]>
Commit | Line | Data |
---|---|---|
b8907339 PR |
1 | /* |
2 | drbd_state.c | |
3 | ||
4 | This file is part of DRBD by Philipp Reisner and Lars Ellenberg. | |
5 | ||
6 | Copyright (C) 2001-2008, LINBIT Information Technologies GmbH. | |
7 | Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>. | |
8 | Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>. | |
9 | ||
10 | Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev | |
11 | from Logicworks, Inc. for making SDP replication support possible. | |
12 | ||
13 | drbd is free software; you can redistribute it and/or modify | |
14 | it under the terms of the GNU General Public License as published by | |
15 | the Free Software Foundation; either version 2, or (at your option) | |
16 | any later version. | |
17 | ||
18 | drbd is distributed in the hope that it will be useful, | |
19 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
21 | GNU General Public License for more details. | |
22 | ||
23 | You should have received a copy of the GNU General Public License | |
24 | along with drbd; see the file COPYING. If not, write to | |
25 | the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. | |
26 | */ | |
27 | ||
28 | #include <linux/drbd_limits.h> | |
29 | #include "drbd_int.h" | |
a3603a6e | 30 | #include "drbd_protocol.h" |
b8907339 PR |
31 | #include "drbd_req.h" |
32 | ||
33 | struct after_state_chg_work { | |
34 | struct drbd_work w; | |
35 | union drbd_state os; | |
36 | union drbd_state ns; | |
37 | enum chg_state_flags flags; | |
38 | struct completion *done; | |
39 | }; | |
40 | ||
d942ae44 PR |
41 | enum sanitize_state_warnings { |
42 | NO_WARNING, | |
43 | ABORTED_ONLINE_VERIFY, | |
44 | ABORTED_RESYNC, | |
45 | CONNECTION_LOST_NEGOTIATING, | |
46 | IMPLICITLY_UPGRADED_DISK, | |
47 | IMPLICITLY_UPGRADED_PDSK, | |
48 | }; | |
49 | ||
99920dc5 | 50 | static int w_after_state_ch(struct drbd_work *w, int unused); |
54761697 | 51 | static void after_state_ch(struct drbd_device *mdev, union drbd_state os, |
b8907339 | 52 | union drbd_state ns, enum chg_state_flags flags); |
54761697 | 53 | static enum drbd_state_rv is_valid_state(struct drbd_device *, union drbd_state); |
a1096a6e | 54 | static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *); |
3509502d | 55 | static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns); |
54761697 | 56 | static union drbd_state sanitize_state(struct drbd_device *mdev, union drbd_state ns, |
d942ae44 | 57 | enum sanitize_state_warnings *warn); |
b8907339 | 58 | |
2aebfabb PR |
59 | static inline bool is_susp(union drbd_state s) |
60 | { | |
61 | return s.susp || s.susp_nod || s.susp_fen; | |
62 | } | |
63 | ||
d0456c72 | 64 | bool conn_all_vols_unconf(struct drbd_tconn *tconn) |
0e29d163 | 65 | { |
54761697 | 66 | struct drbd_device *mdev; |
695d08fa | 67 | bool rv = true; |
e90285e0 | 68 | int vnr; |
0e29d163 | 69 | |
695d08fa | 70 | rcu_read_lock(); |
e90285e0 | 71 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
d0456c72 LE |
72 | if (mdev->state.disk != D_DISKLESS || |
73 | mdev->state.conn != C_STANDALONE || | |
695d08fa PR |
74 | mdev->state.role != R_SECONDARY) { |
75 | rv = false; | |
76 | break; | |
77 | } | |
0e29d163 | 78 | } |
695d08fa PR |
79 | rcu_read_unlock(); |
80 | ||
81 | return rv; | |
0e29d163 PR |
82 | } |
83 | ||
cb703454 PR |
84 | /* Unfortunately the states where not correctly ordered, when |
85 | they where defined. therefore can not use max_t() here. */ | |
86 | static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2) | |
87 | { | |
88 | if (role1 == R_PRIMARY || role2 == R_PRIMARY) | |
89 | return R_PRIMARY; | |
90 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
91 | return R_SECONDARY; | |
92 | return R_UNKNOWN; | |
93 | } | |
94 | static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2) | |
95 | { | |
96 | if (role1 == R_UNKNOWN || role2 == R_UNKNOWN) | |
97 | return R_UNKNOWN; | |
98 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
99 | return R_SECONDARY; | |
100 | return R_PRIMARY; | |
101 | } | |
102 | ||
103 | enum drbd_role conn_highest_role(struct drbd_tconn *tconn) | |
104 | { | |
105 | enum drbd_role role = R_UNKNOWN; | |
54761697 | 106 | struct drbd_device *mdev; |
cb703454 PR |
107 | int vnr; |
108 | ||
695d08fa | 109 | rcu_read_lock(); |
cb703454 PR |
110 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
111 | role = max_role(role, mdev->state.role); | |
695d08fa | 112 | rcu_read_unlock(); |
cb703454 PR |
113 | |
114 | return role; | |
115 | } | |
116 | ||
117 | enum drbd_role conn_highest_peer(struct drbd_tconn *tconn) | |
118 | { | |
119 | enum drbd_role peer = R_UNKNOWN; | |
54761697 | 120 | struct drbd_device *mdev; |
cb703454 PR |
121 | int vnr; |
122 | ||
695d08fa | 123 | rcu_read_lock(); |
cb703454 PR |
124 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
125 | peer = max_role(peer, mdev->state.peer); | |
695d08fa | 126 | rcu_read_unlock(); |
cb703454 PR |
127 | |
128 | return peer; | |
129 | } | |
130 | ||
131 | enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn) | |
132 | { | |
133 | enum drbd_disk_state ds = D_DISKLESS; | |
54761697 | 134 | struct drbd_device *mdev; |
cb703454 PR |
135 | int vnr; |
136 | ||
695d08fa | 137 | rcu_read_lock(); |
cb703454 PR |
138 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
139 | ds = max_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 140 | rcu_read_unlock(); |
cb703454 PR |
141 | |
142 | return ds; | |
143 | } | |
144 | ||
4669265a PR |
145 | enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn) |
146 | { | |
147 | enum drbd_disk_state ds = D_MASK; | |
54761697 | 148 | struct drbd_device *mdev; |
4669265a PR |
149 | int vnr; |
150 | ||
695d08fa | 151 | rcu_read_lock(); |
4669265a PR |
152 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
153 | ds = min_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 154 | rcu_read_unlock(); |
4669265a PR |
155 | |
156 | return ds; | |
157 | } | |
158 | ||
cb703454 PR |
159 | enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn) |
160 | { | |
161 | enum drbd_disk_state ds = D_DISKLESS; | |
54761697 | 162 | struct drbd_device *mdev; |
cb703454 PR |
163 | int vnr; |
164 | ||
695d08fa | 165 | rcu_read_lock(); |
cb703454 PR |
166 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
167 | ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk); | |
695d08fa | 168 | rcu_read_unlock(); |
cb703454 PR |
169 | |
170 | return ds; | |
171 | } | |
172 | ||
19f83c76 PR |
173 | enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn) |
174 | { | |
175 | enum drbd_conns conn = C_MASK; | |
54761697 | 176 | struct drbd_device *mdev; |
19f83c76 PR |
177 | int vnr; |
178 | ||
695d08fa | 179 | rcu_read_lock(); |
19f83c76 PR |
180 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
181 | conn = min_t(enum drbd_conns, conn, mdev->state.conn); | |
695d08fa | 182 | rcu_read_unlock(); |
19f83c76 PR |
183 | |
184 | return conn; | |
185 | } | |
186 | ||
79702011 PR |
187 | static bool no_peer_wf_report_params(struct drbd_tconn *tconn) |
188 | { | |
54761697 | 189 | struct drbd_device *mdev; |
79702011 PR |
190 | int vnr; |
191 | bool rv = true; | |
192 | ||
193 | rcu_read_lock(); | |
194 | idr_for_each_entry(&tconn->volumes, mdev, vnr) | |
195 | if (mdev->state.conn == C_WF_REPORT_PARAMS) { | |
196 | rv = false; | |
197 | break; | |
198 | } | |
199 | rcu_read_unlock(); | |
200 | ||
201 | return rv; | |
202 | } | |
203 | ||
204 | ||
b8907339 PR |
205 | /** |
206 | * cl_wide_st_chg() - true if the state change is a cluster wide one | |
207 | * @mdev: DRBD device. | |
208 | * @os: old (current) state. | |
209 | * @ns: new (wanted) state. | |
210 | */ | |
54761697 | 211 | static int cl_wide_st_chg(struct drbd_device *mdev, |
b8907339 PR |
212 | union drbd_state os, union drbd_state ns) |
213 | { | |
214 | return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED && | |
215 | ((os.role != R_PRIMARY && ns.role == R_PRIMARY) || | |
216 | (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
217 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) || | |
e8744f5a | 218 | (os.disk != D_FAILED && ns.disk == D_FAILED))) || |
b8907339 | 219 | (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) || |
369bea63 PR |
220 | (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) || |
221 | (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS); | |
b8907339 PR |
222 | } |
223 | ||
56707f9e PR |
224 | static union drbd_state |
225 | apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val) | |
226 | { | |
227 | union drbd_state ns; | |
228 | ns.i = (os.i & ~mask.i) | val.i; | |
229 | return ns; | |
230 | } | |
231 | ||
b8907339 | 232 | enum drbd_state_rv |
54761697 | 233 | drbd_change_state(struct drbd_device *mdev, enum chg_state_flags f, |
b8907339 PR |
234 | union drbd_state mask, union drbd_state val) |
235 | { | |
236 | unsigned long flags; | |
56707f9e | 237 | union drbd_state ns; |
b8907339 PR |
238 | enum drbd_state_rv rv; |
239 | ||
240 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 241 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 242 | rv = _drbd_set_state(mdev, ns, f, NULL); |
b8907339 PR |
243 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
244 | ||
245 | return rv; | |
246 | } | |
247 | ||
248 | /** | |
