]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - drivers/block/drbd/drbd_state.c
drbd: flush drbd work queue before invalidate/invalidate remote
[mirror_ubuntu-zesty-kernel.git] / drivers / block / drbd / drbd_state.c
CommitLineData
b8907339
PR
1/*
2 drbd_state.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
11 from Logicworks, Inc. for making SDP replication support possible.
12
13 drbd is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2, or (at your option)
16 any later version.
17
18 drbd is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with drbd; see the file COPYING. If not, write to
25 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
26 */
27
28#include <linux/drbd_limits.h>
29#include "drbd_int.h"
30#include "drbd_req.h"
31
cdfda633 32/* in drbd_main.c */
71fc7eed 33extern void tl_abort_disk_io(struct drbd_conf *mdev);
cdfda633 34
b8907339
PR
35struct after_state_chg_work {
36 struct drbd_work w;
37 union drbd_state os;
38 union drbd_state ns;
39 enum chg_state_flags flags;
40 struct completion *done;
41};
42
d942ae44
PR
43enum sanitize_state_warnings {
44 NO_WARNING,
45 ABORTED_ONLINE_VERIFY,
46 ABORTED_RESYNC,
47 CONNECTION_LOST_NEGOTIATING,
48 IMPLICITLY_UPGRADED_DISK,
49 IMPLICITLY_UPGRADED_PDSK,
50};
51
99920dc5 52static int w_after_state_ch(struct drbd_work *w, int unused);
b8907339
PR
53static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
54 union drbd_state ns, enum chg_state_flags flags);
a75f34ad 55static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
a1096a6e 56static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *);
3509502d 57static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
4308a0a3 58static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
d942ae44 59 enum sanitize_state_warnings *warn);
b8907339 60
2aebfabb
PR
61static inline bool is_susp(union drbd_state s)
62{
63 return s.susp || s.susp_nod || s.susp_fen;
64}
65
d0456c72 66bool conn_all_vols_unconf(struct drbd_tconn *tconn)
0e29d163
PR
67{
68 struct drbd_conf *mdev;
695d08fa 69 bool rv = true;
e90285e0 70 int vnr;
0e29d163 71
695d08fa 72 rcu_read_lock();
e90285e0 73 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
d0456c72
LE
74 if (mdev->state.disk != D_DISKLESS ||
75 mdev->state.conn != C_STANDALONE ||
695d08fa
PR
76 mdev->state.role != R_SECONDARY) {
77 rv = false;
78 break;
79 }
0e29d163 80 }
695d08fa
PR
81 rcu_read_unlock();
82
83 return rv;
0e29d163
PR
84}
85
cb703454
PR
86/* Unfortunately the states where not correctly ordered, when
87 they where defined. therefore can not use max_t() here. */
88static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
89{
90 if (role1 == R_PRIMARY || role2 == R_PRIMARY)
91 return R_PRIMARY;
92 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
93 return R_SECONDARY;
94 return R_UNKNOWN;
95}
96static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
97{
98 if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
99 return R_UNKNOWN;
100 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
101 return R_SECONDARY;
102 return R_PRIMARY;
103}
104
105enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
106{
107 enum drbd_role role = R_UNKNOWN;
108 struct drbd_conf *mdev;
109 int vnr;
110
695d08fa 111 rcu_read_lock();
cb703454
PR
112 idr_for_each_entry(&tconn->volumes, mdev, vnr)
113 role = max_role(role, mdev->state.role);
695d08fa 114 rcu_read_unlock();
cb703454
PR
115
116 return role;
117}
118
119enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
120{
121 enum drbd_role peer = R_UNKNOWN;
122 struct drbd_conf *mdev;
123 int vnr;
124
695d08fa 125 rcu_read_lock();
cb703454
PR
126 idr_for_each_entry(&tconn->volumes, mdev, vnr)
127 peer = max_role(peer, mdev->state.peer);
695d08fa 128 rcu_read_unlock();
cb703454
PR
129
130 return peer;
131}
132
133enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
134{
135 enum drbd_disk_state ds = D_DISKLESS;
136 struct drbd_conf *mdev;
137 int vnr;
138
695d08fa 139 rcu_read_lock();
cb703454
PR
140 idr_for_each_entry(&tconn->volumes, mdev, vnr)
141 ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
695d08fa 142 rcu_read_unlock();
cb703454
PR
143
144 return ds;
145}
146
4669265a
PR
147enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
148{
149 enum drbd_disk_state ds = D_MASK;
150 struct drbd_conf *mdev;
151 int vnr;
152
695d08fa 153 rcu_read_lock();
4669265a
PR
154 idr_for_each_entry(&tconn->volumes, mdev, vnr)
155 ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
695d08fa 156 rcu_read_unlock();
4669265a
PR
157
158 return ds;
159}
160
cb703454
PR
161enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
162{
163 enum drbd_disk_state ds = D_DISKLESS;
164 struct drbd_conf *mdev;
165 int vnr;
166
695d08fa 167 rcu_read_lock();
cb703454
PR
168 idr_for_each_entry(&tconn->volumes, mdev, vnr)
169 ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
695d08fa 170 rcu_read_unlock();
cb703454
PR
171
172 return ds;
173}
174
19f83c76
PR
175enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
176{
177 enum drbd_conns conn = C_MASK;
178 struct drbd_conf *mdev;
179 int vnr;
180
695d08fa 181 rcu_read_lock();
19f83c76
PR
182 idr_for_each_entry(&tconn->volumes, mdev, vnr)
183 conn = min_t(enum drbd_conns, conn, mdev->state.conn);
695d08fa 184 rcu_read_unlock();
19f83c76
PR
185
186 return conn;
187}
188
b8907339
PR
189/**
190 * cl_wide_st_chg() - true if the state change is a cluster wide one
191 * @mdev: DRBD device.
192 * @os: old (current) state.
193 * @ns: new (wanted) state.
194 */
195static int cl_wide_st_chg(struct drbd_conf *mdev,
196 union drbd_state os, union drbd_state ns)
197{
198 return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
199 ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
200 (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
201 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
e8744f5a 202 (os.disk != D_FAILED && ns.disk == D_FAILED))) ||
b8907339 203 (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
369bea63
PR
204 (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) ||
205 (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS);
b8907339
PR
206}
207
56707f9e
PR
208static union drbd_state
209apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
210{
211 union drbd_state ns;
212 ns.i = (os.i & ~mask.i) | val.i;
213 return ns;
214}
215
b8907339
PR
216enum drbd_state_rv
217drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
218 union drbd_state mask, union drbd_state val)
219{
220 unsigned long flags;
56707f9e 221 union drbd_state ns;
b8907339
PR
222 enum drbd_state_rv rv;
223
224 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 225 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
b8907339 226 rv = _drbd_set_state(mdev, ns, f, NULL);
b8907339
PR
227 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
228
229 return rv;
230}
231
232/**
233 * drbd_force_state() - Impose a change which happens outside our control on our state
234 * @mdev: DRBD device.
235 * @mask: mask of state bits to change.
236 * @val: value of new state bits.
237 */
238void drbd_force_state(struct drbd_conf *mdev,
239 union drbd_state mask, union drbd_state val)
240{
241 drbd_change_state(mdev, CS_HARD, mask, val);
242}
243
244static enum drbd_state_rv
245_req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
246 union drbd_state val)
247{
248 union drbd_state os, ns;
249 unsigned long flags;
250 enum drbd_state_rv rv;
251
252 if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
253 return SS_CW_SUCCESS;
254
255 if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
256 return SS_CW_FAILED_BY_PEER;
257
b8907339 258 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 259 os = drbd_read_state(mdev);
56707f9e 260 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
3509502d
PR
261 rv = is_valid_transition(os, ns);
262 if (rv == SS_SUCCESS)
263 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
b8907339
PR
264
265 if (!cl_wide_st_chg(mdev, os, ns))
266 rv = SS_CW_NO_NEED;
3509502d 267 if (rv == SS_UNKNOWN_ERROR) {
b8907339
PR
268 rv = is_valid_state(mdev, ns);
269 if (rv == SS_SUCCESS) {
a1096a6e 270 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339
PR
271 if (rv == SS_SUCCESS)
272 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
273 }
274 }
275 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
276
277 return rv;
278}
279
280/**
281 * drbd_req_state() - Perform an eventually cluster wide state change
282 * @mdev: DRBD device.
