151 (deleted_key != NULL && strcmp(deleted_key, key_name) == 0) ||
152 (!allow_zero_value && *totem_get_param_by_name(totem_config, key_name) == 0)) {
153 *totem_get_param_by_name(totem_config, key_name) = default_value;
166 strcpy(runtime_key_name,
"runtime.config.");
167 strcat(runtime_key_name, key_name);
169 icmap_set_uint32(runtime_key_name, *totem_get_param_by_name(totem_config, key_name));
179 static void totem_volatile_config_set_boolean_value (
struct totem_config *totem_config,
180 const char *key_name,
const char *deleted_key,
unsigned int default_value)
189 if ((deleted_key != NULL && strcmp(deleted_key, key_name) == 0) ||
196 if (strcmp(str,
"yes") == 0) {
198 }
else if (strcmp(str,
"no") == 0) {
214 strcpy(runtime_key_name,
"runtime.config.");
215 strcat(runtime_key_name, key_name);
217 *totem_get_param_by_name(totem_config, key_name) = val;
227 static void totem_volatile_config_read (
struct totem_config *totem_config,
const char *deleted_key)
231 totem_volatile_config_set_value(totem_config,
"totem.token_retransmits_before_loss_const", deleted_key,
234 totem_volatile_config_set_value(totem_config,
"totem.token", deleted_key,
TOKEN_TIMEOUT, 0);
247 totem_volatile_config_set_value(totem_config,
"totem.max_network_delay", deleted_key,
MAX_NETWORK_DELAY, 0);
249 totem_volatile_config_set_value(totem_config,
"totem.window_size", deleted_key,
WINDOW_SIZE, 0);
251 totem_volatile_config_set_value(totem_config,
"totem.max_messages", deleted_key,
MAX_MESSAGES, 0);
253 totem_volatile_config_set_value(totem_config,
"totem.miss_count_const", deleted_key,
MISS_COUNT_CONST, 0);
255 totem_volatile_config_set_value(totem_config,
"totem.token_retransmit", deleted_key,
258 totem_volatile_config_set_value(totem_config,
"totem.hold", deleted_key,
261 totem_volatile_config_set_value(totem_config,
"totem.join", deleted_key,
JOIN_TIMEOUT, 0);
263 totem_volatile_config_set_value(totem_config,
"totem.consensus", deleted_key,
266 totem_volatile_config_set_value(totem_config,
"totem.merge", deleted_key,
MERGE_TIMEOUT, 0);
268 totem_volatile_config_set_value(totem_config,
"totem.downcheck", deleted_key,
DOWNCHECK_TIMEOUT, 0);
270 totem_volatile_config_set_value(totem_config,
"totem.fail_recv_const", deleted_key,
FAIL_TO_RECV_CONST, 0);
272 totem_volatile_config_set_value(totem_config,
"totem.seqno_unchanged_const", deleted_key,
275 totem_volatile_config_set_value(totem_config,
"totem.send_join", deleted_key, 0, 1);
277 totem_volatile_config_set_value(totem_config,
"totem.rrp_problem_count_timeout", deleted_key,
280 totem_volatile_config_set_value(totem_config,
"totem.rrp_problem_count_threshold", deleted_key,
283 totem_volatile_config_set_value(totem_config,
"totem.rrp_problem_count_mcast_threshold", deleted_key,
286 totem_volatile_config_set_value(totem_config,
"totem.rrp_token_expired_timeout", deleted_key,
289 totem_volatile_config_set_value(totem_config,
"totem.rrp_autorecovery_check_timeout", deleted_key,
292 totem_volatile_config_set_value(totem_config,
"totem.heartbeat_failures_allowed", deleted_key, 0, 1);
294 totem_volatile_config_set_boolean_value(totem_config,
"totem.block_unlisted_ips", deleted_key,
298 static int totem_volatile_config_validate (
299 struct totem_config *totem_config,
300 const char **error_string)
302 static char local_error_reason[512];
303 const char *error_reason = local_error_reason;
306 snprintf (local_error_reason,
sizeof(local_error_reason),
307 "The max_network_delay parameter (%d ms) may not be less than (%d ms).",
313 snprintf (local_error_reason,
sizeof(local_error_reason),
314 "The token timeout parameter (%d ms) may not be less than (%d ms).",
320 snprintf (local_error_reason,
sizeof(local_error_reason),
321 "The token retransmit timeout parameter (%d ms) may not be less than (%d ms).",
327 snprintf (local_error_reason,
sizeof(local_error_reason),
328 "The token hold timeout parameter (%d ms) may not be less than (%d ms).",
334 snprintf (local_error_reason,
sizeof(local_error_reason),
335 "The join timeout parameter (%d ms) may not be less than (%d ms).",