249 | * drbd_force_state() - Impose a change which happens outside our control on our state | |
250 | * @mdev: DRBD device. | |
251 | * @mask: mask of state bits to change. | |
252 | * @val: value of new state bits. | |
253 | */ | |
54761697 | 254 | void drbd_force_state(struct drbd_device *mdev, |
b8907339 PR |
255 | union drbd_state mask, union drbd_state val) |
256 | { | |
257 | drbd_change_state(mdev, CS_HARD, mask, val); | |
258 | } | |
259 | ||
260 | static enum drbd_state_rv | |
54761697 | 261 | _req_st_cond(struct drbd_device *mdev, union drbd_state mask, |
b8907339 PR |
262 | union drbd_state val) |
263 | { | |
264 | union drbd_state os, ns; | |
265 | unsigned long flags; | |
266 | enum drbd_state_rv rv; | |
267 | ||
268 | if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags)) | |
269 | return SS_CW_SUCCESS; | |
270 | ||
271 | if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags)) | |
272 | return SS_CW_FAILED_BY_PEER; | |
273 | ||
b8907339 | 274 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); |
78bae59b | 275 | os = drbd_read_state(mdev); |
56707f9e | 276 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d | 277 | rv = is_valid_transition(os, ns); |
a3025a27 | 278 | if (rv >= SS_SUCCESS) |
3509502d | 279 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ |
b8907339 PR |
280 | |
281 | if (!cl_wide_st_chg(mdev, os, ns)) | |
282 | rv = SS_CW_NO_NEED; | |
3509502d | 283 | if (rv == SS_UNKNOWN_ERROR) { |
b8907339 | 284 | rv = is_valid_state(mdev, ns); |
a3025a27 | 285 | if (rv >= SS_SUCCESS) { |
a1096a6e | 286 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
a3025a27 | 287 | if (rv >= SS_SUCCESS) |
b8907339 PR |
288 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ |
289 | } | |
290 | } | |
291 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
292 | ||
293 | return rv; | |
294 | } | |
295 | ||
296 | /** | |
297 | * drbd_req_state() - Perform an eventually cluster wide state change | |
298 | * @mdev: DRBD device. | |
299 | * @mask: mask of state bits to change. | |
300 | * @val: value of new state bits. | |
301 | * @f: flags | |
302 | * | |
303 | * Should not be called directly, use drbd_request_state() or | |
304 | * _drbd_request_state(). | |
305 | */ | |
306 | static enum drbd_state_rv | |
54761697 | 307 | drbd_req_state(struct drbd_device *mdev, union drbd_state mask, |
b8907339 PR |
308 | union drbd_state val, enum chg_state_flags f) |
309 | { | |
310 | struct completion done; | |
311 | unsigned long flags; | |
312 | union drbd_state os, ns; | |
313 | enum drbd_state_rv rv; | |
314 | ||
315 | init_completion(&done); | |
316 | ||
317 | if (f & CS_SERIALIZE) | |
8410da8f | 318 | mutex_lock(mdev->state_mutex); |
b8907339 PR |
319 | |
320 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 321 | os = drbd_read_state(mdev); |
56707f9e | 322 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d | 323 | rv = is_valid_transition(os, ns); |
3c5e5f6a LE |
324 | if (rv < SS_SUCCESS) { |
325 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
3509502d | 326 | goto abort; |
3c5e5f6a | 327 | } |
b8907339 PR |
328 | |
329 | if (cl_wide_st_chg(mdev, os, ns)) { | |
330 | rv = is_valid_state(mdev, ns); | |
331 | if (rv == SS_SUCCESS) | |
a1096a6e | 332 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
333 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
334 | ||
335 | if (rv < SS_SUCCESS) { | |
336 | if (f & CS_VERBOSE) | |
337 | print_st_err(mdev, os, ns, rv); | |
338 | goto abort; | |
339 | } | |
340 | ||
d24ae219 | 341 | if (drbd_send_state_req(mdev, mask, val)) { |
b8907339 PR |
342 | rv = SS_CW_FAILED_BY_PEER; |
343 | if (f & CS_VERBOSE) | |
344 | print_st_err(mdev, os, ns, rv); | |
345 | goto abort; | |
346 | } | |
347 | ||
348 | wait_event(mdev->state_wait, | |
349 | (rv = _req_st_cond(mdev, mask, val))); | |
350 | ||
351 | if (rv < SS_SUCCESS) { | |
b8907339 PR |
352 | if (f & CS_VERBOSE) |
353 | print_st_err(mdev, os, ns, rv); | |
354 | goto abort; | |
355 | } | |
356 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 357 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 358 | rv = _drbd_set_state(mdev, ns, f, &done); |
b8907339 PR |
359 | } else { |
360 | rv = _drbd_set_state(mdev, ns, f, &done); | |
361 | } | |
362 | ||
363 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
364 | ||
365 | if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) { | |
366 | D_ASSERT(current != mdev->tconn->worker.task); | |
367 | wait_for_completion(&done); | |
368 | } | |
369 | ||
370 | abort: | |
371 | if (f & CS_SERIALIZE) | |
8410da8f | 372 | mutex_unlock(mdev->state_mutex); |
b8907339 PR |
373 | |
374 | return rv; | |
375 | } | |
376 | ||
377 | /** | |
378 | * _drbd_request_state() - Request a state change (with flags) | |
379 | * @mdev: DRBD device. | |
380 | * @mask: mask of state bits to change. | |
381 | * @val: value of new state bits. | |
382 | * @f: flags | |
383 | * | |
384 | * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE | |
385 | * flag, or when logging of failed state change requests is not desired. | |
386 | */ | |
387 | enum drbd_state_rv | |
54761697 | 388 | _drbd_request_state(struct drbd_device *mdev, union drbd_state mask, |
b8907339 PR |
389 | union drbd_state val, enum chg_state_flags f) |
390 | { | |
391 | enum drbd_state_rv rv; | |
392 | ||
393 | wait_event(mdev->state_wait, | |
394 | (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE); | |
395 | ||
396 | return rv; | |
397 | } | |
398 | ||
54761697 | 399 | static void print_st(struct drbd_device *mdev, char *name, union drbd_state ns) |
b8907339 PR |
400 | { |
401 | dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n", | |
402 | name, | |
403 | drbd_conn_str(ns.conn), | |
404 | drbd_role_str(ns.role), | |
405 | drbd_role_str(ns.peer), | |
406 | drbd_disk_str(ns.disk), | |
407 | drbd_disk_str(ns.pdsk), | |
408 | is_susp(ns) ? 's' : 'r', | |
409 | ns.aftr_isp ? 'a' : '-', | |
410 | ns.peer_isp ? 'p' : '-', | |
411 | ns.user_isp ? 'u' : '-', | |
412 | ns.susp_fen ? 'F' : '-', | |
413 | ns.susp_nod ? 'N' : '-' | |
414 | ); | |
415 | } | |
416 | ||
54761697 | 417 | void print_st_err(struct drbd_device *mdev, union drbd_state os, |
b8907339 PR |
418 | union drbd_state ns, enum drbd_state_rv err) |
419 | { | |
420 | if (err == SS_IN_TRANSIENT_STATE) | |
421 | return; | |
422 | dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err)); | |
423 | print_st(mdev, " state", os); | |
424 | print_st(mdev, "wanted", ns); | |
425 | } | |
426 | ||
435693e8 | 427 | static long print_state_change(char *pb, union drbd_state os, union drbd_state ns, |
bbeb641c PR |
428 | enum chg_state_flags flags) |
429 | { | |
435693e8 | 430 | char *pbp; |
bbeb641c PR |
431 | pbp = pb; |
432 | *pbp = 0; | |
706cb24c | 433 | |
435693e8 | 434 | if (ns.role != os.role && flags & CS_DC_ROLE) |
bbeb641c PR |
435 | pbp += sprintf(pbp, "role( %s -> %s ) ", |
436 | drbd_role_str(os.role), | |
437 | drbd_role_str(ns.role)); | |
435693e8 | 438 | if (ns.peer != os.peer && flags & CS_DC_PEER) |
bbeb641c PR |
439 | pbp += sprintf(pbp, "peer( %s -> %s ) ", |
440 | drbd_role_str(os.peer), | |
441 | drbd_role_str(ns.peer)); | |
435693e8 | 442 | if (ns.conn != os.conn && flags & CS_DC_CONN) |
bbeb641c PR |
443 | pbp += sprintf(pbp, "conn( %s -> %s ) ", |
444 | drbd_conn_str(os.conn), | |
445 | drbd_conn_str(ns.conn)); | |
435693e8 | 446 | if (ns.disk != os.disk && flags & CS_DC_DISK) |
bbeb641c PR |
447 | pbp += sprintf(pbp, "disk( %s -> %s ) ", |
448 | drbd_disk_str(os.disk), | |
449 | drbd_disk_str(ns.disk)); | |
435693e8 | 450 | if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK) |
bbeb641c PR |
451 | pbp += sprintf(pbp, "pdsk( %s -> %s ) ", |
452 | drbd_disk_str(os.pdsk), | |
453 | drbd_disk_str(ns.pdsk)); | |
706cb24c PR |
454 | |
455 | return pbp - pb; | |
456 | } | |
457 | ||
54761697 | 458 | static void drbd_pr_state_change(struct drbd_device *mdev, union drbd_state os, union drbd_state ns, |
706cb24c PR |
459 | enum chg_state_flags flags) |
460 | { | |
461 | char pb[300]; | |
462 | char *pbp = pb; | |
463 | ||
464 | pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK); | |
465 | ||
bbeb641c PR |
466 | if (ns.aftr_isp != os.aftr_isp) |
467 | pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ", | |
468 | os.aftr_isp, | |
469 | ns.aftr_isp); | |
470 | if (ns.peer_isp != os.peer_isp) | |
471 | pbp += sprintf(pbp, "peer_isp( %d -> %d ) ", | |
472 | os.peer_isp, | |
473 | ns.peer_isp); | |
474 | if (ns.user_isp != os.user_isp) | |
475 | pbp += sprintf(pbp, "user_isp( %d -> %d ) ", | |
476 | os.user_isp, | |
477 | ns.user_isp); | |
435693e8 | 478 | |
706cb24c | 479 | if (pbp != pb) |
bbeb641c PR |
480 | dev_info(DEV, "%s\n", pb); |
481 | } | |
b8907339 | 482 | |
435693e8 PR |
483 | static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns, |
484 | enum chg_state_flags flags) | |
485 | { | |
486 | char pb[300]; | |
706cb24c PR |
487 | char *pbp = pb; |
488 | ||
489 | pbp += print_state_change(pbp, os, ns, flags); | |
435693e8 | 490 | |
706cb24c PR |
491 | if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP) |
492 | pbp += sprintf(pbp, "susp( %d -> %d ) ", | |
493 | is_susp(os), | |
494 | is_susp(ns)); | |
495 | ||
496 | if (pbp != pb) | |
435693e8 PR |
497 | conn_info(tconn, "%s\n", pb); |
498 | } | |
499 | ||
500 | ||