283 * @mask: mask of state bits to change.
284 * @val: value of new state bits.
285 * @f: flags
286 *
287 * Should not be called directly, use drbd_request_state() or
288 * _drbd_request_state().
289 */
290static enum drbd_state_rv
291drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
292 union drbd_state val, enum chg_state_flags f)
293{
294 struct completion done;
295 unsigned long flags;
296 union drbd_state os, ns;
297 enum drbd_state_rv rv;
298
299 init_completion(&done);
300
301 if (f & CS_SERIALIZE)
8410da8f 302 mutex_lock(mdev->state_mutex);
b8907339
PR
303
304 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 305 os = drbd_read_state(mdev);
56707f9e 306 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
3509502d 307 rv = is_valid_transition(os, ns);
3c5e5f6a
LE
308 if (rv < SS_SUCCESS) {
309 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
3509502d 310 goto abort;
3c5e5f6a 311 }
b8907339
PR
312
313 if (cl_wide_st_chg(mdev, os, ns)) {
314 rv = is_valid_state(mdev, ns);
315 if (rv == SS_SUCCESS)
a1096a6e 316 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339
PR
317 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
318
319 if (rv < SS_SUCCESS) {
320 if (f & CS_VERBOSE)
321 print_st_err(mdev, os, ns, rv);
322 goto abort;
323 }
324
d24ae219 325 if (drbd_send_state_req(mdev, mask, val)) {
b8907339
PR
326 rv = SS_CW_FAILED_BY_PEER;
327 if (f & CS_VERBOSE)
328 print_st_err(mdev, os, ns, rv);
329 goto abort;
330 }
331
332 wait_event(mdev->state_wait,
333 (rv = _req_st_cond(mdev, mask, val)));
334
335 if (rv < SS_SUCCESS) {
b8907339
PR
336 if (f & CS_VERBOSE)
337 print_st_err(mdev, os, ns, rv);
338 goto abort;
339 }
340 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 341 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
b8907339 342 rv = _drbd_set_state(mdev, ns, f, &done);
b8907339
PR
343 } else {
344 rv = _drbd_set_state(mdev, ns, f, &done);
345 }
346
347 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
348
349 if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
350 D_ASSERT(current != mdev->tconn->worker.task);
351 wait_for_completion(&done);
352 }
353
354abort:
355 if (f & CS_SERIALIZE)
8410da8f 356 mutex_unlock(mdev->state_mutex);
b8907339
PR
357
358 return rv;
359}
360
361/**
362 * _drbd_request_state() - Request a state change (with flags)
363 * @mdev: DRBD device.
364 * @mask: mask of state bits to change.
365 * @val: value of new state bits.
366 * @f: flags
367 *
368 * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
369 * flag, or when logging of failed state change requests is not desired.
370 */
371enum drbd_state_rv
372_drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
373 union drbd_state val, enum chg_state_flags f)
374{
375 enum drbd_state_rv rv;
376
377 wait_event(mdev->state_wait,
378 (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
379
380 return rv;
381}
382
383static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
384{
385 dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
386 name,
387 drbd_conn_str(ns.conn),
388 drbd_role_str(ns.role),
389 drbd_role_str(ns.peer),
390 drbd_disk_str(ns.disk),
391 drbd_disk_str(ns.pdsk),
392 is_susp(ns) ? 's' : 'r',
393 ns.aftr_isp ? 'a' : '-',
394 ns.peer_isp ? 'p' : '-',
395 ns.user_isp ? 'u' : '-',
396 ns.susp_fen ? 'F' : '-',
397 ns.susp_nod ? 'N' : '-'
398 );
399}
400
401void print_st_err(struct drbd_conf *mdev, union drbd_state os,
402 union drbd_state ns, enum drbd_state_rv err)
403{
404 if (err == SS_IN_TRANSIENT_STATE)
405 return;
406 dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
407 print_st(mdev, " state", os);
408 print_st(mdev, "wanted", ns);
409}
410
435693e8 411static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
bbeb641c
PR
412 enum chg_state_flags flags)
413{
435693e8 414 char *pbp;
bbeb641c
PR
415 pbp = pb;
416 *pbp = 0;
706cb24c 417
435693e8 418 if (ns.role != os.role && flags & CS_DC_ROLE)
bbeb641c
PR
419 pbp += sprintf(pbp, "role( %s -> %s ) ",
420 drbd_role_str(os.role),
421 drbd_role_str(ns.role));
435693e8 422 if (ns.peer != os.peer && flags & CS_DC_PEER)
bbeb641c
PR
423 pbp += sprintf(pbp, "peer( %s -> %s ) ",
424 drbd_role_str(os.peer),
425 drbd_role_str(ns.peer));
435693e8 426 if (ns.conn != os.conn && flags & CS_DC_CONN)
bbeb641c
PR
427 pbp += sprintf(pbp, "conn( %s -> %s ) ",
428 drbd_conn_str(os.conn),
429 drbd_conn_str(ns.conn));
435693e8 430 if (ns.disk != os.disk && flags & CS_DC_DISK)
bbeb641c
PR
431 pbp += sprintf(pbp, "disk( %s -> %s ) ",
432 drbd_disk_str(os.disk),
433 drbd_disk_str(ns.disk));
435693e8 434 if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
bbeb641c
PR
435 pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
436 drbd_disk_str(os.pdsk),
437 drbd_disk_str(ns.pdsk));
706cb24c
PR
438
439 return pbp - pb;
440}
441
442static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
443 enum chg_state_flags flags)
444{
445 char pb[300];
446 char *pbp = pb;
447
448 pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
449
bbeb641c
PR
450 if (ns.aftr_isp != os.aftr_isp)
451 pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
452 os.aftr_isp,
453 ns.aftr_isp);
454 if (ns.peer_isp != os.peer_isp)
455 pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
456 os.peer_isp,
457 ns.peer_isp);
458 if (ns.user_isp != os.user_isp)
459 pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
460 os.user_isp,
461 ns.user_isp);
435693e8 462
706cb24c 463 if (pbp != pb)
bbeb641c
PR
464 dev_info(DEV, "%s\n", pb);
465}
b8907339 466
435693e8
PR
467static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
468 enum chg_state_flags flags)
469{
470 char pb[300];
706cb24c
PR
471 char *pbp = pb;
472
473 pbp += print_state_change(pbp, os, ns, flags);
435693e8 474
706cb24c
PR
475 if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
476 pbp += sprintf(pbp, "susp( %d -> %d ) ",
477 is_susp(os),
478 is_susp(ns));
479
480 if (pbp != pb)
435693e8
PR
481 conn_info(tconn, "%s\n", pb);
482}
483
484
b8907339
PR
485/**
486 * is_valid_state() - Returns an SS_ error code if ns is not valid
487 * @mdev: DRBD device.
488 * @ns: State to consider.