341 snprintf (local_error_reason,
sizeof(local_error_reason),
342 "The consensus timeout parameter (%d ms) may not be less than (%d ms).",
348 snprintf (local_error_reason,
sizeof(local_error_reason),
349 "The consensus timeout parameter (%d ms) may not be less than join timeout (%d ms).",
355 snprintf (local_error_reason,
sizeof(local_error_reason),
356 "The merge timeout parameter (%d ms) may not be less than (%d ms).",
362 snprintf (local_error_reason,
sizeof(local_error_reason),
363 "The downcheck timeout parameter (%d ms) may not be less than (%d ms).",
369 snprintf (local_error_reason,
sizeof(local_error_reason),
370 "The RRP problem count timeout parameter (%d ms) may not be less than (%d ms).",
376 snprintf (local_error_reason,
sizeof(local_error_reason),
377 "The RRP problem count threshold (%d problem count) may not be less than (%d problem count).",
382 snprintf (local_error_reason,
sizeof(local_error_reason),
383 "The RRP multicast problem count threshold (%d problem count) may not be less than (%d problem count).",
389 snprintf (local_error_reason,
sizeof(local_error_reason),
390 "The RRP token expired timeout parameter (%d ms) may not be less than (%d ms).",
398 snprintf (error_string_response,
sizeof(error_string_response),
399 "parse error in config: %s\n", error_reason);
400 *error_string = error_string_response;
405 static int totem_get_crypto(
struct totem_config *totem_config)
408 const char *tmp_cipher;
409 const char *tmp_hash;
412 tmp_cipher =
"aes256";
415 if (strcmp (str,
"off") == 0) {
423 if (strcmp(str,
"none") == 0) {
426 if (strcmp(str,
"aes256") == 0) {
427 tmp_cipher =
"aes256";
429 if (strcmp(str,
"aes192") == 0) {
430 tmp_cipher =
"aes192";
432 if (strcmp(str,
"aes128") == 0) {
433 tmp_cipher =
"aes128";
435 if (strcmp(str,
"3des") == 0) {
442 if (strcmp(str,
"none") == 0) {
445 if (strcmp(str,
"md5") == 0) {
448 if (strcmp(str,
"sha1") == 0) {
451 if (strcmp(str,
"sha256") == 0) {
454 if (strcmp(str,
"sha384") == 0) {
457 if (strcmp(str,
"sha512") == 0) {
463 if ((strcmp(tmp_cipher,
"none") != 0) &&
464 (strcmp(tmp_hash,
"none") == 0)) {
477 static int totem_config_get_ip_version(
void)
484 if (strcmp(str,
"ipv4") == 0) {
487 if (strcmp(str,
"ipv6") == 0) {
496 static uint16_t generate_cluster_id (
const char *cluster_name)
501 for (i = 0; i < strlen(cluster_name); i++) {
503 value += cluster_name[i];
506 return (value & 0xFFFF);
509 static int get_cluster_mcast_addr (
510 const char *cluster_name,
511 unsigned int ringnumber,
516 char addr[INET6_ADDRSTRLEN + 1];
519 if (cluster_name == NULL) {
523 clusterid = generate_cluster_id(cluster_name) + ringnumber;
524 memset (res, 0,
sizeof(*res));
526 switch (ip_version) {
528 snprintf(addr,
sizeof(addr),
"239.192.%d.%d", clusterid >> 8, clusterid % 0xFF);
531 snprintf(addr,
sizeof(addr),
"ff15::%x", clusterid);
545 static unsigned int generate_nodeid_for_duplicate_test(
546 struct totem_config *totem_config,
557 memcpy (&nodeid, &totemip.addr, sizeof (
unsigned int));
559 #if __BYTE_ORDER == __LITTLE_ENDIAN
564 nodeid &= 0x7FFFFFFF;
569 static int check_for_duplicate_nodeids(
570 struct totem_config *totem_config,
571 const char **error_string)
575 const char *iter_key;
579 char *ring0_addr=NULL;
580 char *ring0_addr1=NULL;
581 unsigned int node_pos;
582 unsigned int node_pos1;
584 unsigned int nodeid1;
589 res = sscanf(iter_key,
"nodelist.node.%u.%s", &node_pos, tmp_key);
594 if (strcmp(tmp_key,
"ring0_addr") != 0) {
608 nodeid = generate_nodeid_for_duplicate_test(totem_config, ring0_addr);
617 while (((iter_key =
icmap_iter_next(subiter, NULL, NULL)) != NULL) && (node_pos1 < node_pos)) {
618 res = sscanf(iter_key,
"nodelist.node.%u.%s", &node_pos1, tmp_key);
619 if ((res != 2) || (node_pos1 >= node_pos)) {
623 if (strcmp(tmp_key,
"ring0_addr") != 0) {
634 nodeid1 = generate_nodeid_for_duplicate_test(totem_config, ring0_addr1);
640 if (nodeid == nodeid1) {
642 snprintf (error_string_response,
sizeof(error_string_response),
643 "Nodeid %u%s%s%s appears twice in corosync.conf", nodeid,
644 autogenerated?
