Merge git://git.kernel.org/pub/scm/linux/kernel/git/steve/gfs2-3.0-fixes
[deliverable/linux.git] / drivers / block / drbd / drbd_state.c
CommitLineData
b8907339
PR
1/*
2 drbd_state.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
11 from Logicworks, Inc. for making SDP replication support possible.
12
13 drbd is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2, or (at your option)
16 any later version.
17
18 drbd is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with drbd; see the file COPYING. If not, write to
25 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
26 */
27
28#include <linux/drbd_limits.h>
29#include "drbd_int.h"
30#include "drbd_req.h"
31
cdfda633 32/* in drbd_main.c */
71fc7eed 33extern void tl_abort_disk_io(struct drbd_conf *mdev);
cdfda633 34
b8907339
PR
35struct after_state_chg_work {
36 struct drbd_work w;
37 union drbd_state os;
38 union drbd_state ns;
39 enum chg_state_flags flags;
40 struct completion *done;
41};
42
d942ae44
PR
43enum sanitize_state_warnings {
44 NO_WARNING,
45 ABORTED_ONLINE_VERIFY,
46 ABORTED_RESYNC,
47 CONNECTION_LOST_NEGOTIATING,
48 IMPLICITLY_UPGRADED_DISK,
49 IMPLICITLY_UPGRADED_PDSK,
50};
51
99920dc5 52static int w_after_state_ch(struct drbd_work *w, int unused);
b8907339
PR
53static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
54 union drbd_state ns, enum chg_state_flags flags);
a75f34ad 55static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
a1096a6e 56static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *);
3509502d 57static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
4308a0a3 58static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
d942ae44 59 enum sanitize_state_warnings *warn);
b8907339 60
2aebfabb
PR
61static inline bool is_susp(union drbd_state s)
62{
63 return s.susp || s.susp_nod || s.susp_fen;
64}
65
d0456c72 66bool conn_all_vols_unconf(struct drbd_tconn *tconn)
0e29d163
PR
67{
68 struct drbd_conf *mdev;
695d08fa 69 bool rv = true;
e90285e0 70 int vnr;
0e29d163 71
695d08fa 72 rcu_read_lock();
e90285e0 73 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
d0456c72
LE
74 if (mdev->state.disk != D_DISKLESS ||
75 mdev->state.conn != C_STANDALONE ||
695d08fa
PR
76 mdev->state.role != R_SECONDARY) {
77 rv = false;
78 break;
79 }
0e29d163 80 }
695d08fa
PR
81 rcu_read_unlock();
82
83 return rv;
0e29d163
PR
84}
85
cb703454
PR
86/* Unfortunately the states where not correctly ordered, when
87 they where defined. therefore can not use max_t() here. */
88static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
89{
90 if (role1 == R_PRIMARY || role2 == R_PRIMARY)
91 return R_PRIMARY;
92 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
93 return R_SECONDARY;
94 return R_UNKNOWN;
95}
96static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
97{
98 if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
99 return R_UNKNOWN;
100 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
101 return R_SECONDARY;
102 return R_PRIMARY;
103}
104
105enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
106{
107 enum drbd_role role = R_UNKNOWN;
108 struct drbd_conf *mdev;
109 int vnr;
110
695d08fa 111 rcu_read_lock();
cb703454
PR
112 idr_for_each_entry(&tconn->volumes, mdev, vnr)
113 role = max_role(role, mdev->state.role);
695d08fa 114 rcu_read_unlock();
cb703454
PR
115
116 return role;
117}
118
119enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
120{
121 enum drbd_role peer = R_UNKNOWN;
122 struct drbd_conf *mdev;
123 int vnr;
124
695d08fa 125 rcu_read_lock();
cb703454
PR
126 idr_for_each_entry(&tconn->volumes, mdev, vnr)
127 peer = max_role(peer, mdev->state.peer);
695d08fa 128 rcu_read_unlock();
cb703454
PR
129
130 return peer;
131}
132
133enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
134{
135 enum drbd_disk_state ds = D_DISKLESS;
136 struct drbd_conf *mdev;
137 int vnr;
138
695d08fa 139 rcu_read_lock();
cb703454
PR
140 idr_for_each_entry(&tconn->volumes, mdev, vnr)
141 ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
695d08fa 142 rcu_read_unlock();
cb703454
PR
143
144 return ds;
145}
146
4669265a
PR
147enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
148{
149 enum drbd_disk_state ds = D_MASK;
150 struct drbd_conf *mdev;
151 int vnr;
152
695d08fa 153 rcu_read_lock();
4669265a
PR
154 idr_for_each_entry(&tconn->volumes, mdev, vnr)
155 ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
695d08fa 156 rcu_read_unlock();
4669265a
PR
157
158 return ds;
159}
160
cb703454
PR
161enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
162{
163 enum drbd_disk_state ds = D_DISKLESS;
164 struct drbd_conf *mdev;
165 int vnr;
166
695d08fa 167 rcu_read_lock();
cb703454
PR
168 idr_for_each_entry(&tconn->volumes, mdev, vnr)
169 ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
695d08fa 170 rcu_read_unlock();
cb703454
PR
171
172 return ds;
173}
174
19f83c76
PR
175enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
176{
177 enum drbd_conns conn = C_MASK;
178 struct drbd_conf *mdev;
179 int vnr;
180
695d08fa 181 rcu_read_lock();
19f83c76
PR
182 idr_for_each_entry(&tconn->volumes, mdev, vnr)
183 conn = min_t(enum drbd_conns, conn, mdev->state.conn);
695d08fa 184 rcu_read_unlock();
19f83c76
PR
185
186 return conn;
187}
188
79702011
PR
189static bool no_peer_wf_report_params(struct drbd_tconn *tconn)
190{
191 struct drbd_conf *mdev;
192 int vnr;
193 bool rv = true;
194
195 rcu_read_lock();
196 idr_for_each_entry(&tconn->volumes, mdev, vnr)
197 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
198 rv = false;
199 break;
200 }
201 rcu_read_unlock();
202
203 return rv;
204}
205
206
b8907339
PR
207/**
208 * cl_wide_st_chg() - true if the state change is a cluster wide one
209 * @mdev: DRBD device.
210 * @os: old (current) state.
211 * @ns: new (wanted) state.