489 */
490static enum drbd_state_rv
491is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
492{
493 /* See drbd_state_sw_errors in drbd_strings.c */
494
495 enum drbd_fencing_p fp;
496 enum drbd_state_rv rv = SS_SUCCESS;
44ed167d 497 struct net_conf *nc;
b8907339 498
daeda1cc 499 rcu_read_lock();
b8907339
PR
500 fp = FP_DONT_CARE;
501 if (get_ldev(mdev)) {
daeda1cc 502 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
b8907339
PR
503 put_ldev(mdev);
504 }
505
44ed167d
PR
506 nc = rcu_dereference(mdev->tconn->net_conf);
507 if (nc) {
508 if (!nc->two_primaries && ns.role == R_PRIMARY) {
047e95e2
PR
509 if (ns.peer == R_PRIMARY)
510 rv = SS_TWO_PRIMARIES;
cb703454 511 else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
047e95e2 512 rv = SS_O_VOL_PEER_PRI;
44ed167d 513 }
b8907339
PR
514 }
515
516 if (rv <= 0)
517 /* already found a reason to abort */;
518 else if (ns.role == R_SECONDARY && mdev->open_cnt)
519 rv = SS_DEVICE_IN_USE;
520
521 else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
522 rv = SS_NO_UP_TO_DATE_DISK;
523
524 else if (fp >= FP_RESOURCE &&
525 ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
526 rv = SS_PRIMARY_NOP;
527
528 else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
529 rv = SS_NO_UP_TO_DATE_DISK;
530
531 else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
532 rv = SS_NO_LOCAL_DISK;
533
534 else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
535 rv = SS_NO_REMOTE_DISK;
536
537 else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
538 rv = SS_NO_UP_TO_DATE_DISK;
539
540 else if ((ns.conn == C_CONNECTED ||
541 ns.conn == C_WF_BITMAP_S ||
542 ns.conn == C_SYNC_SOURCE ||
543 ns.conn == C_PAUSED_SYNC_S) &&
544 ns.disk == D_OUTDATED)
545 rv = SS_CONNECTED_OUTDATES;
546
547 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
44ed167d 548 (nc->verify_alg[0] == 0))
b8907339
PR
549 rv = SS_NO_VERIFY_ALG;
550
551 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
552 mdev->tconn->agreed_pro_version < 88)
553 rv = SS_NOT_SUPPORTED;
554
555 else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
556 rv = SS_CONNECTED_OUTDATES;
557
44ed167d
PR
558 rcu_read_unlock();
559
b8907339
PR
560 return rv;
561}
562
563/**
a75f34ad 564 * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
3509502d
PR
565 * This function limits state transitions that may be declined by DRBD. I.e.
566 * user requests (aka soft transitions).
b8907339
PR
567 * @mdev: DRBD device.
568 * @ns: new state.
569 * @os: old state.
570 */
571static enum drbd_state_rv
a1096a6e 572is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn)
b8907339
PR
573{
574 enum drbd_state_rv rv = SS_SUCCESS;
575
576 if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
577 os.conn > C_CONNECTED)
578 rv = SS_RESYNC_RUNNING;
579
580 if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
581 rv = SS_ALREADY_STANDALONE;
582
583 if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
584 rv = SS_IS_DISKLESS;
585
586 if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
587 rv = SS_NO_NET_CONFIG;
588
589 if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
590 rv = SS_LOWER_THAN_OUTDATED;
591
592 if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
593 rv = SS_IN_TRANSIENT_STATE;
594
2325eb66
PR
595 /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
596 rv = SS_IN_TRANSIENT_STATE; */
b8907339 597
a1096a6e
PR
598 /* While establishing a connection only allow cstate to change.
599 Delay/refuse role changes, detach attach etc... */
600 if (test_bit(STATE_SENT, &tconn->flags) &&
601 !(os.conn == C_WF_REPORT_PARAMS ||
602 (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION)))
603 rv = SS_IN_TRANSIENT_STATE;
604
b8907339
PR
605 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
606 rv = SS_NEED_CONNECTION;
607
608 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
609 ns.conn != os.conn && os.conn > C_CONNECTED)
610 rv = SS_RESYNC_RUNNING;
611
612 if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
613 os.conn < C_CONNECTED)
614 rv = SS_NEED_CONNECTION;
615
616 if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
617 && os.conn < C_WF_REPORT_PARAMS)
618 rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
619
620 return rv;
621}
622
3509502d 623static enum drbd_state_rv
fda74117 624is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
3509502d 625{
d9cc6e23
LE
626 /* no change -> nothing to do, at least for the connection part */
627 if (oc == nc)
628 return SS_NOTHING_TO_DO;
3509502d 629
d9cc6e23
LE
630 /* disconnect of an unconfigured connection does not make sense */
631 if (oc == C_STANDALONE && nc == C_DISCONNECTING)
632 return SS_ALREADY_STANDALONE;
633
634 /* from C_STANDALONE, we start with C_UNCONNECTED */
635 if (oc == C_STANDALONE && nc != C_UNCONNECTED)
636 return SS_NEED_CONNECTION;
3509502d 637
25b0d6c8
PR
638 /* When establishing a connection we need to go through WF_REPORT_PARAMS!
639 Necessary to do the right thing upon invalidate-remote on a disconnected resource */
640 if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED)
641 return SS_NEED_CONNECTION;
642
3509502d 643 /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
fda74117 644 if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
d9cc6e23 645 return SS_IN_TRANSIENT_STATE;
3509502d
PR
646
647 /* After C_DISCONNECTING only C_STANDALONE may follow */
fda74117 648 if (oc == C_DISCONNECTING && nc != C_STANDALONE)
d9cc6e23 649 return SS_IN_TRANSIENT_STATE;
3509502d 650
d9cc6e23 651 return SS_SUCCESS;
fda74117
PR
652}
653
654
655/**
656 * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
657 * This limits hard state transitions. Hard state transitions are facts there are
658 * imposed on DRBD by the environment. E.g. disk broke or network broke down.
659 * But those hard state transitions are still not allowed to do everything.
660 * @ns: new state.
661 * @os: old state.
662 */
663static enum drbd_state_rv
664is_valid_transition(union drbd_state os, union drbd_state ns)
665{
666 enum drbd_state_rv rv;
667
668 rv = is_valid_conn_transition(os.conn, ns.conn);
669
3509502d
PR
670 /* we cannot fail (again) if we already detached */
671 if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
672 rv = SS_IS_DISKLESS;
673
674 return rv;
675}
676
d942ae44
PR
677static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
678{
679 static const char *msg_table[] = {
680 [NO_WARNING] = "",
681 [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
682 [ABORTED_RESYNC] = "Resync aborted.",
683 [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
684 [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
685 [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
686 };
687
688 if (warn != NO_WARNING)
689 dev_warn(DEV, "%s\n", msg_table[warn]);
690}
691
b8907339
PR
692/**
693 * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
694 * @mdev: DRBD device.
695 * @os: old state.
696 * @ns: new state.
697 * @warn_sync_abort:
698 *
699 * When we loose connection, we have to set the state of the peers disk (pdsk)
700 * to D_UNKNOWN. This rule and many more along those lines are in this function.