"(autogenerated from ":
"",
645 autogenerated?ring0_addr:
"",
646 autogenerated?
")":
"");
648 *error_string = error_string_response;
659 static int find_local_node_in_nodelist(
struct totem_config *totem_config)
662 const char *iter_key;
664 unsigned int node_pos;
665 int local_node_pos = -1;
667 int interface_up, interface_num;
673 &bind_addr, &interface_up, &interface_num,
681 res = sscanf(iter_key,
"nodelist.node.%u.%s", &node_pos, tmp_key);
686 if (strcmp(tmp_key,
"ring0_addr") != 0) {
702 local_node_pos = node_pos;
707 return (local_node_pos);
716 static void compute_interfaces_diff(
int interface_count,
720 int ring_no, set1_pos, set2_pos;
723 memset(&empty_ip_address, 0,
sizeof(empty_ip_address));
725 for (ring_no = 0; ring_no < interface_count; ring_no++) {
726 for (set1_pos = 0; set1_pos < set1[ring_no].
member_count; set1_pos++) {
727 for (set2_pos = 0; set2_pos < set2[ring_no].
member_count; set2_pos++) {
732 if (memcmp(&set1[ring_no].member_list[set1_pos],
733 &set2[ring_no].member_list[set2_pos],
735 memset(&set1[ring_no].member_list[set1_pos], 0,
737 memset(&set2[ring_no].member_list[set2_pos], 0,
744 for (ring_no = 0; ring_no < interface_count; ring_no++) {
745 for (set1_pos = 0; set1_pos < set1[ring_no].
member_count; set1_pos++) {
750 if (memcmp(&set1[ring_no].member_list[set1_pos], &empty_ip_address,
sizeof(empty_ip_address)) != 0) {
752 "removing dynamic member %s for ring %u",
759 for (set2_pos = 0; set2_pos < set2[ring_no].
member_count; set2_pos++) {
764 if (memcmp(&set2[ring_no].member_list[set2_pos], &empty_ip_address,
sizeof(empty_ip_address)) != 0) {
766 "adding dynamic member %s for ring %u",
776 static void put_nodelist_members_to_config(
struct totem_config *totem_config,
int reload)
779 const char *iter_key, *iter_key2;
781 unsigned int node_pos;
786 unsigned int ringnumber = 0;
798 assert(orig_interfaces != NULL);
800 assert(new_interfaces != NULL);
815 res = sscanf(iter_key,
"nodelist.node.%u.%s", &node_pos, tmp_key);
820 if (strcmp(tmp_key,
"ring0_addr") != 0) {
827 res = sscanf(iter_key2,
"nodelist.node.%u.ring%u%s", &node_pos, &ringnumber, tmp_key2);
828 if (res != 3 || strcmp(tmp_key2,
"_addr") != 0) {
854 compute_interfaces_diff(totem_config->
interface_count, orig_interfaces, new_interfaces);
856 free(new_interfaces);
857 free(orig_interfaces);
861 static void nodelist_dynamic_notify(
863 const char *key_name,
869 unsigned int ring_no;
870 unsigned int member_no;
873 struct totem_config *totem_config = (
struct totem_config *)user_data;
879 if (
icmap_get_uint8(
"config.totemconfig_reload_in_progress", &reloading) ==
CS_OK && reloading) {
883 res = sscanf(key_name,
"nodelist.node.%u.ring%u%s", &member_no, &ring_no, tmp_str);
887 if (strcmp(tmp_str,
"_addr") != 0) {
891 put_nodelist_members_to_config(totem_config, 1);
910 const char *iter_key, *iter_key2;
912 const char *ipaddr_key;
924 ip_version = totem_config_get_ip_version();
929 res = sscanf(iter_key,
"nodelist.node.%u.%s", node_pos, tmp_key);
934 if (strcmp(tmp_key,
"ring0_addr") != 0) {
947 snprintf(tmp_key,
sizeof(tmp_key),
"nodelist.node.%u.%s", *node_pos,
948 (ipaddr_key_prefix != NULL ? ipaddr_key_prefix :
"ring0_addr"));
955 ipaddr_key = (ipaddr_key_prefix != NULL ? iter_key2 : tmp_key);
960 if (
totemip_parse(&node_addr, node_addr_str, ip_version) == -1) {
970 for (list = addrs.