212 */
213static int cl_wide_st_chg(struct drbd_conf *mdev,
214 union drbd_state os, union drbd_state ns)
215{
216 return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
217 ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
218 (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
219 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
e8744f5a 220 (os.disk != D_FAILED && ns.disk == D_FAILED))) ||
b8907339 221 (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
369bea63
PR
222 (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) ||
223 (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS);
b8907339
PR
224}
225
56707f9e
PR
226static union drbd_state
227apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
228{
229 union drbd_state ns;
230 ns.i = (os.i & ~mask.i) | val.i;
231 return ns;
232}
233
b8907339
PR
234enum drbd_state_rv
235drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
236 union drbd_state mask, union drbd_state val)
237{
238 unsigned long flags;
56707f9e 239 union drbd_state ns;
b8907339
PR
240 enum drbd_state_rv rv;
241
242 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 243 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
b8907339 244 rv = _drbd_set_state(mdev, ns, f, NULL);
b8907339
PR
245 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
246
247 return rv;
248}
249
250/**
251 * drbd_force_state() - Impose a change which happens outside our control on our state
252 * @mdev: DRBD device.
253 * @mask: mask of state bits to change.
254 * @val: value of new state bits.
255 */
256void drbd_force_state(struct drbd_conf *mdev,
257 union drbd_state mask, union drbd_state val)
258{
259 drbd_change_state(mdev, CS_HARD, mask, val);
260}
261
262static enum drbd_state_rv
263_req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
264 union drbd_state val)
265{
266 union drbd_state os, ns;
267 unsigned long flags;
268 enum drbd_state_rv rv;
269
270 if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
271 return SS_CW_SUCCESS;
272
273 if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
274 return SS_CW_FAILED_BY_PEER;
275
b8907339 276 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 277 os = drbd_read_state(mdev);
56707f9e 278 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
3509502d 279 rv = is_valid_transition(os, ns);
a3025a27 280 if (rv >= SS_SUCCESS)
3509502d 281 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
b8907339
PR
282
283 if (!cl_wide_st_chg(mdev, os, ns))
284 rv = SS_CW_NO_NEED;
3509502d 285 if (rv == SS_UNKNOWN_ERROR) {
b8907339 286 rv = is_valid_state(mdev, ns);
a3025a27 287 if (rv >= SS_SUCCESS) {
a1096a6e 288 rv = is_valid_soft_transition(os, ns, mdev->tconn);
a3025a27 289 if (rv >= SS_SUCCESS)
b8907339
PR
290 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
291 }
292 }
293 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
294
295 return rv;
296}
297
298/**
299 * drbd_req_state() - Perform an eventually cluster wide state change
300 * @mdev: DRBD device.
301 * @mask: mask of state bits to change.
302 * @val: value of new state bits.
303 * @f: flags
304 *
305 * Should not be called directly, use drbd_request_state() or
306 * _drbd_request_state().
307 */
308static enum drbd_state_rv
309drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
310 union drbd_state val, enum chg_state_flags f)
311{
312 struct completion done;
313 unsigned long flags;
314 union drbd_state os, ns;
315 enum drbd_state_rv rv;
316
317 init_completion(&done);
318
319 if (f & CS_SERIALIZE)
8410da8f 320 mutex_lock(mdev->state_mutex);
b8907339
PR
321
322 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 323 os = drbd_read_state(mdev);
56707f9e 324 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
3509502d 325 rv = is_valid_transition(os, ns);
3c5e5f6a
LE
326 if (rv < SS_SUCCESS) {
327 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
3509502d 328 goto abort;
3c5e5f6a 329 }
b8907339
PR
330
331 if (cl_wide_st_chg(mdev, os, ns)) {
332 rv = is_valid_state(mdev, ns);
333 if (rv == SS_SUCCESS)
a1096a6e 334 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339
PR
335 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
336
337 if (rv < SS_SUCCESS) {
338 if (f & CS_VERBOSE)
339 print_st_err(mdev, os, ns, rv);
340 goto abort;
341 }
342
d24ae219 343 if (drbd_send_state_req(mdev, mask, val)) {
b8907339
PR
344 rv = SS_CW_FAILED_BY_PEER;
345 if (f & CS_VERBOSE)
346 print_st_err(mdev, os, ns, rv);
347 goto abort;
348 }
349
350 wait_event(mdev->state_wait,
351 (rv = _req_st_cond(mdev, mask, val)));
352
353 if (rv < SS_SUCCESS) {
b8907339
PR
354 if (f & CS_VERBOSE)
355 print_st_err(mdev, os, ns, rv);
356 goto abort;
357 }
358 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 359 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
b8907339 360 rv = _drbd_set_state(mdev, ns, f, &done);
b8907339
PR
361 } else {
362 rv = _drbd_set_state(mdev, ns, f, &done);
363 }
364
365 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
366
367 if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
368 D_ASSERT(current != mdev->tconn->worker.task);
369 wait_for_completion(&done);
370 }
371
372abort:
373 if (f & CS_SERIALIZE)
8410da8f 374 mutex_unlock(mdev->state_mutex);
b8907339
PR
375
376 return rv;
377}
378
379/**
380 * _drbd_request_state() - Request a state change (with flags)
381 * @mdev: DRBD device.
382 * @mask: mask of state bits to change.
383 * @val: value of new state bits.
384 * @f: flags
385 *
386 * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
387 * flag, or when logging of failed state change requests is not desired.