701 */
4308a0a3 702static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
d942ae44 703 enum sanitize_state_warnings *warn)
b8907339
PR
704{
705 enum drbd_fencing_p fp;
706 enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
707
d942ae44
PR
708 if (warn)
709 *warn = NO_WARNING;
710
b8907339
PR
711 fp = FP_DONT_CARE;
712 if (get_ldev(mdev)) {
daeda1cc
PR
713 rcu_read_lock();
714 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
715 rcu_read_unlock();
b8907339
PR
716 put_ldev(mdev);
717 }
718
3509502d 719 /* Implications from connection to peer and peer_isp */
b8907339
PR
720 if (ns.conn < C_CONNECTED) {
721 ns.peer_isp = 0;
722 ns.peer = R_UNKNOWN;
723 if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
724 ns.pdsk = D_UNKNOWN;
725 }
726
727 /* Clear the aftr_isp when becoming unconfigured */
728 if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
729 ns.aftr_isp = 0;
730
4308a0a3 731 /* An implication of the disk states onto the connection state */
b8907339 732 /* Abort resync if a disk fails/detaches */
4308a0a3 733 if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
d942ae44
PR
734 if (warn)
735 *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
736 ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
b8907339
PR
737 ns.conn = C_CONNECTED;
738 }
739
740 /* Connection breaks down before we finished "Negotiating" */
741 if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
742 get_ldev_if_state(mdev, D_NEGOTIATING)) {
743 if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
744 ns.disk = mdev->new_state_tmp.disk;
745 ns.pdsk = mdev->new_state_tmp.pdsk;
746 } else {
d942ae44
PR
747 if (warn)
748 *warn = CONNECTION_LOST_NEGOTIATING;
b8907339
PR
749 ns.disk = D_DISKLESS;
750 ns.pdsk = D_UNKNOWN;
751 }
752 put_ldev(mdev);
753 }
754
755 /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
756 if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
757 if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
758 ns.disk = D_UP_TO_DATE;
759 if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
760 ns.pdsk = D_UP_TO_DATE;
761 }
762
763 /* Implications of the connection stat on the disk states */
764 disk_min = D_DISKLESS;
765 disk_max = D_UP_TO_DATE;
766 pdsk_min = D_INCONSISTENT;
767 pdsk_max = D_UNKNOWN;
768 switch ((enum drbd_conns)ns.conn) {
769 case C_WF_BITMAP_T:
770 case C_PAUSED_SYNC_T:
771 case C_STARTING_SYNC_T:
772 case C_WF_SYNC_UUID:
773 case C_BEHIND:
774 disk_min = D_INCONSISTENT;
775 disk_max = D_OUTDATED;
776 pdsk_min = D_UP_TO_DATE;
777 pdsk_max = D_UP_TO_DATE;
778 break;
779 case C_VERIFY_S:
780 case C_VERIFY_T:
781 disk_min = D_UP_TO_DATE;
782 disk_max = D_UP_TO_DATE;
783 pdsk_min = D_UP_TO_DATE;
784 pdsk_max = D_UP_TO_DATE;
785 break;
786 case C_CONNECTED:
787 disk_min = D_DISKLESS;
788 disk_max = D_UP_TO_DATE;
789 pdsk_min = D_DISKLESS;
790 pdsk_max = D_UP_TO_DATE;
791 break;
792 case C_WF_BITMAP_S:
793 case C_PAUSED_SYNC_S:
794 case C_STARTING_SYNC_S:
795 case C_AHEAD:
796 disk_min = D_UP_TO_DATE;
797 disk_max = D_UP_TO_DATE;
798 pdsk_min = D_INCONSISTENT;
799 pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
800 break;
801 case C_SYNC_TARGET:
802 disk_min = D_INCONSISTENT;
803 disk_max = D_INCONSISTENT;
804 pdsk_min = D_UP_TO_DATE;
805 pdsk_max = D_UP_TO_DATE;
806 break;
807 case C_SYNC_SOURCE:
808 disk_min = D_UP_TO_DATE;
809 disk_max = D_UP_TO_DATE;
810 pdsk_min = D_INCONSISTENT;
811 pdsk_max = D_INCONSISTENT;
812 break;
813 case C_STANDALONE:
814 case C_DISCONNECTING:
815 case C_UNCONNECTED:
816 case C_TIMEOUT:
817 case C_BROKEN_PIPE:
818 case C_NETWORK_FAILURE:
819 case C_PROTOCOL_ERROR:
820 case C_TEAR_DOWN:
821 case C_WF_CONNECTION:
822 case C_WF_REPORT_PARAMS:
823 case C_MASK:
824 break;
825 }
826 if (ns.disk > disk_max)
827 ns.disk = disk_max;
828
829 if (ns.disk < disk_min) {
d942ae44
PR
830 if (warn)
831 *warn = IMPLICITLY_UPGRADED_DISK;
b8907339
PR
832 ns.disk = disk_min;
833 }
834 if (ns.pdsk > pdsk_max)
835 ns.pdsk = pdsk_max;
836
837 if (ns.pdsk < pdsk_min) {
d942ae44
PR
838 if (warn)
839 *warn = IMPLICITLY_UPGRADED_PDSK;
b8907339
PR
840 ns.pdsk = pdsk_min;
841 }
842
843 if (fp == FP_STONITH &&
4308a0a3 844 (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
b8907339
PR
845 ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
846
f399002e 847 if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
4308a0a3 848 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
b8907339
PR
849 ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
850
851 if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
852 if (ns.conn == C_SYNC_SOURCE)
853 ns.conn = C_PAUSED_SYNC_S;
854 if (ns.conn == C_SYNC_TARGET)
855 ns.conn = C_PAUSED_SYNC_T;
856 } else {
857 if (ns.conn == C_PAUSED_SYNC_S)
858 ns.conn = C_SYNC_SOURCE;
859 if (ns.conn == C_PAUSED_SYNC_T)
860 ns.conn = C_SYNC_TARGET;
861 }
862
863 return ns;
864}
865
866void drbd_resume_al(struct drbd_conf *mdev)
867{
868 if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
869 dev_info(DEV, "Resumed AL updates\n");
870}
871
872/* helper for __drbd_set_state */
873static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
874{
875 if (mdev->tconn->agreed_pro_version < 90)
876 mdev->ov_start_sector = 0;
877 mdev->rs_total = drbd_bm_bits(mdev);
878 mdev->ov_position = 0;
879 if (cs == C_VERIFY_T) {
880 /* starting online verify from an arbitrary position
881 * does not fit well into the existing protocol.
882 * on C_VERIFY_T, we initialize ov_left and friends
883 * implicitly in receive_DataRequest once the
884 * first P_OV_REQUEST is received */
885 mdev->ov_start_sector = ~(sector_t)0;
886 } else {
887 unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
888 if (bit >= mdev->rs_total) {
889 mdev->ov_start_sector =
890 BM_BIT_TO_SECT(mdev->rs_total - 1);
891 mdev->rs_total = 1;
892 } else
893 mdev->rs_total -= bit;
894 mdev->ov_position = mdev->ov_start_sector;
895 }
896 mdev->ov_left = mdev->rs_total;
897}
898
899/**
900 * __drbd_set_state() - Set a new DRBD state
901 * @mdev: DRBD device.
902 * @ns: new state.
903 * @flags: Flags
904 * @done: Optional completion, that will get completed after the after_state_ch() finished
905 *
906 * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
907 */
908enum drbd_state_rv
909__drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
910 enum chg_state_flags flags, struct completion *done)
911{
912 union drbd_state os;
913 enum drbd_state_rv rv = SS_SUCCESS;
d942ae44 914 enum sanitize_state_warnings ssw;
b8907339
PR
915 struct after_state_chg_work *ascw;
916
78bae59b 917 os = drbd_read_state(mdev);
b8907339 918
d942ae44 919 ns = sanitize_state(mdev, ns, &ssw);
b8907339
PR
920 if (ns.i == os.i)
921 return SS_NOTHING_TO_DO;
922
3509502d
PR
923 rv = is_valid_transition(os, ns);
924 if (rv < SS_SUCCESS)
925 return rv;
926
b8907339
PR
927 if (!(flags & CS_HARD)) {
928 /* pre-state-change checks ; only look at ns */
929 /* See drbd_state_sw_errors in drbd_strings.c */
930
931 rv = is_valid_state(mdev, ns);
932 if (rv < SS_SUCCESS) {
933 /* If the old state was illegal as well, then let
934 this happen...*/
935
936 if (is_valid_state(mdev, os) == rv)
a1096a6e 937 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339 938 } else
a1096a6e 939 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339
PR
940 }
941
942 if (rv < SS_SUCCESS) {
943 if (flags & CS_VERBOSE)
944 print_st_err(mdev, os, ns, rv);
945 return rv;
946 }
947
d942ae44 948 print_sanitize_warnings(mdev, ssw);
b8907339 949
435693e8 950 drbd_pr_state_change(mdev, os, ns, flags);
b8907339 951
706cb24c
PR
952 /* Display changes to the susp* flags that where caused by the call to
953 sanitize_state(). Only display it here if we where not called from
954 _conn_request_state() */
955 if (!(flags & CS_DC_SUSP))
956 conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
957
b8907339
PR
958 /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
959 * on the ldev here, to be sure the transition -> D_DISKLESS resp.