b8907339 PR |
501 | /** |
502 | * is_valid_state() - Returns an SS_ error code if ns is not valid | |
503 | * @mdev: DRBD device. | |
504 | * @ns: State to consider. | |
505 | */ | |
506 | static enum drbd_state_rv | |
54761697 | 507 | is_valid_state(struct drbd_device *mdev, union drbd_state ns) |
b8907339 PR |
508 | { |
509 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
510 | ||
511 | enum drbd_fencing_p fp; | |
512 | enum drbd_state_rv rv = SS_SUCCESS; | |
44ed167d | 513 | struct net_conf *nc; |
b8907339 | 514 | |
daeda1cc | 515 | rcu_read_lock(); |
b8907339 PR |
516 | fp = FP_DONT_CARE; |
517 | if (get_ldev(mdev)) { | |
daeda1cc | 518 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; |
b8907339 PR |
519 | put_ldev(mdev); |
520 | } | |
521 | ||
44ed167d PR |
522 | nc = rcu_dereference(mdev->tconn->net_conf); |
523 | if (nc) { | |
524 | if (!nc->two_primaries && ns.role == R_PRIMARY) { | |
047e95e2 PR |
525 | if (ns.peer == R_PRIMARY) |
526 | rv = SS_TWO_PRIMARIES; | |
cb703454 | 527 | else if (conn_highest_peer(mdev->tconn) == R_PRIMARY) |
047e95e2 | 528 | rv = SS_O_VOL_PEER_PRI; |
44ed167d | 529 | } |
b8907339 PR |
530 | } |
531 | ||
532 | if (rv <= 0) | |
533 | /* already found a reason to abort */; | |
534 | else if (ns.role == R_SECONDARY && mdev->open_cnt) | |
535 | rv = SS_DEVICE_IN_USE; | |
536 | ||
537 | else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE) | |
538 | rv = SS_NO_UP_TO_DATE_DISK; | |
539 | ||
540 | else if (fp >= FP_RESOURCE && | |
541 | ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN) | |
542 | rv = SS_PRIMARY_NOP; | |
543 | ||
544 | else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT) | |
545 | rv = SS_NO_UP_TO_DATE_DISK; | |
546 | ||
547 | else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT) | |
548 | rv = SS_NO_LOCAL_DISK; | |
549 | ||
550 | else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT) | |
551 | rv = SS_NO_REMOTE_DISK; | |
552 | ||
553 | else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE) | |
554 | rv = SS_NO_UP_TO_DATE_DISK; | |
555 | ||
556 | else if ((ns.conn == C_CONNECTED || | |
557 | ns.conn == C_WF_BITMAP_S || | |
558 | ns.conn == C_SYNC_SOURCE || | |
559 | ns.conn == C_PAUSED_SYNC_S) && | |
560 | ns.disk == D_OUTDATED) | |
561 | rv = SS_CONNECTED_OUTDATES; | |
562 | ||
563 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
44ed167d | 564 | (nc->verify_alg[0] == 0)) |
b8907339 PR |
565 | rv = SS_NO_VERIFY_ALG; |
566 | ||
567 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
568 | mdev->tconn->agreed_pro_version < 88) | |
569 | rv = SS_NOT_SUPPORTED; | |
570 | ||
5c4f13d9 PR |
571 | else if (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE) |
572 | rv = SS_NO_UP_TO_DATE_DISK; | |
573 | ||
574 | else if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) && | |
575 | ns.pdsk == D_UNKNOWN) | |
576 | rv = SS_NEED_CONNECTION; | |
577 | ||
b8907339 PR |
578 | else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN) |
579 | rv = SS_CONNECTED_OUTDATES; | |
580 | ||
44ed167d PR |
581 | rcu_read_unlock(); |
582 | ||
b8907339 PR |
583 | return rv; |
584 | } | |
585 | ||
586 | /** | |
a75f34ad | 587 | * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible |
3509502d PR |
588 | * This function limits state transitions that may be declined by DRBD. I.e. |
589 | * user requests (aka soft transitions). | |
b8907339 PR |
590 | * @mdev: DRBD device. |
591 | * @ns: new state. | |
592 | * @os: old state. | |
593 | */ | |
594 | static enum drbd_state_rv | |
a1096a6e | 595 | is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn) |
b8907339 PR |
596 | { |
597 | enum drbd_state_rv rv = SS_SUCCESS; | |
598 | ||
599 | if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) && | |
600 | os.conn > C_CONNECTED) | |
601 | rv = SS_RESYNC_RUNNING; | |
602 | ||
603 | if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE) | |
604 | rv = SS_ALREADY_STANDALONE; | |
605 | ||
606 | if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS) | |
607 | rv = SS_IS_DISKLESS; | |
608 | ||
609 | if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED) | |
610 | rv = SS_NO_NET_CONFIG; | |
611 | ||
612 | if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING) | |
613 | rv = SS_LOWER_THAN_OUTDATED; | |
614 | ||
615 | if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED) | |
616 | rv = SS_IN_TRANSIENT_STATE; | |
617 | ||
2325eb66 PR |
618 | /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS) |
619 | rv = SS_IN_TRANSIENT_STATE; */ | |
b8907339 | 620 | |
a1096a6e PR |
621 | /* While establishing a connection only allow cstate to change. |
622 | Delay/refuse role changes, detach attach etc... */ | |
623 | if (test_bit(STATE_SENT, &tconn->flags) && | |
624 | !(os.conn == C_WF_REPORT_PARAMS || | |
625 | (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION))) | |
626 | rv = SS_IN_TRANSIENT_STATE; | |
627 | ||
b8907339 PR |
628 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED) |
629 | rv = SS_NEED_CONNECTION; | |
630 | ||
631 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
632 | ns.conn != os.conn && os.conn > C_CONNECTED) | |
633 | rv = SS_RESYNC_RUNNING; | |
634 | ||
635 | if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) && | |
636 | os.conn < C_CONNECTED) | |
637 | rv = SS_NEED_CONNECTION; | |
638 | ||
639 | if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE) | |
640 | && os.conn < C_WF_REPORT_PARAMS) | |
641 | rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */ | |
642 | ||
2bd5ed5d PR |
643 | if (ns.conn == C_DISCONNECTING && ns.pdsk == D_OUTDATED && |
644 | os.conn < C_CONNECTED && os.pdsk > D_OUTDATED) | |
645 | rv = SS_OUTDATE_WO_CONN; | |
646 | ||
b8907339 PR |
647 | return rv; |
648 | } | |
649 | ||
3509502d | 650 | static enum drbd_state_rv |
fda74117 | 651 | is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc) |
3509502d | 652 | { |
d9cc6e23 LE |
653 | /* no change -> nothing to do, at least for the connection part */ |
654 | if (oc == nc) | |
655 | return SS_NOTHING_TO_DO; | |
3509502d | 656 | |
d9cc6e23 LE |
657 | /* disconnect of an unconfigured connection does not make sense */ |
658 | if (oc == C_STANDALONE && nc == C_DISCONNECTING) | |
659 | return SS_ALREADY_STANDALONE; | |
660 | ||
661 | /* from C_STANDALONE, we start with C_UNCONNECTED */ | |
662 | if (oc == C_STANDALONE && nc != C_UNCONNECTED) | |
663 | return SS_NEED_CONNECTION; | |
3509502d | 664 | |
25b0d6c8 PR |
665 | /* When establishing a connection we need to go through WF_REPORT_PARAMS! |
666 | Necessary to do the right thing upon invalidate-remote on a disconnected resource */ | |
667 | if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED) | |
668 | return SS_NEED_CONNECTION; | |
669 | ||
3509502d | 670 | /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */ |
fda74117 | 671 | if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING) |
d9cc6e23 | 672 | return SS_IN_TRANSIENT_STATE; |
3509502d PR |
673 | |
674 | /* After C_DISCONNECTING only C_STANDALONE may follow */ | |
fda74117 | 675 | if (oc == C_DISCONNECTING && nc != C_STANDALONE) |
d9cc6e23 | 676 | return SS_IN_TRANSIENT_STATE; |
3509502d | 677 | |
d9cc6e23 | 678 | return SS_SUCCESS; |
fda74117 PR |
679 | } |
680 | ||
681 | ||
682 | /** | |
683 | * is_valid_transition() - Returns an SS_ error code if the state transition is not possible | |
684 | * This limits hard state transitions. Hard state transitions are facts there are | |
685 | * imposed on DRBD by the environment. E.g. disk broke or network broke down. | |
686 | * But those hard state transitions are still not allowed to do everything. | |
687 | * @ns: new state. | |
688 | * @os: old state. | |
689 | */ | |
690 | static enum drbd_state_rv | |
691 | is_valid_transition(union drbd_state os, union drbd_state ns) | |
692 | { | |
693 | enum drbd_state_rv rv; | |
694 | ||
695 | rv = is_valid_conn_transition(os.conn, ns.conn); | |
696 | ||
3509502d PR |
697 | /* we cannot fail (again) if we already detached */ |
698 | if (ns.disk == D_FAILED && os.disk == D_DISKLESS) | |
699 | rv = SS_IS_DISKLESS; | |
700 | ||
701 | return rv; | |
702 | } | |
703 | ||
54761697 | 704 | static void print_sanitize_warnings(struct drbd_device *mdev, enum sanitize_state_warnings warn) |
d942ae44 PR |
705 | { |
706 | static const char *msg_table[] = { | |
707 | [NO_WARNING] = "", | |
708 | [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.", | |
709 | [ABORTED_RESYNC] = "Resync aborted.", | |
710 | [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!", | |
711 | [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk", | |
712 | [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk", | |
713 | }; | |
714 | ||
715 | if (warn != NO_WARNING) | |
716 | dev_warn(DEV, "%s\n", msg_table[warn]); | |
717 | } | |
718 | ||
b8907339 PR |
719 | /** |
720 | * sanitize_state() - Resolves implicitly necessary additional changes to a state transition | |
721 | * @mdev: DRBD device. | |
722 | * @os: old state. | |
723 | * @ns: new state. | |
724 | * @warn_sync_abort: | |
725 | * | |
726 | * When we loose connection, we have to set the state of the peers disk (pdsk) | |
727 | * to D_UNKNOWN. This rule and many more along those lines are in this function. | |
728 | */ | |
54761697 | 729 | static union drbd_state sanitize_state(struct drbd_device *mdev, union drbd_state ns, |