388 */
389enum drbd_state_rv
390_drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
391 union drbd_state val, enum chg_state_flags f)
392{
393 enum drbd_state_rv rv;
394
395 wait_event(mdev->state_wait,
396 (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
397
398 return rv;
399}
400
401static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
402{
403 dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
404 name,
405 drbd_conn_str(ns.conn),
406 drbd_role_str(ns.role),
407 drbd_role_str(ns.peer),
408 drbd_disk_str(ns.disk),
409 drbd_disk_str(ns.pdsk),
410 is_susp(ns) ? 's' : 'r',
411 ns.aftr_isp ? 'a' : '-',
412 ns.peer_isp ? 'p' : '-',
413 ns.user_isp ? 'u' : '-',
414 ns.susp_fen ? 'F' : '-',
415 ns.susp_nod ? 'N' : '-'
416 );
417}
418
419void print_st_err(struct drbd_conf *mdev, union drbd_state os,
420 union drbd_state ns, enum drbd_state_rv err)
421{
422 if (err == SS_IN_TRANSIENT_STATE)
423 return;
424 dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
425 print_st(mdev, " state", os);
426 print_st(mdev, "wanted", ns);
427}
428
435693e8 429static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
bbeb641c
PR
430 enum chg_state_flags flags)
431{
435693e8 432 char *pbp;
bbeb641c
PR
433 pbp = pb;
434 *pbp = 0;
706cb24c 435
435693e8 436 if (ns.role != os.role && flags & CS_DC_ROLE)
bbeb641c
PR
437 pbp += sprintf(pbp, "role( %s -> %s ) ",
438 drbd_role_str(os.role),
439 drbd_role_str(ns.role));
435693e8 440 if (ns.peer != os.peer && flags & CS_DC_PEER)
bbeb641c
PR
441 pbp += sprintf(pbp, "peer( %s -> %s ) ",
442 drbd_role_str(os.peer),
443 drbd_role_str(ns.peer));
435693e8 444 if (ns.conn != os.conn && flags & CS_DC_CONN)
bbeb641c
PR
445 pbp += sprintf(pbp, "conn( %s -> %s ) ",
446 drbd_conn_str(os.conn),
447 drbd_conn_str(ns.conn));
435693e8 448 if (ns.disk != os.disk && flags & CS_DC_DISK)
bbeb641c
PR
449 pbp += sprintf(pbp, "disk( %s -> %s ) ",
450 drbd_disk_str(os.disk),
451 drbd_disk_str(ns.disk));
435693e8 452 if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
bbeb641c
PR
453 pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
454 drbd_disk_str(os.pdsk),
455 drbd_disk_str(ns.pdsk));
706cb24c
PR
456
457 return pbp - pb;
458}
459
460static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
461 enum chg_state_flags flags)
462{
463 char pb[300];
464 char *pbp = pb;
465
466 pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
467
bbeb641c
PR
468 if (ns.aftr_isp != os.aftr_isp)
469 pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
470 os.aftr_isp,
471 ns.aftr_isp);
472 if (ns.peer_isp != os.peer_isp)
473 pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
474 os.peer_isp,
475 ns.peer_isp);
476 if (ns.user_isp != os.user_isp)
477 pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
478 os.user_isp,
479 ns.user_isp);
435693e8 480
706cb24c 481 if (pbp != pb)
bbeb641c
PR
482 dev_info(DEV, "%s\n", pb);
483}
b8907339 484
435693e8
PR
485static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
486 enum chg_state_flags flags)
487{
488 char pb[300];
706cb24c
PR
489 char *pbp = pb;
490
491 pbp += print_state_change(pbp, os, ns, flags);
435693e8 492
706cb24c
PR
493 if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
494 pbp += sprintf(pbp, "susp( %d -> %d ) ",
495 is_susp(os),
496 is_susp(ns));
497
498 if (pbp != pb)
435693e8
PR
499 conn_info(tconn, "%s\n", pb);
500}
501
502
b8907339
PR
503/**
504 * is_valid_state() - Returns an SS_ error code if ns is not valid
505 * @mdev: DRBD device.
506 * @ns: State to consider.
507 */
508static enum drbd_state_rv
509is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
510{
511 /* See drbd_state_sw_errors in drbd_strings.c */
512
513 enum drbd_fencing_p fp;
514 enum drbd_state_rv rv = SS_SUCCESS;
44ed167d 515 struct net_conf *nc;
b8907339 516
daeda1cc 517 rcu_read_lock();
b8907339
PR
518 fp = FP_DONT_CARE;
519 if (get_ldev(mdev)) {
daeda1cc 520 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
b8907339
PR
521 put_ldev(mdev);
522 }
523
44ed167d
PR
524 nc = rcu_dereference(mdev->tconn->net_conf);
525 if (nc) {
526 if (!nc->two_primaries && ns.role == R_PRIMARY) {
047e95e2
PR
527 if (ns.peer == R_PRIMARY)
528 rv = SS_TWO_PRIMARIES;
cb703454 529 else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
047e95e2 530 rv = SS_O_VOL_PEER_PRI;
44ed167d 531 }
b8907339
PR
532 }
533
534 if (rv <= 0)
535 /* already found a reason to abort */;
536 else if (ns.role == R_SECONDARY && mdev->open_cnt)
537 rv = SS_DEVICE_IN_USE;
538
539 else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
540 rv = SS_NO_UP_TO_DATE_DISK;
541
542 else if (fp >= FP_RESOURCE &&
543 ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
544 rv = SS_PRIMARY_NOP;
545
546 else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
547 rv = SS_NO_UP_TO_DATE_DISK;
548
549 else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
550 rv = SS_NO_LOCAL_DISK;
551
552 else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
553 rv = SS_NO_REMOTE_DISK;
554
555 else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
556 rv = SS_NO_UP_TO_DATE_DISK;
557
558 else if ((ns.conn == C_CONNECTED ||
559 ns.conn == C_WF_BITMAP_S ||
560 ns.conn == C_SYNC_SOURCE ||
561 ns.conn == C_PAUSED_SYNC_S) &&
562 ns.disk == D_OUTDATED)
563 rv = SS_CONNECTED_OUTDATES;
564
565 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
44ed167d 566 (nc->verify_alg[0] == 0))
b8907339
PR
567 rv = SS_NO_VERIFY_ALG;
568
569 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
570 mdev->tconn->agreed_pro_version < 88)
571 rv = SS_NOT_SUPPORTED;
572
5c4f13d9
PR
573 else if (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
574 rv = SS_NO_UP_TO_DATE_DISK;
575
576 else if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
577 ns.pdsk == D_UNKNOWN)
578 rv = SS_NEED_CONNECTION;
579
b8907339
PR
580 else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
581 rv = SS_CONNECTED_OUTDATES;
582
44ed167d
PR
583 rcu_read_unlock();
584
b8907339
PR
585 return rv;
586}
587
588/**
a75f34ad 589 * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
3509502d
PR
590 * This function limits state transitions that may be declined by DRBD. I.e.
591 * user requests (aka soft transitions).
b8907339
PR
592 * @mdev: DRBD device.
593 * @ns: new state.
594 * @os: old state.