960 * drbd_ldev_destroy() won't happen before our corresponding
961 * after_state_ch works run, where we put_ldev again. */
962 if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
963 (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
964 atomic_inc(&mdev->local_cnt);
965
da9fbc27 966 mdev->state.i = ns.i;
8e0af25f
PR
967 mdev->tconn->susp = ns.susp;
968 mdev->tconn->susp_nod = ns.susp_nod;
969 mdev->tconn->susp_fen = ns.susp_fen;
b8907339
PR
970
971 if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
972 drbd_print_uuids(mdev, "attached to UUIDs");
973
974 wake_up(&mdev->misc_wait);
975 wake_up(&mdev->state_wait);
2a67d8b9 976 wake_up(&mdev->tconn->ping_wait);
b8907339
PR
977
978 /* aborted verify run. log the last position */
979 if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
980 ns.conn < C_CONNECTED) {
981 mdev->ov_start_sector =
982 BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
983 dev_info(DEV, "Online Verify reached sector %llu\n",
984 (unsigned long long)mdev->ov_start_sector);
985 }
986
987 if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
988 (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
989 dev_info(DEV, "Syncer continues.\n");
990 mdev->rs_paused += (long)jiffies
991 -(long)mdev->rs_mark_time[mdev->rs_last_mark];
992 if (ns.conn == C_SYNC_TARGET)
993 mod_timer(&mdev->resync_timer, jiffies);
994 }
995
996 if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
997 (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
998 dev_info(DEV, "Resync suspended\n");
999 mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
1000 }
1001
1002 if (os.conn == C_CONNECTED &&
1003 (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
1004 unsigned long now = jiffies;
1005 int i;
1006
1007 set_ov_position(mdev, ns.conn);
1008 mdev->rs_start = now;
1009 mdev->rs_last_events = 0;
1010 mdev->rs_last_sect_ev = 0;
1011 mdev->ov_last_oos_size = 0;
1012 mdev->ov_last_oos_start = 0;
1013
1014 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
1015 mdev->rs_mark_left[i] = mdev->ov_left;
1016 mdev->rs_mark_time[i] = now;
1017 }
1018
1019 drbd_rs_controller_reset(mdev);
1020
1021 if (ns.conn == C_VERIFY_S) {
1022 dev_info(DEV, "Starting Online Verify from sector %llu\n",
1023 (unsigned long long)mdev->ov_position);
1024 mod_timer(&mdev->resync_timer, jiffies);
1025 }
1026 }
1027
1028 if (get_ldev(mdev)) {
1029 u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
1030 MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
1031 MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
1032
d5d7ebd4 1033 mdf &= ~MDF_AL_CLEAN;
b8907339
PR
1034 if (test_bit(CRASHED_PRIMARY, &mdev->flags))
1035 mdf |= MDF_CRASHED_PRIMARY;
1036 if (mdev->state.role == R_PRIMARY ||
1037 (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
1038 mdf |= MDF_PRIMARY_IND;
1039 if (mdev->state.conn > C_WF_REPORT_PARAMS)
1040 mdf |= MDF_CONNECTED_IND;
1041 if (mdev->state.disk > D_INCONSISTENT)
1042 mdf |= MDF_CONSISTENT;
1043 if (mdev->state.disk > D_OUTDATED)
1044 mdf |= MDF_WAS_UP_TO_DATE;
1045 if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
1046 mdf |= MDF_PEER_OUT_DATED;
1047 if (mdf != mdev->ldev->md.flags) {
1048 mdev->ldev->md.flags = mdf;
1049 drbd_md_mark_dirty(mdev);
1050 }
1051 if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
1052 drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
1053 put_ldev(mdev);
1054 }
1055
1056 /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
1057 if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
1058 os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
1059 set_bit(CONSIDER_RESYNC, &mdev->flags);
1060
1061 /* Receiver should clean up itself */
1062 if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
1063 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1064
1065 /* Now the receiver finished cleaning up itself, it should die */
1066 if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
1067 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1068
1069 /* Upon network failure, we need to restart the receiver. */
823bd832 1070 if (os.conn > C_WF_CONNECTION &&
b8907339
PR
1071 ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
1072 drbd_thread_restart_nowait(&mdev->tconn->receiver);
1073
1074 /* Resume AL writing if we get a connection */
1075 if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED)
1076 drbd_resume_al(mdev);
1077
07be15b1
LE
1078 /* remember last attach time so request_timer_fn() won't
1079 * kill newly established sessions while we are still trying to thaw
1080 * previously frozen IO */
1081 if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
1082 ns.disk > D_NEGOTIATING)
1083 mdev->last_reattach_jif = jiffies;
1084
b8907339
PR
1085 ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
1086 if (ascw) {
1087 ascw->os = os;
1088 ascw->ns = ns;
1089 ascw->flags = flags;
1090 ascw->w.cb = w_after_state_ch;
a21e9298 1091 ascw->w.mdev = mdev;
b8907339 1092 ascw->done = done;
d5b27b01 1093 drbd_queue_work(&mdev->tconn->sender_work, &ascw->w);
b8907339 1094 } else {
bbeb641c 1095 dev_err(DEV, "Could not kmalloc an ascw\n");
b8907339
PR
1096 }
1097
1098 return rv;
1099}
1100
99920dc5 1101static int w_after_state_ch(struct drbd_work *w, int unused)
b8907339
PR
1102{
1103 struct after_state_chg_work *ascw =
1104 container_of(w, struct after_state_chg_work, w);
00d56944 1105 struct drbd_conf *mdev = w->mdev;
b8907339
PR
1106
1107 after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
1108 if (ascw->flags & CS_WAIT_COMPLETE) {
1109 D_ASSERT(ascw->done != NULL);
1110 complete(ascw->done);
1111 }
1112 kfree(ascw);
1113
99920dc5 1114 return 0;
b8907339
PR
1115}
1116
1117static void abw_start_sync(struct drbd_conf *mdev, int rv)
1118{
1119 if (rv) {
1120 dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
1121 _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
1122 return;
1123 }
1124
1125 switch (mdev->state.conn) {
1126 case C_STARTING_SYNC_T:
1127 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
1128 break;
1129 case C_STARTING_SYNC_S:
1130 drbd_start_resync(mdev, C_SYNC_SOURCE);
1131 break;
1132 }
1133}
1134
1135int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
1136 int (*io_fn)(struct drbd_conf *),
1137 char *why, enum bm_flag flags)
1138{
1139 int rv;
1140
1141 D_ASSERT(current == mdev->tconn->worker.task);
1142
1143 /* open coded non-blocking drbd_suspend_io(mdev); */
1144 set_bit(SUSPEND_IO, &mdev->flags);
1145
1146 drbd_bm_lock(mdev, why, flags);
1147 rv = io_fn(mdev);
1148 drbd_bm_unlock(mdev);
1149
1150 drbd_resume_io(mdev);
1151
1152 return rv;
1153}
1154
1155/**
1156 * after_state_ch() - Perform after state change actions that may sleep
1157 * @mdev: DRBD device.
1158 * @os: old state.
1159 * @ns: new state.
1160 * @flags: Flags
1161 */
1162static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
1163 union drbd_state ns, enum chg_state_flags flags)
1164{
3b98c0c2
LE
1165 struct sib_info sib;
1166
1167 sib.sib_reason = SIB_STATE_CHANGE;
1168 sib.os = os;
1169 sib.ns = ns;
b8907339
PR
1170
1171 if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
1172 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1173 if (mdev->p_uuid)
1174 mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
1175 }
1176
b8907339 1177 /* Inform userspace about the change... */
3b98c0c2 1178 drbd_bcast_event(mdev, &sib);
b8907339
PR
1179
1180 if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
1181 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
1182 drbd_khelper(mdev, "pri-on-incon-degr");
1183
1184 /* Here we have the actions that are performed after a
1185 state change. This function might sleep */
1186
b8907339 1187 if (ns.susp_nod) {
a6d00c8e
PR
1188 enum drbd_req_event what = NOTHING;
1189
1190 if (os.conn < C_CONNECTED && conn_lowest_conn(mdev->tconn) >= C_CONNECTED)
b8907339
PR
1191 what = RESEND;
1192
3fb4746d
PR
1193 if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
1194 conn_lowest_disk(mdev->tconn) > D_NEGOTIATING)
b8907339
PR
1195 what = RESTART_FROZEN_DISK_IO;
1196
a6d00c8e 1197 if (what != NOTHING) {
b8907339 1198 spin_lock_irq(&mdev->tconn->req_lock);
a6d00c8e
PR
1199 _tl_restart(mdev->tconn, what);
1200 _drbd_set_state(_NS(mdev, susp_nod, 0), CS_VERBOSE, NULL);
b8907339
PR
1201 spin_unlock_irq(&mdev->tconn->req_lock);
1202 }
b8907339
PR
1203 }
1204
1205 /* Became sync source. With protocol >= 96, we still need to send out
1206 * the sync uuid now. Need to do that before any drbd_send_state, or
1207 * the other side may go "paused sync" before receiving the sync uuids,
1208 * which is unexpected. */
1209 if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
1210 (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
1211 mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
1212 drbd_gen_and_send_sync_uuid(mdev);
1213 put_ldev(mdev);
1214 }
1215
1216 /* Do not change the order of the if above and the two below... */
369bea63
PR
1217 if (os.pdsk == D_DISKLESS &&
1218 ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */
a324896b
LE
1219 /* we probably will start a resync soon.