d942ae44 | 730 | enum sanitize_state_warnings *warn) |
b8907339 PR |
731 | { |
732 | enum drbd_fencing_p fp; | |
733 | enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max; | |
734 | ||
d942ae44 PR |
735 | if (warn) |
736 | *warn = NO_WARNING; | |
737 | ||
b8907339 PR |
738 | fp = FP_DONT_CARE; |
739 | if (get_ldev(mdev)) { | |
daeda1cc PR |
740 | rcu_read_lock(); |
741 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; | |
742 | rcu_read_unlock(); | |
b8907339 PR |
743 | put_ldev(mdev); |
744 | } | |
745 | ||
3509502d | 746 | /* Implications from connection to peer and peer_isp */ |
b8907339 PR |
747 | if (ns.conn < C_CONNECTED) { |
748 | ns.peer_isp = 0; | |
749 | ns.peer = R_UNKNOWN; | |
750 | if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT) | |
751 | ns.pdsk = D_UNKNOWN; | |
752 | } | |
753 | ||
754 | /* Clear the aftr_isp when becoming unconfigured */ | |
755 | if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY) | |
756 | ns.aftr_isp = 0; | |
757 | ||
4308a0a3 | 758 | /* An implication of the disk states onto the connection state */ |
b8907339 | 759 | /* Abort resync if a disk fails/detaches */ |
4308a0a3 | 760 | if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) { |
d942ae44 PR |
761 | if (warn) |
762 | *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ? | |
763 | ABORTED_ONLINE_VERIFY : ABORTED_RESYNC; | |
b8907339 PR |
764 | ns.conn = C_CONNECTED; |
765 | } | |
766 | ||
767 | /* Connection breaks down before we finished "Negotiating" */ | |
768 | if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING && | |
769 | get_ldev_if_state(mdev, D_NEGOTIATING)) { | |
770 | if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) { | |
771 | ns.disk = mdev->new_state_tmp.disk; | |
772 | ns.pdsk = mdev->new_state_tmp.pdsk; | |
773 | } else { | |
d942ae44 PR |
774 | if (warn) |
775 | *warn = CONNECTION_LOST_NEGOTIATING; | |
b8907339 PR |
776 | ns.disk = D_DISKLESS; |
777 | ns.pdsk = D_UNKNOWN; | |
778 | } | |
779 | put_ldev(mdev); | |
780 | } | |
781 | ||
782 | /* D_CONSISTENT and D_OUTDATED vanish when we get connected */ | |
783 | if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) { | |
784 | if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED) | |
785 | ns.disk = D_UP_TO_DATE; | |
786 | if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED) | |
787 | ns.pdsk = D_UP_TO_DATE; | |
788 | } | |
789 | ||
790 | /* Implications of the connection stat on the disk states */ | |
791 | disk_min = D_DISKLESS; | |
792 | disk_max = D_UP_TO_DATE; | |
793 | pdsk_min = D_INCONSISTENT; | |
794 | pdsk_max = D_UNKNOWN; | |
795 | switch ((enum drbd_conns)ns.conn) { | |
796 | case C_WF_BITMAP_T: | |
797 | case C_PAUSED_SYNC_T: | |
798 | case C_STARTING_SYNC_T: | |
799 | case C_WF_SYNC_UUID: | |
800 | case C_BEHIND: | |
801 | disk_min = D_INCONSISTENT; | |
802 | disk_max = D_OUTDATED; | |
803 | pdsk_min = D_UP_TO_DATE; | |
804 | pdsk_max = D_UP_TO_DATE; | |
805 | break; | |
806 | case C_VERIFY_S: | |
807 | case C_VERIFY_T: | |
808 | disk_min = D_UP_TO_DATE; | |
809 | disk_max = D_UP_TO_DATE; | |
810 | pdsk_min = D_UP_TO_DATE; | |
811 | pdsk_max = D_UP_TO_DATE; | |
812 | break; | |
813 | case C_CONNECTED: | |
814 | disk_min = D_DISKLESS; | |
815 | disk_max = D_UP_TO_DATE; | |
816 | pdsk_min = D_DISKLESS; | |
817 | pdsk_max = D_UP_TO_DATE; | |
818 | break; | |
819 | case C_WF_BITMAP_S: | |
820 | case C_PAUSED_SYNC_S: | |
821 | case C_STARTING_SYNC_S: | |
822 | case C_AHEAD: | |
823 | disk_min = D_UP_TO_DATE; | |
824 | disk_max = D_UP_TO_DATE; | |
825 | pdsk_min = D_INCONSISTENT; | |
826 | pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/ | |
827 | break; | |
828 | case C_SYNC_TARGET: | |
829 | disk_min = D_INCONSISTENT; | |
830 | disk_max = D_INCONSISTENT; | |
831 | pdsk_min = D_UP_TO_DATE; | |
832 | pdsk_max = D_UP_TO_DATE; | |
833 | break; | |
834 | case C_SYNC_SOURCE: | |
835 | disk_min = D_UP_TO_DATE; | |
836 | disk_max = D_UP_TO_DATE; | |
837 | pdsk_min = D_INCONSISTENT; | |
838 | pdsk_max = D_INCONSISTENT; | |
839 | break; | |
840 | case C_STANDALONE: | |
841 | case C_DISCONNECTING: | |
842 | case C_UNCONNECTED: | |
843 | case C_TIMEOUT: | |
844 | case C_BROKEN_PIPE: | |
845 | case C_NETWORK_FAILURE: | |
846 | case C_PROTOCOL_ERROR: | |
847 | case C_TEAR_DOWN: | |
848 | case C_WF_CONNECTION: | |
849 | case C_WF_REPORT_PARAMS: | |
850 | case C_MASK: | |
851 | break; | |
852 | } | |
853 | if (ns.disk > disk_max) | |
854 | ns.disk = disk_max; | |
855 | ||
856 | if (ns.disk < disk_min) { | |
d942ae44 PR |
857 | if (warn) |
858 | *warn = IMPLICITLY_UPGRADED_DISK; | |
b8907339 PR |
859 | ns.disk = disk_min; |
860 | } | |
861 | if (ns.pdsk > pdsk_max) | |
862 | ns.pdsk = pdsk_max; | |
863 | ||
864 | if (ns.pdsk < pdsk_min) { | |
d942ae44 PR |
865 | if (warn) |
866 | *warn = IMPLICITLY_UPGRADED_PDSK; | |
b8907339 PR |
867 | ns.pdsk = pdsk_min; |
868 | } | |
869 | ||
870 | if (fp == FP_STONITH && | |
4308a0a3 | 871 | (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED)) |
b8907339 PR |
872 | ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */ |
873 | ||
f399002e | 874 | if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO && |
4308a0a3 | 875 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) |
b8907339 PR |
876 | ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */ |
877 | ||
878 | if (ns.aftr_isp || ns.peer_isp || ns.user_isp) { | |
879 | if (ns.conn == C_SYNC_SOURCE) | |
880 | ns.conn = C_PAUSED_SYNC_S; | |
881 | if (ns.conn == C_SYNC_TARGET) | |
882 | ns.conn = C_PAUSED_SYNC_T; | |
883 | } else { | |
884 | if (ns.conn == C_PAUSED_SYNC_S) | |
885 | ns.conn = C_SYNC_SOURCE; | |
886 | if (ns.conn == C_PAUSED_SYNC_T) | |
887 | ns.conn = C_SYNC_TARGET; | |
888 | } | |
889 | ||
890 | return ns; | |
891 | } | |
892 | ||
54761697 | 893 | void drbd_resume_al(struct drbd_device *mdev) |
b8907339 PR |
894 | { |
895 | if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags)) | |
896 | dev_info(DEV, "Resumed AL updates\n"); | |
897 | } | |
898 | ||
899 | /* helper for __drbd_set_state */ | |
54761697 | 900 | static void set_ov_position(struct drbd_device *mdev, enum drbd_conns cs) |
b8907339 PR |
901 | { |
902 | if (mdev->tconn->agreed_pro_version < 90) | |
903 | mdev->ov_start_sector = 0; | |
904 | mdev->rs_total = drbd_bm_bits(mdev); | |
905 | mdev->ov_position = 0; | |
906 | if (cs == C_VERIFY_T) { | |
907 | /* starting online verify from an arbitrary position | |
908 | * does not fit well into the existing protocol. | |
909 | * on C_VERIFY_T, we initialize ov_left and friends | |
910 | * implicitly in receive_DataRequest once the | |
911 | * first P_OV_REQUEST is received */ | |
912 | mdev->ov_start_sector = ~(sector_t)0; | |
913 | } else { | |
914 | unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector); | |
915 | if (bit >= mdev->rs_total) { | |
916 | mdev->ov_start_sector = | |
917 | BM_BIT_TO_SECT(mdev->rs_total - 1); | |
918 | mdev->rs_total = 1; | |
919 | } else | |
920 | mdev->rs_total -= bit; | |
921 | mdev->ov_position = mdev->ov_start_sector; | |
922 | } | |
923 | mdev->ov_left = mdev->rs_total; | |
924 | } | |
925 | ||
926 | /** | |
927 | * __drbd_set_state() - Set a new DRBD state | |
928 | * @mdev: DRBD device. | |
929 | * @ns: new state. | |
930 | * @flags: Flags | |
931 | * @done: Optional completion, that will get completed after the after_state_ch() finished | |
932 | * | |
933 | * Caller needs to hold req_lock, and global_state_lock. Do not call directly. | |
934 | */ | |
935 | enum drbd_state_rv | |
54761697 | 936 | __drbd_set_state(struct drbd_device *mdev, union drbd_state ns, |
b8907339 PR |
937 | enum chg_state_flags flags, struct completion *done) |
938 | { | |
939 | union drbd_state os; | |
940 | enum drbd_state_rv rv = SS_SUCCESS; | |
d942ae44 | 941 | enum sanitize_state_warnings ssw; |
b8907339 | 942 | struct after_state_chg_work *ascw; |
2681f7f6 | 943 | bool did_remote, should_do_remote; |
b8907339 | 944 | |
78bae59b | 945 | os = drbd_read_state(mdev); |
b8907339 | 946 | |
d942ae44 | 947 | ns = sanitize_state(mdev, ns, &ssw); |
b8907339 PR |
948 | if (ns.i == os.i) |
949 | return SS_NOTHING_TO_DO; | |
950 | ||
3509502d PR |
951 | rv = is_valid_transition(os, ns); |
952 | if (rv < SS_SUCCESS) | |
953 | return rv; | |
954 | ||
b8907339 PR |
955 | if (!(flags & CS_HARD)) { |
956 | /* pre-state-change checks ; only look at ns */ | |
957 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
958 | ||
959 | rv = is_valid_state(mdev, ns); | |
960 | if (rv < SS_SUCCESS) { | |
961 | /* If the old state was illegal as well, then let | |
962 | this happen...*/ | |
963 | ||
964 | if (is_valid_state(mdev, os) == rv) | |
a1096a6e | 965 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 | 966 | } else |
a1096a6e | 967 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
968 | } |
969 | ||
970 | if (rv < SS_SUCCESS) { | |
971 | if (flags & CS_VERBOSE) | |
972 | print_st_err(mdev, os, ns, rv); | |
973 | return rv; | |
974 | } | |
975 | ||
d942ae44 | 976 | print_sanitize_warnings(mdev, ssw); |
b8907339 | 977 | |
435693e8 | 978 | drbd_pr_state_change(mdev, os, ns, flags); |
b8907339 | 979 | |
706cb24c PR |
980 | /* Display changes to the susp* flags that where caused by the call to |