next; list != &addrs; list = list->
next) {
997 static void config_convert_nodelist_to_interface(
struct totem_config *totem_config)
1000 unsigned int node_pos;
1003 char *node_addr_str;
1004 unsigned int ringnumber = 0;
1006 const char *iter_key;
1015 res = sscanf(iter_key,
"nodelist.node.%u.ring%u%s", &node_pos, &ringnumber, tmp_key2);
1016 if (res != 3 || strcmp(tmp_key2,
"_addr") != 0) {
1026 free(node_addr_str);
1034 struct totem_config *totem_config,
1035 const char **error_string,
1039 char *str, *ring0_addr_str;
1040 unsigned int ringnumber = 0;
1041 int member_count = 0;
1043 const char *iter_key;
1044 const char *member_iter_key;
1049 char *cluster_name = NULL;
1056 memset (totem_config, 0,
sizeof (
struct totem_config));
1059 *error_string =
"Out of memory trying to allocate ethernet interface storage area";
1066 strcpy (totem_config->
rrp_mode,
"none");
1070 if (totem_get_crypto(totem_config) != 0) {
1071 *error_string =
"crypto_cipher requires crypto_hash with value other than none";
1077 *error_string =
"totem.rrp_mode is too long";
1082 strcpy (totem_config->
rrp_mode, str);
1090 if (strcmp (str,
"yes") == 0) {
1101 cluster_name = NULL;
1104 totem_config->
ip_version = totem_config_get_ip_version();
1110 config_convert_nodelist_to_interface(totem_config);
1119 config_convert_nodelist_to_interface(totem_config);
1121 free(ring0_addr_str);
1135 res = sscanf(iter_key,
"totem.interface.%[^.].%s", ringnumber_key, tmp_key);
1140 if (strcmp(tmp_key,
"bindnetaddr") != 0) {
1146 ringnumber = atoi(ringnumber_key);
1148 if (ringnumber >= INTERFACE_MAX) {
1151 snprintf (error_string_response,
sizeof(error_string_response),
1152 "parse error in config: interface ring number %u is bigger than allowed maximum %u\n",
1153 ringnumber, INTERFACE_MAX - 1);
1155 *error_string = error_string_response;
1182 (void)get_cluster_mcast_addr (cluster_name,
1190 if (strcmp (str,
"yes") == 0) {
1221 while ((member_iter_key =
icmap_iter_next(member_iter, NULL, NULL)) != NULL) {
1222 if (member_count == 0) {
1248 for (ringnumber = 0; ringnumber < totem_config->
interface_count; ringnumber++) {
1250 "255.255.255.255", 0);
1274 if (strcmp (str,
"udpu") == 0) {
1278 if (strcmp (str,
"iba") == 0) {
1294 local_node_pos = find_local_node_in_nodelist(totem_config);
1295 if (local_node_pos != -1) {
1300 nodeid_set = (totem_config->
node_id != 0);
1315 put_nodelist_members_to_config(totem_config, 0);
1321 totem_volatile_config_read(totem_config, NULL);
1325 add_totem_config_notification(totem_config);
1332 struct totem_config *totem_config,
1333 const char **error_string)
1335 static char local_error_reason[512];
1336 char parse_error[512];
1337 const char *error_reason = local_error_reason;
1340 unsigned int port1, port2;
1343 error_reason =
"No interfaces defined";
1358 error_reason =
"No multicast address specified";
1363 error_reason =
"No multicast port specified";
1368 error_reason =
"Invalid TTL (should be 0..255)";
1373 error_reason =
"Can only set ttl on multicast transport types";
1380 error_reason =
"An IPV6 network requires that a node ID be specified.";
1386 error_reason =
"Multicast address family does not match bind address family";
1391 error_reason =
"mcastaddr is not a correct multicast address.";
1397 error_reason =
"Not all bind address belong to the same IP family";
1410 (((port1 > port2 ? port1 : port2) - (port1 < port2 ? port1 : port2)) <= 1)) {
1411 error_reason =
"Interfaces multicast address/port pair must differ";
1418 if (totem_config->
version != 2) {
1419 error_reason =
"This totem parser can only parse version 2 configurations.";
1423 if (totem_volatile_config_validate(totem_config, error_string) == -1) {
1427 if (check_for_duplicate_nodeids(totem_config, error_string) == -1) {
1434 if (strcmp (totem_config->
rrp_mode,
"none") &&
1435 strcmp (totem_config->
rrp_mode,
"active") &&