1220 * make sure those things are properly reset. */
1221 mdev->rs_total = 0;
1222 mdev->rs_failed = 0;
1223 atomic_set(&mdev->rs_pending_cnt, 0);
1224 drbd_rs_cancel_all(mdev);
1225
b8907339 1226 drbd_send_uuids(mdev);
43de7c85 1227 drbd_send_state(mdev, ns);
b8907339
PR
1228 }
1229 /* No point in queuing send_bitmap if we don't have a connection
1230 * anymore, so check also the _current_ state, not only the new state
1231 * at the time this work was queued. */
1232 if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
1233 mdev->state.conn == C_WF_BITMAP_S)
1234 drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
1235 "send_bitmap (WFBitMapS)",
1236 BM_LOCKED_TEST_ALLOWED);
1237
1238 /* Lost contact to peer's copy of the data */
1239 if ((os.pdsk >= D_INCONSISTENT &&
1240 os.pdsk != D_UNKNOWN &&
1241 os.pdsk != D_OUTDATED)
1242 && (ns.pdsk < D_INCONSISTENT ||
1243 ns.pdsk == D_UNKNOWN ||
1244 ns.pdsk == D_OUTDATED)) {
1245 if (get_ldev(mdev)) {
1246 if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
1247 mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
2aebfabb 1248 if (drbd_suspended(mdev)) {
b8907339
PR
1249 set_bit(NEW_CUR_UUID, &mdev->flags);
1250 } else {
1251 drbd_uuid_new_current(mdev);
1252 drbd_send_uuids(mdev);
1253 }
1254 }
1255 put_ldev(mdev);
1256 }
1257 }
1258
1259 if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
0cfac5dd
PR
1260 if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY &&
1261 mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
1262 drbd_uuid_new_current(mdev);
1263 drbd_send_uuids(mdev);
1264 }
b8907339
PR
1265 /* D_DISKLESS Peer becomes secondary */
1266 if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
1267 /* We may still be Primary ourselves.
1268 * No harm done if the bitmap still changes,
1269 * redirtied pages will follow later. */
1270 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1271 "demote diskless peer", BM_LOCKED_SET_ALLOWED);
1272 put_ldev(mdev);
1273 }
1274
1275 /* Write out all changed bits on demote.
1276 * Though, no need to da that just yet
1277 * if there is a resync going on still */
1278 if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
1279 mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
1280 /* No changes to the bitmap expected this time, so assert that,
1281 * even though no harm was done if it did change. */
1282 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1283 "demote", BM_LOCKED_TEST_ALLOWED);
1284 put_ldev(mdev);
1285 }
1286
1287 /* Last part of the attaching process ... */
1288 if (ns.conn >= C_CONNECTED &&
1289 os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
1290 drbd_send_sizes(mdev, 0, 0); /* to start sync... */
1291 drbd_send_uuids(mdev);
43de7c85 1292 drbd_send_state(mdev, ns);
b8907339
PR
1293 }
1294
1295 /* We want to pause/continue resync, tell peer. */
1296 if (ns.conn >= C_CONNECTED &&
1297 ((os.aftr_isp != ns.aftr_isp) ||
1298 (os.user_isp != ns.user_isp)))
43de7c85 1299 drbd_send_state(mdev, ns);
b8907339
PR
1300
1301 /* In case one of the isp bits got set, suspend other devices. */
1302 if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
1303 (ns.aftr_isp || ns.peer_isp || ns.user_isp))
1304 suspend_other_sg(mdev);
1305
1306 /* Make sure the peer gets informed about eventual state
1307 changes (ISP bits) while we were in WFReportParams. */
1308 if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
43de7c85 1309 drbd_send_state(mdev, ns);
b8907339
PR
1310
1311 if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
43de7c85 1312 drbd_send_state(mdev, ns);
b8907339
PR
1313
1314 /* We are in the progress to start a full sync... */
1315 if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
1316 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
1317 /* no other bitmap changes expected during this phase */
1318 drbd_queue_bitmap_io(mdev,
1319 &drbd_bmio_set_n_write, &abw_start_sync,
1320 "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
1321
1322 /* We are invalidating our self... */
1323 if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED &&
1324 os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT)
1325 /* other bitmap operation expected during this phase */
1326 drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL,
1327 "set_n_write from invalidate", BM_LOCKED_MASK);
1328
1329 /* first half of local IO error, failure to attach,
1330 * or administrative detach */
1331 if (os.disk != D_FAILED && ns.disk == D_FAILED) {
32db80f6
PR
1332 enum drbd_io_error_p eh = EP_PASS_ON;
1333 int was_io_error = 0;
b8907339 1334 /* corresponding get_ldev was in __drbd_set_state, to serialize
32db80f6
PR
1335 * our cleanup here with the transition to D_DISKLESS.
1336 * But is is still not save to dreference ldev here, since
1337 * we might come from an failed Attach before ldev was set. */
1338 if (mdev->ldev) {
1339 rcu_read_lock();
1340 eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
1341 rcu_read_unlock();
1342
1343 was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
1344
6f1a6563
LE
1345 if (was_io_error && eh == EP_CALL_HELPER)
1346 drbd_khelper(mdev, "local-io-error");
1347
0c849666
LE
1348 /* Immediately allow completion of all application IO,
1349 * that waits for completion from the local disk,
1350 * if this was a force-detach due to disk_timeout
1351 * or administrator request (drbdsetup detach --force).
1352 * Do NOT abort otherwise.
1353 * Aborting local requests may cause serious problems,
1354 * if requests are completed to upper layers already,
1355 * and then later the already submitted local bio completes.
1356 * This can cause DMA into former bio pages that meanwhile
1357 * have been re-used for other things.
1358 * So aborting local requests may cause crashes,
1359 * or even worse, silent data corruption.
1360 */
1361 if (test_and_clear_bit(FORCE_DETACH, &mdev->flags))
1362 tl_abort_disk_io(mdev);
32db80f6
PR
1363
1364 /* current state still has to be D_FAILED,
1365 * there is only one way out: to D_DISKLESS,
1366 * and that may only happen after our put_ldev below. */
1367 if (mdev->state.disk != D_FAILED)
1368 dev_err(DEV,
1369 "ASSERT FAILED: disk is %s during detach\n",
1370 drbd_disk_str(mdev->state.disk));
1371
1372 if (ns.conn >= C_CONNECTED)
1373 drbd_send_state(mdev, ns);
1374
1375 drbd_rs_cancel_all(mdev);
1376
1377 /* In case we want to get something to stable storage still,
1378 * this may be the last chance.
1379 * Following put_ldev may transition to D_DISKLESS. */
1380 drbd_md_sync(mdev);
1381 }
b8907339 1382 put_ldev(mdev);
b8907339
PR
1383 }
1384
1385 /* second half of local IO error, failure to attach,
1386 * or administrative detach,
1387 * after local_cnt references have reached zero again */
1388 if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
1389 /* We must still be diskless,
1390 * re-attach has to be serialized with this! */
1391 if (mdev->state.disk != D_DISKLESS)
1392 dev_err(DEV,
1393 "ASSERT FAILED: disk is %s while going diskless\n",
1394 drbd_disk_str(mdev->state.disk));
1395
6ab9b1b6
PR
1396 if (ns.conn >= C_CONNECTED)
1397 drbd_send_state(mdev, ns);
b8907339
PR
1398 /* corresponding get_ldev in __drbd_set_state
1399 * this may finally trigger drbd_ldev_destroy. */
1400 put_ldev(mdev);
1401 }
1402
1403 /* Notify peer that I had a local IO error, and did not detached.. */
6ab9b1b6 1404 if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED)
43de7c85 1405 drbd_send_state(mdev, ns);
b8907339
PR
1406
1407 /* Disks got bigger while they were detached */
1408 if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
1409 test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
1410 if (ns.conn == C_CONNECTED)
1411 resync_after_online_grow(mdev);
1412 }
1413
1414 /* A resync finished or aborted, wake paused devices... */
1415 if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
1416 (os.peer_isp && !ns.peer_isp) ||
1417 (os.user_isp && !ns.user_isp))
1418 resume_next_sg(mdev);
1419
1420 /* sync target done with resync. Explicitly notify peer, even though
1421 * it should (at least for non-empty resyncs) already know itself. */
1422 if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
43de7c85 1423 drbd_send_state(mdev, ns);
b8907339 1424
a1096a6e
PR
1425 /* Wake up role changes, that were delayed because of connection establishing */
1426 if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS) {
1427 if (test_and_clear_bit(STATE_SENT, &mdev->tconn->flags))
1428 wake_up(&mdev->state_wait);
1429 }
1430
b8907339
PR
1431 /* This triggers bitmap writeout of potentially still unwritten pages
1432 * if the resync finished cleanly, or aborted because of peer disk
1433 * failure, or because of connection loss.