981 | sanitize_state(). Only display it here if we where not called from | |
982 | _conn_request_state() */ | |
983 | if (!(flags & CS_DC_SUSP)) | |
984 | conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP); | |
985 | ||
b8907339 PR |
986 | /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference |
987 | * on the ldev here, to be sure the transition -> D_DISKLESS resp. | |
988 | * drbd_ldev_destroy() won't happen before our corresponding | |
989 | * after_state_ch works run, where we put_ldev again. */ | |
990 | if ((os.disk != D_FAILED && ns.disk == D_FAILED) || | |
991 | (os.disk != D_DISKLESS && ns.disk == D_DISKLESS)) | |
992 | atomic_inc(&mdev->local_cnt); | |
993 | ||
2681f7f6 | 994 | did_remote = drbd_should_do_remote(mdev->state); |
da9fbc27 | 995 | mdev->state.i = ns.i; |
2681f7f6 | 996 | should_do_remote = drbd_should_do_remote(mdev->state); |
8e0af25f PR |
997 | mdev->tconn->susp = ns.susp; |
998 | mdev->tconn->susp_nod = ns.susp_nod; | |
999 | mdev->tconn->susp_fen = ns.susp_fen; | |
b8907339 | 1000 | |
2681f7f6 LE |
1001 | /* put replicated vs not-replicated requests in seperate epochs */ |
1002 | if (did_remote != should_do_remote) | |
1003 | start_new_tl_epoch(mdev->tconn); | |
1004 | ||
b8907339 PR |
1005 | if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING) |
1006 | drbd_print_uuids(mdev, "attached to UUIDs"); | |
1007 | ||
79702011 PR |
1008 | /* Wake up role changes, that were delayed because of connection establishing */ |
1009 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS && | |
1010 | no_peer_wf_report_params(mdev->tconn)) | |
1011 | clear_bit(STATE_SENT, &mdev->tconn->flags); | |
1012 | ||
b8907339 PR |
1013 | wake_up(&mdev->misc_wait); |
1014 | wake_up(&mdev->state_wait); | |
2a67d8b9 | 1015 | wake_up(&mdev->tconn->ping_wait); |
b8907339 | 1016 | |
58ffa580 LE |
1017 | /* Aborted verify run, or we reached the stop sector. |
1018 | * Log the last position, unless end-of-device. */ | |
b8907339 | 1019 | if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) && |
58ffa580 | 1020 | ns.conn <= C_CONNECTED) { |
b8907339 PR |
1021 | mdev->ov_start_sector = |
1022 | BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left); | |
58ffa580 LE |
1023 | if (mdev->ov_left) |
1024 | dev_info(DEV, "Online Verify reached sector %llu\n", | |
1025 | (unsigned long long)mdev->ov_start_sector); | |
b8907339 PR |
1026 | } |
1027 | ||
1028 | if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) && | |
1029 | (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) { | |
1030 | dev_info(DEV, "Syncer continues.\n"); | |
1031 | mdev->rs_paused += (long)jiffies | |
1032 | -(long)mdev->rs_mark_time[mdev->rs_last_mark]; | |
1033 | if (ns.conn == C_SYNC_TARGET) | |
1034 | mod_timer(&mdev->resync_timer, jiffies); | |
1035 | } | |
1036 | ||
1037 | if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) && | |
1038 | (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) { | |
1039 | dev_info(DEV, "Resync suspended\n"); | |
1040 | mdev->rs_mark_time[mdev->rs_last_mark] = jiffies; | |
1041 | } | |
1042 | ||
1043 | if (os.conn == C_CONNECTED && | |
1044 | (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) { | |
1045 | unsigned long now = jiffies; | |
1046 | int i; | |
1047 | ||
1048 | set_ov_position(mdev, ns.conn); | |
1049 | mdev->rs_start = now; | |
1050 | mdev->rs_last_events = 0; | |
1051 | mdev->rs_last_sect_ev = 0; | |
1052 | mdev->ov_last_oos_size = 0; | |
1053 | mdev->ov_last_oos_start = 0; | |
1054 | ||
1055 | for (i = 0; i < DRBD_SYNC_MARKS; i++) { | |
1056 | mdev->rs_mark_left[i] = mdev->ov_left; | |
1057 | mdev->rs_mark_time[i] = now; | |
1058 | } | |
1059 | ||
1060 | drbd_rs_controller_reset(mdev); | |
1061 | ||
1062 | if (ns.conn == C_VERIFY_S) { | |
1063 | dev_info(DEV, "Starting Online Verify from sector %llu\n", | |
1064 | (unsigned long long)mdev->ov_position); | |
1065 | mod_timer(&mdev->resync_timer, jiffies); | |
1066 | } | |
1067 | } | |
1068 | ||
1069 | if (get_ldev(mdev)) { | |
1070 | u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND| | |
1071 | MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE| | |
1072 | MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY); | |
1073 | ||
d5d7ebd4 | 1074 | mdf &= ~MDF_AL_CLEAN; |
b8907339 PR |
1075 | if (test_bit(CRASHED_PRIMARY, &mdev->flags)) |
1076 | mdf |= MDF_CRASHED_PRIMARY; | |
1077 | if (mdev->state.role == R_PRIMARY || | |
1078 | (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY)) | |
1079 | mdf |= MDF_PRIMARY_IND; | |
1080 | if (mdev->state.conn > C_WF_REPORT_PARAMS) | |
1081 | mdf |= MDF_CONNECTED_IND; | |
1082 | if (mdev->state.disk > D_INCONSISTENT) | |
1083 | mdf |= MDF_CONSISTENT; | |
1084 | if (mdev->state.disk > D_OUTDATED) | |
1085 | mdf |= MDF_WAS_UP_TO_DATE; | |
1086 | if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT) | |
1087 | mdf |= MDF_PEER_OUT_DATED; | |
1088 | if (mdf != mdev->ldev->md.flags) { | |
1089 | mdev->ldev->md.flags = mdf; | |
1090 | drbd_md_mark_dirty(mdev); | |
1091 | } | |
1092 | if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT) | |
1093 | drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]); | |
1094 | put_ldev(mdev); | |
1095 | } | |
1096 | ||
1097 | /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */ | |
1098 | if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT && | |
1099 | os.peer == R_SECONDARY && ns.peer == R_PRIMARY) | |
1100 | set_bit(CONSIDER_RESYNC, &mdev->flags); | |
1101 | ||
1102 | /* Receiver should clean up itself */ | |
1103 | if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING) | |
1104 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1105 | ||
1106 | /* Now the receiver finished cleaning up itself, it should die */ | |
1107 | if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE) | |
1108 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1109 | ||
1110 | /* Upon network failure, we need to restart the receiver. */ | |
823bd832 | 1111 | if (os.conn > C_WF_CONNECTION && |
b8907339 PR |
1112 | ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT) |
1113 | drbd_thread_restart_nowait(&mdev->tconn->receiver); | |
1114 | ||
1115 | /* Resume AL writing if we get a connection */ | |
28e448bb | 1116 | if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED) { |
b8907339 | 1117 | drbd_resume_al(mdev); |
28e448bb PR |
1118 | mdev->tconn->connect_cnt++; |
1119 | } | |
b8907339 | 1120 | |
07be15b1 LE |
1121 | /* remember last attach time so request_timer_fn() won't |
1122 | * kill newly established sessions while we are still trying to thaw | |
1123 | * previously frozen IO */ | |
1124 | if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) && | |
1125 | ns.disk > D_NEGOTIATING) | |
1126 | mdev->last_reattach_jif = jiffies; | |
1127 | ||
b8907339 PR |
1128 | ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC); |
1129 | if (ascw) { | |
1130 | ascw->os = os; | |
1131 | ascw->ns = ns; | |
1132 | ascw->flags = flags; | |
1133 | ascw->w.cb = w_after_state_ch; | |
a21e9298 | 1134 | ascw->w.mdev = mdev; |
b8907339 | 1135 | ascw->done = done; |
d5b27b01 | 1136 | drbd_queue_work(&mdev->tconn->sender_work, &ascw->w); |
b8907339 | 1137 | } else { |
bbeb641c | 1138 | dev_err(DEV, "Could not kmalloc an ascw\n"); |
b8907339 PR |
1139 | } |
1140 | ||
1141 | return rv; | |
1142 | } | |
1143 | ||
99920dc5 | 1144 | static int w_after_state_ch(struct drbd_work *w, int unused) |
b8907339 PR |
1145 | { |
1146 | struct after_state_chg_work *ascw = | |
1147 | container_of(w, struct after_state_chg_work, w); | |
54761697 | 1148 | struct drbd_device *mdev = w->mdev; |
b8907339 PR |
1149 | |
1150 | after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags); | |
1151 | if (ascw->flags & CS_WAIT_COMPLETE) { | |
1152 | D_ASSERT(ascw->done != NULL); | |
1153 | complete(ascw->done); | |
1154 | } | |
1155 | kfree(ascw); | |
1156 | ||
99920dc5 | 1157 | return 0; |
b8907339 PR |
1158 | } |
1159 | ||
54761697 | 1160 | static void abw_start_sync(struct drbd_device *mdev, int rv) |
b8907339 PR |
1161 | { |
1162 | if (rv) { | |
1163 | dev_err(DEV, "Writing the bitmap failed not starting resync.\n"); | |
1164 | _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE); | |
1165 | return; | |
1166 | } | |
1167 | ||
1168 | switch (mdev->state.conn) { | |
1169 | case C_STARTING_SYNC_T: | |
1170 | _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE); | |
1171 | break; | |
1172 | case C_STARTING_SYNC_S: | |
1173 | drbd_start_resync(mdev, C_SYNC_SOURCE); | |
1174 | break; | |
1175 | } | |
1176 | } | |
1177 | ||
54761697 AG |
1178 | int drbd_bitmap_io_from_worker(struct drbd_device *mdev, |
1179 | int (*io_fn)(struct drbd_device *), | |
b8907339 PR |
1180 | char *why, enum bm_flag flags) |
1181 | { | |
1182 | int rv; | |
1183 | ||
1184 | D_ASSERT(current == mdev->tconn->worker.task); | |
1185 | ||
1186 | /* open coded non-blocking drbd_suspend_io(mdev); */ | |
1187 | set_bit(SUSPEND_IO, &mdev->flags); | |
1188 | ||
1189 | drbd_bm_lock(mdev, why, flags); | |
1190 | rv = io_fn(mdev); | |
1191 | drbd_bm_unlock(mdev); | |
1192 | ||
1193 | drbd_resume_io(mdev); | |
1194 | ||
1195 | return rv; | |
1196 | } | |
1197 | ||
1198 | /** | |
1199 | * after_state_ch() - Perform after state change actions that may sleep | |
1200 | * @mdev: DRBD device. | |
1201 | * @os: old state. | |
1202 | * @ns: new state. | |