595 */
596static enum drbd_state_rv
a1096a6e 597is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn)
b8907339
PR
598{
599 enum drbd_state_rv rv = SS_SUCCESS;
600
601 if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
602 os.conn > C_CONNECTED)
603 rv = SS_RESYNC_RUNNING;
604
605 if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
606 rv = SS_ALREADY_STANDALONE;
607
608 if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
609 rv = SS_IS_DISKLESS;
610
611 if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
612 rv = SS_NO_NET_CONFIG;
613
614 if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
615 rv = SS_LOWER_THAN_OUTDATED;
616
617 if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
618 rv = SS_IN_TRANSIENT_STATE;
619
2325eb66
PR
620 /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
621 rv = SS_IN_TRANSIENT_STATE; */
b8907339 622
a1096a6e
PR
623 /* While establishing a connection only allow cstate to change.
624 Delay/refuse role changes, detach attach etc... */
625 if (test_bit(STATE_SENT, &tconn->flags) &&
626 !(os.conn == C_WF_REPORT_PARAMS ||
627 (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION)))
628 rv = SS_IN_TRANSIENT_STATE;
629
b8907339
PR
630 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
631 rv = SS_NEED_CONNECTION;
632
633 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
634 ns.conn != os.conn && os.conn > C_CONNECTED)
635 rv = SS_RESYNC_RUNNING;
636
637 if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
638 os.conn < C_CONNECTED)
639 rv = SS_NEED_CONNECTION;
640
641 if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
642 && os.conn < C_WF_REPORT_PARAMS)
643 rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
644
2bd5ed5d
PR
645 if (ns.conn == C_DISCONNECTING && ns.pdsk == D_OUTDATED &&
646 os.conn < C_CONNECTED && os.pdsk > D_OUTDATED)
647 rv = SS_OUTDATE_WO_CONN;
648
b8907339
PR
649 return rv;
650}
651
3509502d 652static enum drbd_state_rv
fda74117 653is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
3509502d 654{
d9cc6e23
LE
655 /* no change -> nothing to do, at least for the connection part */
656 if (oc == nc)
657 return SS_NOTHING_TO_DO;
3509502d 658
d9cc6e23
LE
659 /* disconnect of an unconfigured connection does not make sense */
660 if (oc == C_STANDALONE && nc == C_DISCONNECTING)
661 return SS_ALREADY_STANDALONE;
662
663 /* from C_STANDALONE, we start with C_UNCONNECTED */
664 if (oc == C_STANDALONE && nc != C_UNCONNECTED)
665 return SS_NEED_CONNECTION;
3509502d 666
25b0d6c8
PR
667 /* When establishing a connection we need to go through WF_REPORT_PARAMS!
668 Necessary to do the right thing upon invalidate-remote on a disconnected resource */
669 if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED)
670 return SS_NEED_CONNECTION;
671
3509502d 672 /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
fda74117 673 if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
d9cc6e23 674 return SS_IN_TRANSIENT_STATE;
3509502d
PR
675
676 /* After C_DISCONNECTING only C_STANDALONE may follow */
fda74117 677 if (oc == C_DISCONNECTING && nc != C_STANDALONE)
d9cc6e23 678 return SS_IN_TRANSIENT_STATE;
3509502d 679
d9cc6e23 680 return SS_SUCCESS;
fda74117
PR
681}
682
683
684/**
685 * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
686 * This limits hard state transitions. Hard state transitions are facts there are
687 * imposed on DRBD by the environment. E.g. disk broke or network broke down.
688 * But those hard state transitions are still not allowed to do everything.
689 * @ns: new state.
690 * @os: old state.
691 */
692static enum drbd_state_rv
693is_valid_transition(union drbd_state os, union drbd_state ns)
694{
695 enum drbd_state_rv rv;
696
697 rv = is_valid_conn_transition(os.conn, ns.conn);
698
3509502d
PR
699 /* we cannot fail (again) if we already detached */
700 if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
701 rv = SS_IS_DISKLESS;
702
703 return rv;
704}
705
d942ae44
PR
706static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
707{
708 static const char *msg_table[] = {
709 [NO_WARNING] = "",
710 [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
711 [ABORTED_RESYNC] = "Resync aborted.",
712 [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
713 [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
714 [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
715 };
716
717 if (warn != NO_WARNING)
718 dev_warn(DEV, "%s\n", msg_table[warn]);
719}
720
b8907339
PR
721/**
722 * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
723 * @mdev: DRBD device.
724 * @os: old state.
725 * @ns: new state.
726 * @warn_sync_abort:
727 *
728 * When we loose connection, we have to set the state of the peers disk (pdsk)
729 * to D_UNKNOWN. This rule and many more along those lines are in this function.
730 */
4308a0a3 731static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
d942ae44 732 enum sanitize_state_warnings *warn)
b8907339
PR
733{
734 enum drbd_fencing_p fp;
735 enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
736
d942ae44
PR
737 if (warn)
738 *warn = NO_WARNING;
739
b8907339
PR
740 fp = FP_DONT_CARE;
741 if (get_ldev(mdev)) {
daeda1cc
PR
742 rcu_read_lock();
743 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
744 rcu_read_unlock();
b8907339
PR
745 put_ldev(mdev);
746 }
747
3509502d 748 /* Implications from connection to peer and peer_isp */
b8907339
PR
749 if (ns.conn < C_CONNECTED) {