1434 * For resync aborted because of local disk failure, we cannot do
1435 * any bitmap writeout anymore.
1436 * No harm done if some bits change during this phase.
1437 */
1438 if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
a220d291
LE
1439 drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL,
1440 "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED);
b8907339
PR
1441 put_ldev(mdev);
1442 }
1443
1444 if (ns.disk == D_DISKLESS &&
1445 ns.conn == C_STANDALONE &&
1446 ns.role == R_SECONDARY) {
1447 if (os.aftr_isp != ns.aftr_isp)
1448 resume_next_sg(mdev);
1449 }
1450
b8907339
PR
1451 drbd_md_sync(mdev);
1452}
1453
bbeb641c
PR
1454struct after_conn_state_chg_work {
1455 struct drbd_work w;
1456 enum drbd_conns oc;
8c7e16c3 1457 union drbd_state ns_min;
5f082f98 1458 union drbd_state ns_max; /* new, max state, over all mdevs */
bbeb641c
PR
1459 enum chg_state_flags flags;
1460};
1461
99920dc5 1462static int w_after_conn_state_ch(struct drbd_work *w, int unused)
bbeb641c
PR
1463{
1464 struct after_conn_state_chg_work *acscw =
1465 container_of(w, struct after_conn_state_chg_work, w);
1466 struct drbd_tconn *tconn = w->tconn;
1467 enum drbd_conns oc = acscw->oc;
5f082f98 1468 union drbd_state ns_max = acscw->ns_max;
a6d00c8e
PR
1469 union drbd_state ns_min = acscw->ns_min;
1470 struct drbd_conf *mdev;
1471 int vnr;
bbeb641c
PR
1472
1473 kfree(acscw);
1474
b8907339 1475 /* Upon network configuration, we need to start the receiver */
5f082f98 1476 if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
b8907339
PR
1477 drbd_thread_start(&tconn->receiver);
1478
f3dfa40a
LE
1479 if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
1480 struct net_conf *old_conf;
1481
a0095508 1482 mutex_lock(&tconn->conf_update);
f3dfa40a 1483 old_conf = tconn->net_conf;
089c075d
AG
1484 tconn->my_addr_len = 0;
1485 tconn->peer_addr_len = 0;
f3dfa40a
LE
1486 rcu_assign_pointer(tconn->net_conf, NULL);
1487 conn_free_crypto(tconn);
a0095508 1488 mutex_unlock(&tconn->conf_update);
f3dfa40a
LE
1489
1490 synchronize_rcu();
1491 kfree(old_conf);
1492 }
1493
a6d00c8e
PR
1494 if (ns_max.susp_fen) {
1495 /* case1: The outdate peer handler is successful: */
1496 if (ns_max.pdsk <= D_OUTDATED) {
1497 tl_clear(tconn);
695d08fa 1498 rcu_read_lock();
a6d00c8e
PR
1499 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1500 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
1501 drbd_uuid_new_current(mdev);
1502 clear_bit(NEW_CUR_UUID, &mdev->flags);
1503 }
1504 }
695d08fa 1505 rcu_read_unlock();
a6d00c8e
PR
1506 conn_request_state(tconn,
1507 (union drbd_state) { { .susp_fen = 1 } },
1508 (union drbd_state) { { .susp_fen = 0 } },
1509 CS_VERBOSE);
1510 }
1511 /* case2: The connection was established again: */
1512 if (ns_min.conn >= C_CONNECTED) {
695d08fa 1513 rcu_read_lock();
a6d00c8e
PR
1514 idr_for_each_entry(&tconn->volumes, mdev, vnr)
1515 clear_bit(NEW_CUR_UUID, &mdev->flags);
695d08fa 1516 rcu_read_unlock();
a6d00c8e
PR
1517 spin_lock_irq(&tconn->req_lock);
1518 _tl_restart(tconn, RESEND);
1519 _conn_request_state(tconn,
1520 (union drbd_state) { { .susp_fen = 1 } },
1521 (union drbd_state) { { .susp_fen = 0 } },
1522 CS_VERBOSE);
1523 spin_unlock_irq(&tconn->req_lock);
1524 }
1525 }
9dc9fbb3 1526 kref_put(&tconn->kref, &conn_destroy);
99920dc5 1527 return 0;
bbeb641c
PR
1528}
1529
435693e8 1530void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
88ef594e 1531{
435693e8 1532 enum chg_state_flags flags = ~0;
88ef594e 1533 struct drbd_conf *mdev;
435693e8 1534 int vnr, first_vol = 1;
e0e16653
PR
1535 union drbd_dev_state os, cs = {
1536 { .role = R_SECONDARY,
1537 .peer = R_UNKNOWN,
1538 .conn = tconn->cstate,
1539 .disk = D_DISKLESS,
1540 .pdsk = D_UNKNOWN,
1541 } };
88ef594e 1542
695d08fa 1543 rcu_read_lock();
88ef594e
PR
1544 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1545 os = mdev->state;
1546
435693e8
PR
1547 if (first_vol) {
1548 cs = os;
1549 first_vol = 0;
1550 continue;
1551 }
1552
1553 if (cs.role != os.role)
1554 flags &= ~CS_DC_ROLE;
1555
1556 if (cs.peer != os.peer)
1557 flags &= ~CS_DC_PEER;
1558
1559 if (cs.conn != os.conn)
1560 flags &= ~CS_DC_CONN;
88ef594e 1561
435693e8
PR
1562 if (cs.disk != os.disk)
1563 flags &= ~CS_DC_DISK;
88ef594e 1564
435693e8
PR
1565 if (cs.pdsk != os.pdsk)
1566 flags &= ~CS_DC_PDSK;
1567 }
695d08fa 1568 rcu_read_unlock();
435693e8
PR
1569
1570 *pf |= CS_DC_MASK;
1571 *pf &= flags;
da9fbc27 1572 (*pcs).i = cs.i;
88ef594e 1573}
bbeb641c 1574
bd0c824a
PR
1575static enum drbd_state_rv
1576conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
88ef594e 1577 enum chg_state_flags flags)
bbeb641c 1578{
bd0c824a 1579 enum drbd_state_rv rv = SS_SUCCESS;
bbeb641c 1580 union drbd_state ns, os;
bd0c824a
PR
1581 struct drbd_conf *mdev;
1582 int vnr;
bbeb641c 1583
695d08fa 1584 rcu_read_lock();
bd0c824a 1585 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
78bae59b 1586 os = drbd_read_state(mdev);
bd0c824a
PR
1587 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
1588
778bcf2e
PR
1589 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1590 ns.disk = os.disk;
1591
bd0c824a
PR
1592 if (ns.i == os.i)
1593 continue;
bbeb641c 1594
bd0c824a
PR
1595 rv = is_valid_transition(os, ns);
1596 if (rv < SS_SUCCESS)
1597 break;
1598
1599 if (!(flags & CS_HARD)) {
1600 rv = is_valid_state(mdev, ns);
1601 if (rv < SS_SUCCESS) {
1602 if (is_valid_state(mdev, os) == rv)
a1096a6e 1603 rv = is_valid_soft_transition(os, ns, tconn);
bd0c824a 1604 } else
a1096a6e 1605 rv = is_valid_soft_transition(os, ns, tconn);
bd0c824a
PR
1606 }
1607 if (rv < SS_SUCCESS)
1608 break;
bbeb641c 1609 }
695d08fa 1610 rcu_read_unlock();
bbeb641c 1611
bd0c824a
PR
1612 if (rv < SS_SUCCESS && flags & CS_VERBOSE)
1613 print_st_err(mdev, os, ns, rv);
1614
1615 return rv;
bbeb641c
PR
1616}
1617
8c7e16c3 1618void
bd0c824a 1619conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
8c7e16c3 1620 union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
bbeb641c 1621{
f132f554 1622 union drbd_state ns, os, ns_max = { };
8c7e16c3
PR
1623 union drbd_state ns_min = {
1624 { .role = R_MASK,
1625 .peer = R_MASK,