1203 | * @flags: Flags | |
1204 | */ | |
54761697 | 1205 | static void after_state_ch(struct drbd_device *mdev, union drbd_state os, |
b8907339 PR |
1206 | union drbd_state ns, enum chg_state_flags flags) |
1207 | { | |
3b98c0c2 LE |
1208 | struct sib_info sib; |
1209 | ||
1210 | sib.sib_reason = SIB_STATE_CHANGE; | |
1211 | sib.os = os; | |
1212 | sib.ns = ns; | |
b8907339 PR |
1213 | |
1214 | if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) { | |
1215 | clear_bit(CRASHED_PRIMARY, &mdev->flags); | |
1216 | if (mdev->p_uuid) | |
1217 | mdev->p_uuid[UI_FLAGS] &= ~((u64)2); | |
1218 | } | |
1219 | ||
b8907339 | 1220 | /* Inform userspace about the change... */ |
3b98c0c2 | 1221 | drbd_bcast_event(mdev, &sib); |
b8907339 PR |
1222 | |
1223 | if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) && | |
1224 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) | |
1225 | drbd_khelper(mdev, "pri-on-incon-degr"); | |
1226 | ||
1227 | /* Here we have the actions that are performed after a | |
1228 | state change. This function might sleep */ | |
1229 | ||
b8907339 | 1230 | if (ns.susp_nod) { |
892fdd1a | 1231 | struct drbd_tconn *tconn = mdev->tconn; |
a6d00c8e PR |
1232 | enum drbd_req_event what = NOTHING; |
1233 | ||
892fdd1a PR |
1234 | spin_lock_irq(&tconn->req_lock); |
1235 | if (os.conn < C_CONNECTED && conn_lowest_conn(tconn) >= C_CONNECTED) | |
b8907339 PR |
1236 | what = RESEND; |
1237 | ||
3fb4746d | 1238 | if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) && |
892fdd1a | 1239 | conn_lowest_disk(tconn) > D_NEGOTIATING) |
b8907339 PR |
1240 | what = RESTART_FROZEN_DISK_IO; |
1241 | ||
892fdd1a PR |
1242 | if (tconn->susp_nod && what != NOTHING) { |
1243 | _tl_restart(tconn, what); | |
1244 | _conn_request_state(tconn, | |
1245 | (union drbd_state) { { .susp_nod = 1 } }, | |
1246 | (union drbd_state) { { .susp_nod = 0 } }, | |
1247 | CS_VERBOSE); | |
b8907339 | 1248 | } |
892fdd1a | 1249 | spin_unlock_irq(&tconn->req_lock); |
b8907339 PR |
1250 | } |
1251 | ||
88f79ec4 PR |
1252 | if (ns.susp_fen) { |
1253 | struct drbd_tconn *tconn = mdev->tconn; | |
1254 | ||
1255 | spin_lock_irq(&tconn->req_lock); | |
1256 | if (tconn->susp_fen && conn_lowest_conn(tconn) >= C_CONNECTED) { | |
1257 | /* case2: The connection was established again: */ | |
54761697 | 1258 | struct drbd_device *odev; |
88f79ec4 PR |
1259 | int vnr; |
1260 | ||
1261 | rcu_read_lock(); | |
1262 | idr_for_each_entry(&tconn->volumes, odev, vnr) | |
1263 | clear_bit(NEW_CUR_UUID, &odev->flags); | |
1264 | rcu_read_unlock(); | |
1265 | _tl_restart(tconn, RESEND); | |
1266 | _conn_request_state(tconn, | |
1267 | (union drbd_state) { { .susp_fen = 1 } }, | |
1268 | (union drbd_state) { { .susp_fen = 0 } }, | |
1269 | CS_VERBOSE); | |
1270 | } | |
1271 | spin_unlock_irq(&tconn->req_lock); | |
1272 | } | |
1273 | ||
b8907339 PR |
1274 | /* Became sync source. With protocol >= 96, we still need to send out |
1275 | * the sync uuid now. Need to do that before any drbd_send_state, or | |
1276 | * the other side may go "paused sync" before receiving the sync uuids, | |
1277 | * which is unexpected. */ | |
1278 | if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) && | |
1279 | (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) && | |
1280 | mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) { | |
1281 | drbd_gen_and_send_sync_uuid(mdev); | |
1282 | put_ldev(mdev); | |
1283 | } | |
1284 | ||
1285 | /* Do not change the order of the if above and the two below... */ | |
369bea63 PR |
1286 | if (os.pdsk == D_DISKLESS && |
1287 | ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */ | |
a324896b LE |
1288 | /* we probably will start a resync soon. |
1289 | * make sure those things are properly reset. */ | |
1290 | mdev->rs_total = 0; | |
1291 | mdev->rs_failed = 0; | |
1292 | atomic_set(&mdev->rs_pending_cnt, 0); | |
1293 | drbd_rs_cancel_all(mdev); | |
1294 | ||
b8907339 | 1295 | drbd_send_uuids(mdev); |
43de7c85 | 1296 | drbd_send_state(mdev, ns); |
b8907339 PR |
1297 | } |
1298 | /* No point in queuing send_bitmap if we don't have a connection | |
1299 | * anymore, so check also the _current_ state, not only the new state | |
1300 | * at the time this work was queued. */ | |
1301 | if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S && | |
1302 | mdev->state.conn == C_WF_BITMAP_S) | |
1303 | drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL, | |
1304 | "send_bitmap (WFBitMapS)", | |
1305 | BM_LOCKED_TEST_ALLOWED); | |
1306 | ||
1307 | /* Lost contact to peer's copy of the data */ | |
1308 | if ((os.pdsk >= D_INCONSISTENT && | |
1309 | os.pdsk != D_UNKNOWN && | |
1310 | os.pdsk != D_OUTDATED) | |
1311 | && (ns.pdsk < D_INCONSISTENT || | |
1312 | ns.pdsk == D_UNKNOWN || | |
1313 | ns.pdsk == D_OUTDATED)) { | |
1314 | if (get_ldev(mdev)) { | |
1315 | if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) && | |
1316 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
2aebfabb | 1317 | if (drbd_suspended(mdev)) { |
b8907339 PR |
1318 | set_bit(NEW_CUR_UUID, &mdev->flags); |
1319 | } else { | |
1320 | drbd_uuid_new_current(mdev); | |
1321 | drbd_send_uuids(mdev); | |
1322 | } | |
1323 | } | |
1324 | put_ldev(mdev); | |
1325 | } | |
1326 | } | |
1327 | ||
1328 | if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) { | |
0cfac5dd PR |
1329 | if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY && |
1330 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
1331 | drbd_uuid_new_current(mdev); | |
1332 | drbd_send_uuids(mdev); | |
1333 | } | |
b8907339 PR |
1334 | /* D_DISKLESS Peer becomes secondary */ |
1335 | if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY) | |
1336 | /* We may still be Primary ourselves. | |
1337 | * No harm done if the bitmap still changes, | |
1338 | * redirtied pages will follow later. */ | |
1339 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1340 | "demote diskless peer", BM_LOCKED_SET_ALLOWED); | |
1341 | put_ldev(mdev); | |
1342 | } | |
1343 | ||
1344 | /* Write out all changed bits on demote. | |
1345 | * Though, no need to da that just yet | |
1346 | * if there is a resync going on still */ | |
1347 | if (os.role == R_PRIMARY && ns.role == R_SECONDARY && | |
1348 | mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) { | |
1349 | /* No changes to the bitmap expected this time, so assert that, | |
1350 | * even though no harm was done if it did change. */ | |
1351 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1352 | "demote", BM_LOCKED_TEST_ALLOWED); | |
1353 | put_ldev(mdev); | |
1354 | } | |
1355 | ||
1356 | /* Last part of the attaching process ... */ | |
1357 | if (ns.conn >= C_CONNECTED && | |
1358 | os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) { | |
1359 | drbd_send_sizes(mdev, 0, 0); /* to start sync... */ | |
1360 | drbd_send_uuids(mdev); | |
43de7c85 | 1361 | drbd_send_state(mdev, ns); |
b8907339 PR |
1362 | } |
1363 | ||
1364 | /* We want to pause/continue resync, tell peer. */ | |
1365 | if (ns.conn >= C_CONNECTED && | |
1366 | ((os.aftr_isp != ns.aftr_isp) || | |
1367 | (os.user_isp != ns.user_isp))) | |
43de7c85 | 1368 | drbd_send_state(mdev, ns); |
b8907339 PR |
1369 | |
1370 | /* In case one of the isp bits got set, suspend other devices. */ | |
1371 | if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) && | |
1372 | (ns.aftr_isp || ns.peer_isp || ns.user_isp)) | |
1373 | suspend_other_sg(mdev); | |
1374 | ||
1375 | /* Make sure the peer gets informed about eventual state | |
1376 | changes (ISP bits) while we were in WFReportParams. */ | |
1377 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED) | |
43de7c85 | 1378 | drbd_send_state(mdev, ns); |
b8907339 PR |
1379 | |
1380 | if (os.conn != C_AHEAD && ns.conn == C_AHEAD) | |
43de7c85 | 1381 | drbd_send_state(mdev, ns); |
b8907339 PR |
1382 | |
1383 | /* We are in the progress to start a full sync... */ | |
1384 | if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
1385 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S)) | |
1386 | /* no other bitmap changes expected during this phase */ | |
1387 | drbd_queue_bitmap_io(mdev, | |
1388 | &drbd_bmio_set_n_write, &abw_start_sync, | |
1389 | "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED); | |
1390 | ||
b8907339 PR |
1391 | /* first half of local IO error, failure to attach, |
1392 | * or administrative detach */ | |
1393 | if (os.disk != D_FAILED && ns.disk == D_FAILED) { | |
32db80f6 PR |
1394 | enum drbd_io_error_p eh = EP_PASS_ON; |
1395 | int was_io_error = 0; | |
b8907339 | 1396 | /* corresponding get_ldev was in __drbd_set_state, to serialize |
32db80f6 PR |
1397 | * our cleanup here with the transition to D_DISKLESS. |
1398 | * But is is still not save to dreference ldev here, since | |
1399 | * we might come from an failed Attach before ldev was set. */ | |
1400 | if (mdev->ldev) { | |
1401 | rcu_read_lock(); | |
1402 | eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error; | |
1403 | rcu_read_unlock(); | |
1404 | ||
1405 | was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags); | |
1406 | ||
6f1a6563 LE |
1407 | if (was_io_error && eh == EP_CALL_HELPER) |
1408 | drbd_khelper(mdev, "local-io-error"); | |
1409 | ||
0c849666 LE |
1410 | /* Immediately allow completion of all application IO, |