750 ns.peer_isp = 0;
751 ns.peer = R_UNKNOWN;
752 if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
753 ns.pdsk = D_UNKNOWN;
754 }
755
756 /* Clear the aftr_isp when becoming unconfigured */
757 if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
758 ns.aftr_isp = 0;
759
4308a0a3 760 /* An implication of the disk states onto the connection state */
b8907339 761 /* Abort resync if a disk fails/detaches */
4308a0a3 762 if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
d942ae44
PR
763 if (warn)
764 *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
765 ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
b8907339
PR
766 ns.conn = C_CONNECTED;
767 }
768
769 /* Connection breaks down before we finished "Negotiating" */
770 if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
771 get_ldev_if_state(mdev, D_NEGOTIATING)) {
772 if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
773 ns.disk = mdev->new_state_tmp.disk;
774 ns.pdsk = mdev->new_state_tmp.pdsk;
775 } else {
d942ae44
PR
776 if (warn)
777 *warn = CONNECTION_LOST_NEGOTIATING;
b8907339
PR
778 ns.disk = D_DISKLESS;
779 ns.pdsk = D_UNKNOWN;
780 }
781 put_ldev(mdev);
782 }
783
784 /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
785 if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
786 if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
787 ns.disk = D_UP_TO_DATE;
788 if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
789 ns.pdsk = D_UP_TO_DATE;
790 }
791
792 /* Implications of the connection stat on the disk states */
793 disk_min = D_DISKLESS;
794 disk_max = D_UP_TO_DATE;
795 pdsk_min = D_INCONSISTENT;
796 pdsk_max = D_UNKNOWN;
797 switch ((enum drbd_conns)ns.conn) {
798 case C_WF_BITMAP_T:
799 case C_PAUSED_SYNC_T:
800 case C_STARTING_SYNC_T:
801 case C_WF_SYNC_UUID:
802 case C_BEHIND:
803 disk_min = D_INCONSISTENT;
804 disk_max = D_OUTDATED;
805 pdsk_min = D_UP_TO_DATE;
806 pdsk_max = D_UP_TO_DATE;
807 break;
808 case C_VERIFY_S:
809 case C_VERIFY_T:
810 disk_min = D_UP_TO_DATE;
811 disk_max = D_UP_TO_DATE;
812 pdsk_min = D_UP_TO_DATE;
813 pdsk_max = D_UP_TO_DATE;
814 break;
815 case C_CONNECTED:
816 disk_min = D_DISKLESS;
817 disk_max = D_UP_TO_DATE;
818 pdsk_min = D_DISKLESS;
819 pdsk_max = D_UP_TO_DATE;
820 break;
821 case C_WF_BITMAP_S:
822 case C_PAUSED_SYNC_S:
823 case C_STARTING_SYNC_S:
824 case C_AHEAD:
825 disk_min = D_UP_TO_DATE;
826 disk_max = D_UP_TO_DATE;
827 pdsk_min = D_INCONSISTENT;
828 pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
829 break;
830 case C_SYNC_TARGET:
831 disk_min = D_INCONSISTENT;
832 disk_max = D_INCONSISTENT;
833 pdsk_min = D_UP_TO_DATE;
834 pdsk_max = D_UP_TO_DATE;
835 break;
836 case C_SYNC_SOURCE:
837 disk_min = D_UP_TO_DATE;
838 disk_max = D_UP_TO_DATE;
839 pdsk_min = D_INCONSISTENT;
840 pdsk_max = D_INCONSISTENT;
841 break;
842 case C_STANDALONE:
843 case C_DISCONNECTING:
844 case C_UNCONNECTED:
845 case C_TIMEOUT:
846 case C_BROKEN_PIPE:
847 case C_NETWORK_FAILURE:
848 case C_PROTOCOL_ERROR:
849 case C_TEAR_DOWN:
850 case C_WF_CONNECTION:
851 case C_WF_REPORT_PARAMS:
852 case C_MASK:
853 break;
854 }
855 if (ns.disk > disk_max)
856 ns.disk = disk_max;
857
858 if (ns.disk < disk_min) {
d942ae44
PR
859 if (warn)
860 *warn = IMPLICITLY_UPGRADED_DISK;
b8907339
PR
861 ns.disk = disk_min;
862 }
863 if (ns.pdsk > pdsk_max)
864 ns.pdsk = pdsk_max;
865
866 if (ns.pdsk < pdsk_min) {
d942ae44
PR
867 if (warn)
868 *warn = IMPLICITLY_UPGRADED_PDSK;
b8907339
PR
869 ns.pdsk = pdsk_min;
870 }
871
872 if (fp == FP_STONITH &&
4308a0a3 873 (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
b8907339
PR
874 ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
875
f399002e 876 if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
4308a0a3 877 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
b8907339
PR
878 ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
879
880 if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
881 if (ns.conn == C_SYNC_SOURCE)
882 ns.conn = C_PAUSED_SYNC_S;
883 if (ns.conn == C_SYNC_TARGET)
884 ns.conn = C_PAUSED_SYNC_T;
885 } else {
886 if (ns.conn == C_PAUSED_SYNC_S)
887 ns.conn = C_SYNC_SOURCE;
888 if (ns.conn == C_PAUSED_SYNC_T)
889 ns.conn = C_SYNC_TARGET;
890 }
891
892 return ns;
893}
894
895void drbd_resume_al(struct drbd_conf *mdev)
896{
897 if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
898 dev_info(DEV, "Resumed AL updates\n");
899}
900
901/* helper for __drbd_set_state */
902static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
903{
904 if (mdev->tconn->agreed_pro_version < 90)
905 mdev->ov_start_sector = 0;
906 mdev->rs_total = drbd_bm_bits(mdev);
907 mdev->ov_position = 0;
908 if (cs == C_VERIFY_T) {
909 /* starting online verify from an arbitrary position
910 * does not fit well into the existing protocol.
911 * on C_VERIFY_T, we initialize ov_left and friends
912 * implicitly in receive_DataRequest once the
913 * first P_OV_REQUEST is received */
914 mdev->ov_start_sector = ~(sector_t)0;
915 } else {
916 unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
917 if (bit >= mdev->rs_total) {
918 mdev->ov_start_sector =
919 BM_BIT_TO_SECT(mdev->rs_total - 1);
920 mdev->rs_total = 1;
921 } else
922 mdev->rs_total -= bit;
923 mdev->ov_position = mdev->ov_start_sector;
924 }
925 mdev->ov_left = mdev->rs_total;
926}
927
928/**
929 * __drbd_set_state() - Set a new DRBD state
930 * @mdev: DRBD device.
931 * @ns: new state.