e0e16653 1626 .conn = val.conn,
8c7e16c3
PR
1627 .disk = D_MASK,
1628 .pdsk = D_MASK
1629 } };
bd0c824a 1630 struct drbd_conf *mdev;
bbeb641c 1631 enum drbd_state_rv rv;
f132f554 1632 int vnr, number_of_volumes = 0;
bbeb641c 1633
07be15b1
LE
1634 if (mask.conn == C_MASK) {
1635 /* remember last connect time so request_timer_fn() won't
1636 * kill newly established sessions while we are still trying to thaw
1637 * previously frozen IO */
1638 if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS)
1639 tconn->last_reconnect_jif = jiffies;
1640
bd0c824a 1641 tconn->cstate = val.conn;
07be15b1 1642 }
bd0c824a 1643
695d08fa 1644 rcu_read_lock();
bd0c824a 1645 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
f132f554 1646 number_of_volumes++;
78bae59b 1647 os = drbd_read_state(mdev);
bd0c824a
PR
1648 ns = apply_mask_val(os, mask, val);
1649 ns = sanitize_state(mdev, ns, NULL);
bbeb641c 1650
778bcf2e
PR
1651 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1652 ns.disk = os.disk;
1653
bd0c824a
PR
1654 rv = __drbd_set_state(mdev, ns, flags, NULL);
1655 if (rv < SS_SUCCESS)
1656 BUG();
bbeb641c 1657
8c7e16c3
PR
1658 ns.i = mdev->state.i;
1659 ns_max.role = max_role(ns.role, ns_max.role);
1660 ns_max.peer = max_role(ns.peer, ns_max.peer);
1661 ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
1662 ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
1663 ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
1664
1665 ns_min.role = min_role(ns.role, ns_min.role);
1666 ns_min.peer = min_role(ns.peer, ns_min.peer);
1667 ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
1668 ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
1669 ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
bd0c824a 1670 }
695d08fa 1671 rcu_read_unlock();
bbeb641c 1672
f132f554
PR
1673 if (number_of_volumes == 0) {
1674 ns_min = ns_max = (union drbd_state) { {
1675 .role = R_SECONDARY,
1676 .peer = R_UNKNOWN,
1677 .conn = val.conn,
1678 .disk = D_DISKLESS,
1679 .pdsk = D_UNKNOWN
1680 } };
1681 }
1682
8c7e16c3
PR
1683 ns_min.susp = ns_max.susp = tconn->susp;
1684 ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
1685 ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
1686
1687 *pns_min = ns_min;
1688 *pns_max = ns_max;
bbeb641c
PR
1689}
1690
df24aa45
PR
1691static enum drbd_state_rv
1692_conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
1693{
df24aa45
PR
1694 enum drbd_state_rv rv;
1695
1696 if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
1697 return SS_CW_SUCCESS;
1698
1699 if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
1700 return SS_CW_FAILED_BY_PEER;
1701
df24aa45
PR
1702 spin_lock_irq(&tconn->req_lock);
1703 rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR;
1704
1705 if (rv == SS_UNKNOWN_ERROR)
435693e8 1706 rv = conn_is_valid_transition(tconn, mask, val, 0);
df24aa45 1707
bd0c824a
PR
1708 if (rv == SS_SUCCESS)
1709 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
df24aa45
PR
1710
1711 spin_unlock_irq(&tconn->req_lock);
1712
1713 return rv;
1714}
1715
1716static enum drbd_state_rv
1717conn_cl_wide(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1718 enum chg_state_flags f)
1719{
1720 enum drbd_state_rv rv;
1721
1722 spin_unlock_irq(&tconn->req_lock);
1723 mutex_lock(&tconn->cstate_mutex);
1724
4d0fc3fd 1725 set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
caee1c3a 1726 if (conn_send_state_req(tconn, mask, val)) {
4d0fc3fd 1727 clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
df24aa45
PR
1728 rv = SS_CW_FAILED_BY_PEER;
1729 /* if (f & CS_VERBOSE)
1730 print_st_err(mdev, os, ns, rv); */
1731 goto abort;
1732 }
1733
1734 wait_event(tconn->ping_wait, (rv = _conn_rq_cond(tconn, mask, val)));
4d0fc3fd 1735 clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
df24aa45
PR
1736
1737abort:
1738 mutex_unlock(&tconn->cstate_mutex);
1739 spin_lock_irq(&tconn->req_lock);
1740
1741 return rv;
1742}
1743
bbeb641c
PR
1744enum drbd_state_rv
1745_conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1746 enum chg_state_flags flags)
1747{
1748 enum drbd_state_rv rv = SS_SUCCESS;
bbeb641c
PR
1749 struct after_conn_state_chg_work *acscw;
1750 enum drbd_conns oc = tconn->cstate;
8c7e16c3 1751 union drbd_state ns_max, ns_min, os;
bbeb641c 1752
bbeb641c
PR
1753 rv = is_valid_conn_transition(oc, val.conn);
1754 if (rv < SS_SUCCESS)
1755 goto abort;
1756
88ef594e 1757 rv = conn_is_valid_transition(tconn, mask, val, flags);
bbeb641c
PR
1758 if (rv < SS_SUCCESS)
1759 goto abort;
1760
df24aa45
PR
1761 if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
1762 !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
1763 rv = conn_cl_wide(tconn, mask, val, flags);
1764 if (rv < SS_SUCCESS)
1765 goto abort;
1766 }
1767
435693e8 1768 conn_old_common_state(tconn, &os, &flags);
706cb24c 1769 flags |= CS_DC_SUSP;
8c7e16c3 1770 conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
5f082f98 1771 conn_pr_state_change(tconn, os, ns_max, flags);
bbeb641c
PR
1772
1773 acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
1774 if (acscw) {
435693e8 1775 acscw->oc = os.conn;
8c7e16c3 1776 acscw->ns_min = ns_min;
5f082f98 1777 acscw->ns_max = ns_max;
bbeb641c
PR
1778 acscw->flags = flags;
1779 acscw->w.cb = w_after_conn_state_ch;
9dc9fbb3 1780 kref_get(&tconn->kref);
bbeb641c 1781 acscw->w.tconn = tconn;
d5b27b01 1782 drbd_queue_work(&tconn->sender_work, &acscw->w);
bbeb641c
PR
1783 } else {
1784 conn_err(tconn, "Could not kmalloc an acscw\n");
b8907339 1785 }
bbeb641c 1786
a01842eb
PR
1787 return rv;
1788 abort:
1789 if (flags & CS_VERBOSE) {
1790 conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv));
1791 conn_err(tconn, " state = { cs:%s }\n", drbd_conn_str(oc));
1792 conn_err(tconn, "wanted = { cs:%s }\n", drbd_conn_str(val.conn));
1793 }
bbeb641c
PR
1794 return rv;
1795}
1796
1797enum drbd_state_rv
1798conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1799 enum chg_state_flags flags)
1800{
1801 enum drbd_state_rv rv;
1802
1803 spin_lock_irq(&tconn->req_lock);
1804 rv = _conn_request_state(tconn, mask, val, flags);
1805 spin_unlock_irq(&tconn->req_lock);
1806
1807 return rv;
b8907339 1808}