1411 | * that waits for completion from the local disk, | |
1412 | * if this was a force-detach due to disk_timeout | |
1413 | * or administrator request (drbdsetup detach --force). | |
1414 | * Do NOT abort otherwise. | |
1415 | * Aborting local requests may cause serious problems, | |
1416 | * if requests are completed to upper layers already, | |
1417 | * and then later the already submitted local bio completes. | |
1418 | * This can cause DMA into former bio pages that meanwhile | |
1419 | * have been re-used for other things. | |
1420 | * So aborting local requests may cause crashes, | |
1421 | * or even worse, silent data corruption. | |
1422 | */ | |
1423 | if (test_and_clear_bit(FORCE_DETACH, &mdev->flags)) | |
1424 | tl_abort_disk_io(mdev); | |
32db80f6 PR |
1425 | |
1426 | /* current state still has to be D_FAILED, | |
1427 | * there is only one way out: to D_DISKLESS, | |
1428 | * and that may only happen after our put_ldev below. */ | |
1429 | if (mdev->state.disk != D_FAILED) | |
1430 | dev_err(DEV, | |
1431 | "ASSERT FAILED: disk is %s during detach\n", | |
1432 | drbd_disk_str(mdev->state.disk)); | |
1433 | ||
1434 | if (ns.conn >= C_CONNECTED) | |
1435 | drbd_send_state(mdev, ns); | |
1436 | ||
1437 | drbd_rs_cancel_all(mdev); | |
1438 | ||
1439 | /* In case we want to get something to stable storage still, | |
1440 | * this may be the last chance. | |
1441 | * Following put_ldev may transition to D_DISKLESS. */ | |
1442 | drbd_md_sync(mdev); | |
1443 | } | |
b8907339 | 1444 | put_ldev(mdev); |
b8907339 PR |
1445 | } |
1446 | ||
1447 | /* second half of local IO error, failure to attach, | |
1448 | * or administrative detach, | |
1449 | * after local_cnt references have reached zero again */ | |
1450 | if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) { | |
1451 | /* We must still be diskless, | |
1452 | * re-attach has to be serialized with this! */ | |
1453 | if (mdev->state.disk != D_DISKLESS) | |
1454 | dev_err(DEV, | |
1455 | "ASSERT FAILED: disk is %s while going diskless\n", | |
1456 | drbd_disk_str(mdev->state.disk)); | |
1457 | ||
6ab9b1b6 PR |
1458 | if (ns.conn >= C_CONNECTED) |
1459 | drbd_send_state(mdev, ns); | |
b8907339 PR |
1460 | /* corresponding get_ldev in __drbd_set_state |
1461 | * this may finally trigger drbd_ldev_destroy. */ | |
1462 | put_ldev(mdev); | |
1463 | } | |
1464 | ||
1465 | /* Notify peer that I had a local IO error, and did not detached.. */ | |
6ab9b1b6 | 1466 | if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED) |
43de7c85 | 1467 | drbd_send_state(mdev, ns); |
b8907339 PR |
1468 | |
1469 | /* Disks got bigger while they were detached */ | |
1470 | if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING && | |
1471 | test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) { | |
1472 | if (ns.conn == C_CONNECTED) | |
1473 | resync_after_online_grow(mdev); | |
1474 | } | |
1475 | ||
1476 | /* A resync finished or aborted, wake paused devices... */ | |
1477 | if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) || | |
1478 | (os.peer_isp && !ns.peer_isp) || | |
1479 | (os.user_isp && !ns.user_isp)) | |
1480 | resume_next_sg(mdev); | |
1481 | ||
1482 | /* sync target done with resync. Explicitly notify peer, even though | |
1483 | * it should (at least for non-empty resyncs) already know itself. */ | |
1484 | if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED) | |
43de7c85 | 1485 | drbd_send_state(mdev, ns); |
b8907339 | 1486 | |
58ffa580 LE |
1487 | /* Verify finished, or reached stop sector. Peer did not know about |
1488 | * the stop sector, and we may even have changed the stop sector during | |
1489 | * verify to interrupt/stop early. Send the new state. */ | |
1490 | if (os.conn == C_VERIFY_S && ns.conn == C_CONNECTED | |
1491 | && verify_can_do_stop_sector(mdev)) | |
1492 | drbd_send_state(mdev, ns); | |
1493 | ||
b8907339 PR |
1494 | /* This triggers bitmap writeout of potentially still unwritten pages |
1495 | * if the resync finished cleanly, or aborted because of peer disk | |
1496 | * failure, or because of connection loss. | |
1497 | * For resync aborted because of local disk failure, we cannot do | |
1498 | * any bitmap writeout anymore. | |
1499 | * No harm done if some bits change during this phase. | |
1500 | */ | |
1501 | if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) { | |
a220d291 LE |
1502 | drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL, |
1503 | "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED); | |
b8907339 PR |
1504 | put_ldev(mdev); |
1505 | } | |
1506 | ||
1507 | if (ns.disk == D_DISKLESS && | |
1508 | ns.conn == C_STANDALONE && | |
1509 | ns.role == R_SECONDARY) { | |
1510 | if (os.aftr_isp != ns.aftr_isp) | |
1511 | resume_next_sg(mdev); | |
1512 | } | |
1513 | ||
b8907339 PR |
1514 | drbd_md_sync(mdev); |
1515 | } | |
1516 | ||
bbeb641c PR |
1517 | struct after_conn_state_chg_work { |
1518 | struct drbd_work w; | |
1519 | enum drbd_conns oc; | |
8c7e16c3 | 1520 | union drbd_state ns_min; |
5f082f98 | 1521 | union drbd_state ns_max; /* new, max state, over all mdevs */ |
bbeb641c PR |
1522 | enum chg_state_flags flags; |
1523 | }; | |
1524 | ||
99920dc5 | 1525 | static int w_after_conn_state_ch(struct drbd_work *w, int unused) |
bbeb641c PR |
1526 | { |
1527 | struct after_conn_state_chg_work *acscw = | |
1528 | container_of(w, struct after_conn_state_chg_work, w); | |
1529 | struct drbd_tconn *tconn = w->tconn; | |
1530 | enum drbd_conns oc = acscw->oc; | |
5f082f98 | 1531 | union drbd_state ns_max = acscw->ns_max; |
54761697 | 1532 | struct drbd_device *mdev; |
a6d00c8e | 1533 | int vnr; |
bbeb641c PR |
1534 | |
1535 | kfree(acscw); | |
1536 | ||
b8907339 | 1537 | /* Upon network configuration, we need to start the receiver */ |
5f082f98 | 1538 | if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED) |
b8907339 PR |
1539 | drbd_thread_start(&tconn->receiver); |
1540 | ||
f3dfa40a LE |
1541 | if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) { |
1542 | struct net_conf *old_conf; | |
1543 | ||
a0095508 | 1544 | mutex_lock(&tconn->conf_update); |
f3dfa40a | 1545 | old_conf = tconn->net_conf; |
089c075d AG |
1546 | tconn->my_addr_len = 0; |
1547 | tconn->peer_addr_len = 0; | |
f3dfa40a LE |
1548 | rcu_assign_pointer(tconn->net_conf, NULL); |
1549 | conn_free_crypto(tconn); | |
a0095508 | 1550 | mutex_unlock(&tconn->conf_update); |
f3dfa40a LE |
1551 | |
1552 | synchronize_rcu(); | |
1553 | kfree(old_conf); | |
1554 | } | |
1555 | ||
a6d00c8e PR |
1556 | if (ns_max.susp_fen) { |
1557 | /* case1: The outdate peer handler is successful: */ | |
1558 | if (ns_max.pdsk <= D_OUTDATED) { | |
695d08fa | 1559 | rcu_read_lock(); |
a6d00c8e PR |
1560 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1561 | if (test_bit(NEW_CUR_UUID, &mdev->flags)) { | |
1562 | drbd_uuid_new_current(mdev); | |
1563 | clear_bit(NEW_CUR_UUID, &mdev->flags); | |
1564 | } | |
1565 | } | |
695d08fa | 1566 | rcu_read_unlock(); |
8a0bab2a PR |
1567 | spin_lock_irq(&tconn->req_lock); |
1568 | _tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING); | |
1569 | _conn_request_state(tconn, | |
1570 | (union drbd_state) { { .susp_fen = 1 } }, | |
1571 | (union drbd_state) { { .susp_fen = 0 } }, | |
1572 | CS_VERBOSE); | |
1573 | spin_unlock_irq(&tconn->req_lock); | |
a6d00c8e | 1574 | } |
a6d00c8e | 1575 | } |
9dc9fbb3 | 1576 | kref_put(&tconn->kref, &conn_destroy); |
19fffd7b PR |
1577 | |
1578 | conn_md_sync(tconn); | |
1579 | ||
99920dc5 | 1580 | return 0; |
bbeb641c PR |
1581 | } |
1582 | ||
435693e8 | 1583 | void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf) |
88ef594e | 1584 | { |
435693e8 | 1585 | enum chg_state_flags flags = ~0; |
54761697 | 1586 | struct drbd_device *mdev; |
435693e8 | 1587 | int vnr, first_vol = 1; |
e0e16653 PR |
1588 | union drbd_dev_state os, cs = { |
1589 | { .role = R_SECONDARY, | |
1590 | .peer = R_UNKNOWN, | |
1591 | .conn = tconn->cstate, | |
1592 | .disk = D_DISKLESS, | |
1593 | .pdsk = D_UNKNOWN, | |
1594 | } }; | |
88ef594e | 1595 | |
695d08fa | 1596 | rcu_read_lock(); |
88ef594e PR |
1597 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1598 | os = mdev->state; | |
1599 | ||
435693e8 PR |
1600 | if (first_vol) { |
1601 | cs = os; | |
1602 | first_vol = 0; | |
1603 | continue; | |
1604 | } | |
1605 | ||
1606 | if (cs.role != os.role) | |
1607 | flags &= ~CS_DC_ROLE; | |
1608 | ||
1609 | if (cs.peer != os.peer) | |
1610 | flags &= ~CS_DC_PEER; | |
1611 | ||
1612 | if (cs.conn != os.conn) | |
1613 | flags &= ~CS_DC_CONN; | |
88ef594e | 1614 | |
435693e8 PR |
1615 | if (cs.disk != os.disk) |
1616 | flags &= ~CS_DC_DISK; | |
88ef594e | 1617 | |
435693e8 PR |
1618 | if (cs.pdsk != os.pdsk) |
1619 | flags &= ~CS_DC_PDSK; | |
1620 | } | |
695d08fa | 1621 | rcu_read_unlock(); |
435693e8 PR |
1622 | |
1623 | *pf |= CS_DC_MASK; | |
1624 | *pf &= flags; | |
da9fbc27 | 1625 | (*pcs).i = cs.i; |
88ef594e | 1626 | } |
bbeb641c | 1627 | |
bd0c824a PR |
1628 | static enum drbd_state_rv |
1629 | conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
88ef594e | 1630 | enum chg_state_flags flags) |
bbeb641c | 1631 | { |
bd0c824a | 1632 | enum drbd_state_rv rv = SS_SUCCESS; |
bbeb641c | 1633 | union drbd_state ns, os; |
54761697 | 1634 | struct drbd_device *mdev; |