932 * @flags: Flags
933 * @done: Optional completion, that will get completed after the after_state_ch() finished
934 *
935 * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
936 */
937enum drbd_state_rv
938__drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
939 enum chg_state_flags flags, struct completion *done)
940{
941 union drbd_state os;
942 enum drbd_state_rv rv = SS_SUCCESS;
d942ae44 943 enum sanitize_state_warnings ssw;
b8907339 944 struct after_state_chg_work *ascw;
2681f7f6 945 bool did_remote, should_do_remote;
b8907339 946
78bae59b 947 os = drbd_read_state(mdev);
b8907339 948
d942ae44 949 ns = sanitize_state(mdev, ns, &ssw);
b8907339
PR
950 if (ns.i == os.i)
951 return SS_NOTHING_TO_DO;
952
3509502d
PR
953 rv = is_valid_transition(os, ns);
954 if (rv < SS_SUCCESS)
955 return rv;
956
b8907339
PR
957 if (!(flags & CS_HARD)) {
958 /* pre-state-change checks ; only look at ns */
959 /* See drbd_state_sw_errors in drbd_strings.c */
960
961 rv = is_valid_state(mdev, ns);
962 if (rv < SS_SUCCESS) {
963 /* If the old state was illegal as well, then let
964 this happen...*/
965
966 if (is_valid_state(mdev, os) == rv)
a1096a6e 967 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339 968 } else
a1096a6e 969 rv = is_valid_soft_transition(os, ns, mdev->tconn);
b8907339
PR
970 }
971
972 if (rv < SS_SUCCESS) {
973 if (flags & CS_VERBOSE)
974 print_st_err(mdev, os, ns, rv);
975 return rv;
976 }
977
d942ae44 978 print_sanitize_warnings(mdev, ssw);
b8907339 979
435693e8 980 drbd_pr_state_change(mdev, os, ns, flags);
b8907339 981
706cb24c
PR
982 /* Display changes to the susp* flags that where caused by the call to
983 sanitize_state(). Only display it here if we where not called from
984 _conn_request_state() */
985 if (!(flags & CS_DC_SUSP))
986 conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
987
b8907339
PR
988 /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
989 * on the ldev here, to be sure the transition -> D_DISKLESS resp.
990 * drbd_ldev_destroy() won't happen before our corresponding
991 * after_state_ch works run, where we put_ldev again. */
992 if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
993 (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
994 atomic_inc(&mdev->local_cnt);
995
2681f7f6 996 did_remote = drbd_should_do_remote(mdev->state);
da9fbc27 997 mdev->state.i = ns.i;
2681f7f6 998 should_do_remote = drbd_should_do_remote(mdev->state);
8e0af25f
PR
999 mdev->tconn->susp = ns.susp;
1000 mdev->tconn->susp_nod = ns.susp_nod;
1001 mdev->tconn->susp_fen = ns.susp_fen;
b8907339 1002
2681f7f6
LE
1003 /* put replicated vs not-replicated requests in seperate epochs */
1004 if (did_remote != should_do_remote)
1005 start_new_tl_epoch(mdev->tconn);
1006
b8907339
PR
1007 if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
1008 drbd_print_uuids(mdev, "attached to UUIDs");
1009
79702011
PR
1010 /* Wake up role changes, that were delayed because of connection establishing */
1011 if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS &&
1012 no_peer_wf_report_params(mdev->tconn))
1013 clear_bit(STATE_SENT, &mdev->tconn->flags);
1014
b8907339
PR
1015 wake_up(&mdev->misc_wait);
1016 wake_up(&mdev->state_wait);
2a67d8b9 1017 wake_up(&mdev->tconn->ping_wait);
b8907339 1018
58ffa580
LE
1019 /* Aborted verify run, or we reached the stop sector.
1020 * Log the last position, unless end-of-device. */
b8907339 1021 if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
58ffa580 1022 ns.conn <= C_CONNECTED) {
b8907339
PR
1023 mdev->ov_start_sector =
1024 BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
58ffa580
LE
1025 if (mdev->ov_left)
1026 dev_info(DEV, "Online Verify reached sector %llu\n",
1027 (unsigned long long)mdev->ov_start_sector);
b8907339
PR
1028 }
1029
1030 if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
1031 (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
1032 dev_info(DEV, "Syncer continues.\n");
1033 mdev->rs_paused += (long)jiffies
1034 -(long)mdev->rs_mark_time[mdev->rs_last_mark];
1035 if (ns.conn == C_SYNC_TARGET)
1036 mod_timer(&mdev->resync_timer, jiffies);
1037 }
1038
1039 if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
1040 (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
1041 dev_info(DEV, "Resync suspended\n");
1042 mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
1043 }
1044
1045 if (os.conn == C_CONNECTED &&
1046 (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
1047 unsigned long now = jiffies;
1048 int i;
1049
1050 set_ov_position(mdev, ns.conn);
1051 mdev->rs_start = now;
1052 mdev->rs_last_events = 0;
1053 mdev->rs_last_sect_ev = 0;
1054 mdev->ov_last_oos_size = 0;
1055 mdev->ov_last_oos_start = 0;
1056
1057 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
1058 mdev->rs_mark_left[i] = mdev->ov_left;
1059 mdev->rs_mark_time[i] = now;
1060 }
1061
1062 drbd_rs_controller_reset(mdev);
1063
1064 if (ns.conn == C_VERIFY_S) {
1065 dev_info(DEV, "Starting Online Verify from sector %llu\n",
1066 (unsigned long long)mdev->ov_position);
1067 mod_timer(&mdev->resync_timer, jiffies);
1068 }
1069 }
1070
1071 if (get_ldev(mdev)) {
1072 u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
1073 MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
1074 MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
1075
d5d7ebd4 1076 mdf &= ~MDF_AL_CLEAN;
b8907339
PR
1077 if (test_bit(CRASHED_PRIMARY, &mdev->flags))
1078 mdf |= MDF_CRASHED_PRIMARY;
1079 if (mdev->state.role == R_PRIMARY ||
1080 (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
1081 mdf |= MDF_PRIMARY_IND;
1082 if (mdev->state.conn > C_WF_REPORT_PARAMS)
1083 mdf |= MDF_CONNECTED_IND;
1084 if (mdev->state.disk > D_INCONSISTENT)
1085 mdf |= MDF_CONSISTENT;
1086 if (mdev->state.disk > D_OUTDATED)
1087 mdf |= MDF_WAS_UP_TO_DATE;
1088 if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
1089 mdf |= MDF_PEER_OUT_DATED;
1090 if (mdf != mdev->ldev->md.flags) {
1091 mdev->ldev->md.flags = mdf;
1092 drbd_md_mark_dirty(mdev);
1093 }
1094 if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
1095 drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
1096 put_ldev(mdev);
1097 }
1098
1099 /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
1100 if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
1101 os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
1102 set_bit(CONSIDER_RESYNC, &mdev->flags);