1436 strcmp (totem_config->
rrp_mode,
"passive")) {
1437 snprintf (local_error_reason,
sizeof(local_error_reason),
1438 "The RRP mode \"%s\" specified is invalid. It must be none, active, or passive.\n", totem_config->
rrp_mode);
1442 if (strcmp (totem_config->
rrp_mode,
"none") == 0) {
1445 if (interface_max < totem_config->interface_count) {
1446 snprintf (parse_error,
sizeof(parse_error),
1447 "%d is too many configured interfaces for the rrp_mode setting %s.",
1450 error_reason = parse_error;
1454 if (totem_config->
net_mtu == 0) {
1461 snprintf (error_string_response,
sizeof(error_string_response),
1462 "parse error in config: %s\n", error_reason);
1463 *error_string = error_string_response;
1468 static int read_keyfile (
1469 const char *key_location,
1470 struct totem_config *totem_config,
1471 const char **error_string)
1475 ssize_t expected_key_len =
sizeof (totem_config->
private_key);
1477 char error_str[100];
1478 const char *error_ptr;
1480 fd = open (key_location, O_RDONLY);
1482 error_ptr = qb_strerror_r(errno, error_str,
sizeof(error_str));
1483 snprintf (error_string_response,
sizeof(error_string_response),
1484 "Could not open %s: %s\n",
1485 key_location, error_ptr);
1489 res = read (fd, totem_config->
private_key, expected_key_len);
1490 saved_errno = errno;
1494 error_ptr = qb_strerror_r (saved_errno, error_str,
sizeof(error_str));
1495 snprintf (error_string_response,
sizeof(error_string_response),
1496 "Could not read %s: %s\n",
1497 key_location, error_ptr);
1503 if (res != expected_key_len) {
1504 snprintf (error_string_response,
sizeof(error_string_response),
1505 "Could only read %d bits of 1024 bits from %s.\n",
1506 res * 8, key_location);
1513 *error_string = error_string_response;
1518 struct totem_config *totem_config,
1519 const char **error_string)
1522 char *key_location = NULL;
1536 res = read_keyfile(key_location, totem_config, error_string);
1544 if (key_len >
sizeof (totem_config->
private_key)) {
1545 sprintf(error_string_response,
"key is too long");
1552 sprintf(error_string_response,
"can't store private key");
1560 const char *filename = getenv(
"COROSYNC_TOTEM_AUTHKEY_FILE");
1563 res = read_keyfile(filename, totem_config, error_string);
1572 *error_string = error_string_response;
1577 static void debug_dump_totem_config(
const struct totem_config *totem_config)
1590 "seqno unchanged const (%d rotations) Maximum network MTU %d",
1593 "window size per rotation (%d messages) maximum messages per rotation (%d messages)",
1613 static void totem_change_notify(
1615 const char *key_name,
1620 struct totem_config *totem_config = (
struct totem_config *)user_data;
1623 const char *deleted_key = NULL;
1624 const char *error_string;
1633 param = totem_get_param_by_name((
struct totem_config *)user_data, key_name);
1639 if (!param && strcmp(key_name,
"totem.token_coefficient") != 0)
1647 deleted_key = key_name;
1657 totem_volatile_config_read (totem_config, deleted_key);
1659 debug_dump_totem_config(totem_config);
1660 if (totem_volatile_config_validate(totem_config, &error_string) == -1) {
1669 static void totem_reload_notify(
1671 const char *key_name,
1676 struct totem_config *totem_config = (
struct totem_config *)user_data;
1677 uint32_t local_node_pos;
1678 const char *error_string;
1681 if (*(uint8_t *)new_val.
data == 0) {
1682 put_nodelist_members_to_config (totem_config, 1);
1683 totem_volatile_config_read (totem_config, NULL);
1685 debug_dump_totem_config(totem_config);
1686 if (totem_volatile_config_validate(totem_config, &error_string) == -1) {
1695 local_node_pos = find_local_node_in_nodelist(totem_config);
1696 if (local_node_pos != -1) {
1706 static void add_totem_config_notification(
struct totem_config *totem_config)
1712 totem_change_notify,
1718 totem_reload_notify,
1724 nodelist_dynamic_notify,
1725 (
void *)totem_config,