bd0c824a | 1635 | int vnr; |
bbeb641c | 1636 | |
695d08fa | 1637 | rcu_read_lock(); |
bd0c824a | 1638 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
78bae59b | 1639 | os = drbd_read_state(mdev); |
bd0c824a PR |
1640 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
1641 | ||
778bcf2e PR |
1642 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1643 | ns.disk = os.disk; | |
1644 | ||
bd0c824a PR |
1645 | if (ns.i == os.i) |
1646 | continue; | |
bbeb641c | 1647 | |
bd0c824a PR |
1648 | rv = is_valid_transition(os, ns); |
1649 | if (rv < SS_SUCCESS) | |
1650 | break; | |
1651 | ||
1652 | if (!(flags & CS_HARD)) { | |
1653 | rv = is_valid_state(mdev, ns); | |
1654 | if (rv < SS_SUCCESS) { | |
1655 | if (is_valid_state(mdev, os) == rv) | |
a1096a6e | 1656 | rv = is_valid_soft_transition(os, ns, tconn); |
bd0c824a | 1657 | } else |
a1096a6e | 1658 | rv = is_valid_soft_transition(os, ns, tconn); |
bd0c824a PR |
1659 | } |
1660 | if (rv < SS_SUCCESS) | |
1661 | break; | |
bbeb641c | 1662 | } |
695d08fa | 1663 | rcu_read_unlock(); |
bbeb641c | 1664 | |
bd0c824a PR |
1665 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) |
1666 | print_st_err(mdev, os, ns, rv); | |
1667 | ||
1668 | return rv; | |
bbeb641c PR |
1669 | } |
1670 | ||
8c7e16c3 | 1671 | void |
bd0c824a | 1672 | conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, |
8c7e16c3 | 1673 | union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags) |
bbeb641c | 1674 | { |
f132f554 | 1675 | union drbd_state ns, os, ns_max = { }; |
8c7e16c3 PR |
1676 | union drbd_state ns_min = { |
1677 | { .role = R_MASK, | |
1678 | .peer = R_MASK, | |
e0e16653 | 1679 | .conn = val.conn, |
8c7e16c3 PR |
1680 | .disk = D_MASK, |
1681 | .pdsk = D_MASK | |
1682 | } }; | |
54761697 | 1683 | struct drbd_device *mdev; |
bbeb641c | 1684 | enum drbd_state_rv rv; |
f132f554 | 1685 | int vnr, number_of_volumes = 0; |
bbeb641c | 1686 | |
07be15b1 LE |
1687 | if (mask.conn == C_MASK) { |
1688 | /* remember last connect time so request_timer_fn() won't | |
1689 | * kill newly established sessions while we are still trying to thaw | |
1690 | * previously frozen IO */ | |
1691 | if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS) | |
1692 | tconn->last_reconnect_jif = jiffies; | |
1693 | ||
bd0c824a | 1694 | tconn->cstate = val.conn; |
07be15b1 | 1695 | } |
bd0c824a | 1696 | |
695d08fa | 1697 | rcu_read_lock(); |
bd0c824a | 1698 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
f132f554 | 1699 | number_of_volumes++; |
78bae59b | 1700 | os = drbd_read_state(mdev); |
bd0c824a PR |
1701 | ns = apply_mask_val(os, mask, val); |
1702 | ns = sanitize_state(mdev, ns, NULL); | |
bbeb641c | 1703 | |
778bcf2e PR |
1704 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1705 | ns.disk = os.disk; | |
1706 | ||
bd0c824a PR |
1707 | rv = __drbd_set_state(mdev, ns, flags, NULL); |
1708 | if (rv < SS_SUCCESS) | |
1709 | BUG(); | |
bbeb641c | 1710 | |
8c7e16c3 PR |
1711 | ns.i = mdev->state.i; |
1712 | ns_max.role = max_role(ns.role, ns_max.role); | |
1713 | ns_max.peer = max_role(ns.peer, ns_max.peer); | |
1714 | ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn); | |
1715 | ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk); | |
1716 | ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk); | |
1717 | ||
1718 | ns_min.role = min_role(ns.role, ns_min.role); | |
1719 | ns_min.peer = min_role(ns.peer, ns_min.peer); | |
1720 | ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn); | |
1721 | ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk); | |
1722 | ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk); | |
bd0c824a | 1723 | } |
695d08fa | 1724 | rcu_read_unlock(); |
bbeb641c | 1725 | |
f132f554 PR |
1726 | if (number_of_volumes == 0) { |
1727 | ns_min = ns_max = (union drbd_state) { { | |
1728 | .role = R_SECONDARY, | |
1729 | .peer = R_UNKNOWN, | |
1730 | .conn = val.conn, | |
1731 | .disk = D_DISKLESS, | |
1732 | .pdsk = D_UNKNOWN | |
1733 | } }; | |
1734 | } | |
1735 | ||
8c7e16c3 PR |
1736 | ns_min.susp = ns_max.susp = tconn->susp; |
1737 | ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod; | |
1738 | ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen; | |
1739 | ||
1740 | *pns_min = ns_min; | |
1741 | *pns_max = ns_max; | |
bbeb641c PR |
1742 | } |
1743 | ||
df24aa45 PR |
1744 | static enum drbd_state_rv |
1745 | _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val) | |
1746 | { | |
df24aa45 PR |
1747 | enum drbd_state_rv rv; |
1748 | ||
1749 | if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags)) | |
1750 | return SS_CW_SUCCESS; | |
1751 | ||
1752 | if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags)) | |
1753 | return SS_CW_FAILED_BY_PEER; | |
1754 | ||
2bd5ed5d PR |
1755 | rv = conn_is_valid_transition(tconn, mask, val, 0); |
1756 | if (rv == SS_SUCCESS && tconn->cstate == C_WF_REPORT_PARAMS) | |
1757 | rv = SS_UNKNOWN_ERROR; /* continue waiting */ | |
df24aa45 | 1758 | |
df24aa45 PR |
1759 | return rv; |
1760 | } | |
1761 | ||
bbeb641c PR |
1762 | enum drbd_state_rv |
1763 | _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1764 | enum chg_state_flags flags) | |
1765 | { | |
1766 | enum drbd_state_rv rv = SS_SUCCESS; | |
bbeb641c PR |
1767 | struct after_conn_state_chg_work *acscw; |
1768 | enum drbd_conns oc = tconn->cstate; | |
8c7e16c3 | 1769 | union drbd_state ns_max, ns_min, os; |
c02abda2 | 1770 | bool have_mutex = false; |
bbeb641c | 1771 | |
07fc9619 PR |
1772 | if (mask.conn) { |
1773 | rv = is_valid_conn_transition(oc, val.conn); | |
1774 | if (rv < SS_SUCCESS) | |
1775 | goto abort; | |
1776 | } | |
bbeb641c | 1777 | |
88ef594e | 1778 | rv = conn_is_valid_transition(tconn, mask, val, flags); |
bbeb641c PR |
1779 | if (rv < SS_SUCCESS) |
1780 | goto abort; | |
1781 | ||
df24aa45 PR |
1782 | if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING && |
1783 | !(flags & (CS_LOCAL_ONLY | CS_HARD))) { | |
c02abda2 LE |
1784 | |
1785 | /* This will be a cluster-wide state change. | |
1786 | * Need to give up the spinlock, grab the mutex, | |
1787 | * then send the state change request, ... */ | |
1788 | spin_unlock_irq(&tconn->req_lock); | |
1789 | mutex_lock(&tconn->cstate_mutex); | |
1790 | have_mutex = true; | |
1791 | ||
1792 | set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
1793 | if (conn_send_state_req(tconn, mask, val)) { | |
1794 | /* sending failed. */ | |
1795 | clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
1796 | rv = SS_CW_FAILED_BY_PEER; | |
1797 | /* need to re-aquire the spin lock, though */ | |
1798 | goto abort_unlocked; | |
1799 | } | |
1800 | ||
1801 | if (val.conn == C_DISCONNECTING) | |
1802 | set_bit(DISCONNECT_SENT, &tconn->flags); | |
1803 | ||
1804 | /* ... and re-aquire the spinlock. | |
1805 | * If _conn_rq_cond() returned >= SS_SUCCESS, we must call | |
1806 | * conn_set_state() within the same spinlock. */ | |
1807 | spin_lock_irq(&tconn->req_lock); | |
1808 | wait_event_lock_irq(tconn->ping_wait, | |
1809 | (rv = _conn_rq_cond(tconn, mask, val)), | |
2cecb730 | 1810 | tconn->req_lock); |
c02abda2 | 1811 | clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); |
df24aa45 PR |
1812 | if (rv < SS_SUCCESS) |
1813 | goto abort; | |
1814 | } | |
1815 | ||
435693e8 | 1816 | conn_old_common_state(tconn, &os, &flags); |
706cb24c | 1817 | flags |= CS_DC_SUSP; |
8c7e16c3 | 1818 | conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags); |
5f082f98 | 1819 | conn_pr_state_change(tconn, os, ns_max, flags); |
bbeb641c PR |
1820 | |
1821 | acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC); | |
1822 | if (acscw) { | |
435693e8 | 1823 | acscw->oc = os.conn; |
8c7e16c3 | 1824 | acscw->ns_min = ns_min; |
5f082f98 | 1825 | acscw->ns_max = ns_max; |
bbeb641c PR |
1826 | acscw->flags = flags; |
1827 | acscw->w.cb = w_after_conn_state_ch; | |
9dc9fbb3 | 1828 | kref_get(&tconn->kref); |
bbeb641c | 1829 | acscw->w.tconn = tconn; |
d5b27b01 | 1830 | drbd_queue_work(&tconn->sender_work, &acscw->w); |
bbeb641c PR |
1831 | } else { |
1832 | conn_err(tconn, "Could not kmalloc an acscw\n"); | |
b8907339 | 1833 | } |
bbeb641c | 1834 | |
a01842eb | 1835 | abort: |
c02abda2 LE |
1836 | if (have_mutex) { |
1837 | /* mutex_unlock() "... must not be used in interrupt context.", | |
1838 | * so give up the spinlock, then re-aquire it */ | |
1839 | spin_unlock_irq(&tconn->req_lock); | |
1840 | abort_unlocked: | |
1841 | mutex_unlock(&tconn->cstate_mutex); | |
1842 | spin_lock_irq(&tconn->req_lock); | |
1843 | } | |
1844 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) { | |
a01842eb | 1845 | conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv)); |
4ae98b4d PR |
1846 | conn_err(tconn, " mask = 0x%x val = 0x%x\n", mask.i, val.i); |
1847 | conn_err(tconn, " old_conn:%s wanted_conn:%s\n", drbd_conn_str(oc), drbd_conn_str(val.conn)); | |
a01842eb | 1848 | } |
bbeb641c PR |
1849 | return rv; |
1850 | } | |
1851 | ||
1852 | enum drbd_state_rv | |
1853 | conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1854 | enum chg_state_flags flags) | |
1855 | { | |
1856 | enum drbd_state_rv rv; | |
1857 | ||
1858 | spin_lock_irq(&tconn->req_lock); | |
1859 | rv = _conn_request_state(tconn, mask, val, flags); | |
1860 | spin_unlock_irq(&tconn->req_lock); | |
1861 | ||
1862 | return rv; | |
b8907339 | 1863 | } |