1103
1104 /* Receiver should clean up itself */
1105 if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
1106 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1107
1108 /* Now the receiver finished cleaning up itself, it should die */
1109 if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
1110 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1111
1112 /* Upon network failure, we need to restart the receiver. */
823bd832 1113 if (os.conn > C_WF_CONNECTION &&
b8907339
PR
1114 ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
1115 drbd_thread_restart_nowait(&mdev->tconn->receiver);
1116
1117 /* Resume AL writing if we get a connection */
28e448bb 1118 if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED) {
b8907339 1119 drbd_resume_al(mdev);
28e448bb
PR
1120 mdev->tconn->connect_cnt++;
1121 }
b8907339 1122
07be15b1
LE
1123 /* remember last attach time so request_timer_fn() won't
1124 * kill newly established sessions while we are still trying to thaw
1125 * previously frozen IO */
1126 if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
1127 ns.disk > D_NEGOTIATING)
1128 mdev->last_reattach_jif = jiffies;
1129
b8907339
PR
1130 ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
1131 if (ascw) {
1132 ascw->os = os;
1133 ascw->ns = ns;
1134 ascw->flags = flags;
1135 ascw->w.cb = w_after_state_ch;
a21e9298 1136 ascw->w.mdev = mdev;
b8907339 1137 ascw->done = done;
d5b27b01 1138 drbd_queue_work(&mdev->tconn->sender_work, &ascw->w);
b8907339 1139 } else {
bbeb641c 1140 dev_err(DEV, "Could not kmalloc an ascw\n");
b8907339
PR
1141 }
1142
1143 return rv;
1144}
1145
99920dc5 1146static int w_after_state_ch(struct drbd_work *w, int unused)
b8907339
PR
1147{
1148 struct after_state_chg_work *ascw =
1149 container_of(w, struct after_state_chg_work, w);
00d56944 1150 struct drbd_conf *mdev = w->mdev;
b8907339
PR
1151
1152 after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
1153 if (ascw->flags & CS_WAIT_COMPLETE) {
1154 D_ASSERT(ascw->done != NULL);
1155 complete(ascw->done);
1156 }
1157 kfree(ascw);
1158
99920dc5 1159 return 0;
b8907339
PR
1160}
1161
1162static void abw_start_sync(struct drbd_conf *mdev, int rv)
1163{
1164 if (rv) {
1165 dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
1166 _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
1167 return;
1168 }
1169
1170 switch (mdev->state.conn) {
1171 case C_STARTING_SYNC_T:
1172 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
1173 break;
1174 case C_STARTING_SYNC_S:
1175 drbd_start_resync(mdev, C_SYNC_SOURCE);
1176 break;
1177 }
1178}
1179
1180int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
1181 int (*io_fn)(struct drbd_conf *),
1182 char *why, enum bm_flag flags)
1183{
1184 int rv;
1185
1186 D_ASSERT(current == mdev->tconn->worker.task);
1187
1188 /* open coded non-blocking drbd_suspend_io(mdev); */
1189 set_bit(SUSPEND_IO, &mdev->flags);
1190
1191 drbd_bm_lock(mdev, why, flags);
1192 rv = io_fn(mdev);
1193 drbd_bm_unlock(mdev);
1194
1195 drbd_resume_io(mdev);
1196
1197 return rv;
1198}
1199
1200/**
1201 * after_state_ch() - Perform after state change actions that may sleep
1202 * @mdev: DRBD device.
1203 * @os: old state.
1204 * @ns: new state.
1205 * @flags: Flags
1206 */
1207static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
1208 union drbd_state ns, enum chg_state_flags flags)
1209{
3b98c0c2
LE
1210 struct sib_info sib;
1211
1212 sib.sib_reason = SIB_STATE_CHANGE;
1213 sib.os = os;
1214 sib.ns = ns;
b8907339
PR
1215
1216 if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
1217 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1218 if (mdev->p_uuid)
1219 mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
1220 }
1221
b8907339 1222 /* Inform userspace about the change... */
3b98c0c2 1223 drbd_bcast_event(mdev, &sib);
b8907339
PR
1224
1225 if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
1226 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
1227 drbd_khelper(mdev, "pri-on-incon-degr");
1228
1229 /* Here we have the actions that are performed after a
1230 state change. This function might sleep */
1231
b8907339 1232 if (ns.susp_nod) {
892fdd1a 1233 struct drbd_tconn *tconn = mdev->tconn;
a6d00c8e
PR
1234 enum drbd_req_event what = NOTHING;
1235
892fdd1a
PR
1236 spin_lock_irq(&tconn->req_lock);
1237 if (os.conn < C_CONNECTED && conn_lowest_conn(tconn) >= C_CONNECTED)
b8907339
PR
1238 what = RESEND;
1239
3fb4746d 1240 if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
892fdd1a 1241 conn_lowest_disk(tconn) > D_NEGOTIATING)
b8907339
PR
1242 what = RESTART_FROZEN_DISK_IO;
1243
892fdd1a
PR
1244 if (tconn->susp_nod && what != NOTHING) {
1245 _tl_restart(tconn, what);
1246 _conn_request_state(tconn,
1247 (union drbd_state) { { .susp_nod = 1 } },
1248 (union drbd_state) { { .susp_nod = 0 } },
1249 CS_VERBOSE);
b8907339 1250 }
892fdd1a 1251 spin_unlock_irq(&tconn->req_lock);
b8907339
PR
1252 }
1253
88f79ec4
PR
1254 if (ns.susp_fen) {
1255 struct drbd_tconn *tconn = mdev->tconn;
1256
1257 spin_lock_irq(&tconn->req_lock);
1258 if (tconn->susp_fen && conn_lowest_conn(tconn) >= C_CONNECTED) {
1259 /* case2: The connection was established again: */
1260 struct drbd_conf *odev;
1261 int vnr;
1262
1263 rcu_read_lock();
1264 idr_for_each_entry(&tconn->volumes, odev, vnr)
1265 clear_bit(NEW_CUR_UUID, &odev->flags);
1266 rcu_read_unlock();
1267 _tl_restart(tconn, RESEND);
1268 _conn_request_state(tconn,
1269 (union drbd_state) { { .susp_fen = 1 } },
1270 (union drbd_state) { { .susp_fen = 0 } },
1271 CS_VERBOSE);
1272 }
1273 spin_unlock_irq(&tconn->req_lock);
1274 }
1275
b8907339
PR
1276 /* Became sync source. With protocol >= 96, we still need to send out
1277 * the sync uuid now. Need to do that before any drbd_send_state, or
1278 * the other side may go "paused sync" before receiving the sync uuids,
1279 * which is unexpected. */
1280 if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
1281 (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
1282 mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
1283 drbd_gen_and_send_sync_uuid(mdev);
1284 put_ldev(mdev);
1285 }
1286
1287 /* Do not change the order of the if above and the two below... */
369bea63
PR
1288 if (os.pdsk == D_DISKLESS &&
1289 ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */
a324896b
LE
1290 /* we probably will start a resync soon.
1291 * make sure those things are properly reset. */
1292 mdev->rs_total = 0;
1293 mdev->rs_failed = 0;
1294 atomic_set(&mdev->rs_pending_cnt, 0);
1295 drbd_rs_cancel_all(mdev);
1296
b8907339 1297 drbd_send_uuids(mdev);
43de7c85 1298 drbd_send_state(mdev, ns);
b8907339
PR
1299 }
1300 /* No point in queuing send_bitmap if we don't have a connection
1301 * anymore, so check also the _current_ state, not only the new state
1302 * at the time this work was queued. */
1303 if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
1304 mdev->state.conn == C_WF_BITMAP_S)
1305 drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
1306 "send_bitmap (WFBitMapS)",
1307 BM_LOCKED_TEST_ALLOWED);
1308
1309 /* Lost contact to peer's copy of the data */
1310 if ((os.pdsk >= D_INCONSISTENT &&
1311 os.pdsk != D_UNKNOWN &&
1312 os.pdsk != D_OUTDATED)
1313 && (ns.pdsk < D_INCONSISTENT ||
1314 ns.pdsk == D_UNKNOWN ||
1315 ns.pdsk == D_OUTDATED)) {
1316 if (get_ldev(mdev)) {
1317 if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
1318 mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
2aebfabb 1319 if (drbd_suspended(mdev)) {
b8907339
PR
1320 set_bit(NEW_CUR_UUID, &mdev->flags);
1321 } else {
1322 drbd_uuid_new_current(mdev);
1323 drbd_send_uuids(mdev);
1324 }
1325 }
1326 put_ldev(mdev);
1327 }
1328 }
1329
1330 if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
0cfac5dd
PR
1331 if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY &&
1332 mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
1333 drbd_uuid_new_current(mdev);
1334 drbd_send_uuids(mdev);
1335 }
b8907339
PR
1336 /* D_DISKLESS Peer becomes secondary */
1337 if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
1338 /* We may still be Primary ourselves.
1339 * No harm done if the bitmap still changes,
1340 * redirtied pages will follow later. */
1341 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1342 "demote diskless peer", BM_LOCKED_SET_ALLOWED);
1343 put_ldev(mdev);
1344 }
1345
1346 /* Write out all changed bits on demote.
1347 * Though, no need to da that just yet
1348 * if there is a resync going on still */
1349 if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
1350 mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
1351 /* No changes to the bitmap expected this time, so assert that,
1352 * even though no harm was done if it did change. */
1353 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1354 "demote", BM_LOCKED_TEST_ALLOWED);
1355 put_ldev(mdev);
1356 }
1357
1358 /* Last part of the attaching process ... */
1359 if (ns.conn >= C_CONNECTED &&
1360 os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
1361 drbd_send_sizes(mdev, 0, 0); /* to start sync... */
1362 drbd_send_uuids(mdev);
43de7c85 1363 drbd_send_state(mdev, ns);
b8907339
PR
1364 }
1365
1366 /* We want to pause/continue resync, tell peer. */
1367 if (ns.conn >= C_CONNECTED &&
1368 ((os.aftr_isp != ns.aftr_isp) ||
1369 (os.user_isp != ns.user_isp)))
43de7c85 1370 drbd_send_state(mdev, ns);
b8907339
PR
1371
1372 /* In case one of the isp bits got set, suspend other devices. */
1373 if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
1374 (ns.aftr_isp || ns.peer_isp || ns.user_isp))
1375 suspend_other_sg(mdev);
1376
1377 /* Make sure the peer gets informed about eventual state
1378 changes (ISP bits) while we were in WFReportParams. */
1379 if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
43de7c85 1380 drbd_send_state(mdev, ns);
b8907339
PR
1381
1382 if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
43de7c85 1383 drbd_send_state(mdev, ns);
b8907339
PR
1384
1385 /* We are in the progress to start a full sync... */
1386 if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
1387 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
1388 /* no other bitmap changes expected during this phase */
1389 drbd_queue_bitmap_io(mdev,
1390 &drbd_bmio_set_n_write, &abw_start_sync,
1391 "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
1392
b8907339
PR
1393 /* first half of local IO error, failure to attach,
1394 * or administrative detach */
1395 if (os.disk != D_FAILED && ns.disk == D_FAILED) {
32db80f6
PR
1396 enum drbd_io_error_p eh = EP_PASS_ON;
1397 int was_io_error = 0;
b8907339 1398 /* corresponding get_ldev was in __drbd_set_state, to serialize
32db80f6
PR
1399 * our cleanup here with the transition to D_DISKLESS.
1400 * But is is still not save to dreference ldev here, since
1401 * we might come from an failed Attach before ldev was set. */
1402 if (mdev->ldev) {
1403 rcu_read_lock();
1404 eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
1405 rcu_read_unlock();
1406
1407 was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
1408
6f1a6563
LE
1409 if (was_io_error && eh == EP_CALL_HELPER)
1410 drbd_khelper(mdev, "local-io-error");
1411
0c849666
LE
1412 /* Immediately allow completion of all application IO,
1413 * that waits for completion from the local disk,
1414 * if this was a force-detach due to disk_timeout
1415 * or administrator request (drbdsetup detach --force).
1416 * Do NOT abort otherwise.
1417 * Aborting local requests may cause serious problems,
1418 * if requests are completed to upper layers already,
1419 * and then later the already submitted local bio completes.
1420 * This can cause DMA into former bio pages that meanwhile
1421 * have been re-used for other things.
1422 * So aborting local requests may cause crashes,
1423 * or even worse, silent data corruption.
1424 */
1425 if (test_and_clear_bit(FORCE_DETACH, &mdev->flags))
1426 tl_abort_disk_io(mdev);
32db80f6
PR
1427
1428 /* current state still has to be D_FAILED,
1429 * there is only one way out: to D_DISKLESS,
1430 * and that may only happen after our put_ldev below. */
1431 if (mdev->state.disk != D_FAILED)
1432 dev_err(DEV,
1433 "ASSERT FAILED: disk is %s during detach\n",
1434 drbd_disk_str(mdev->state.disk));
1435
1436 if (ns.conn >= C_CONNECTED)
1437 drbd_send_state(mdev, ns);
1438
1439 drbd_rs_cancel_all(mdev);
1440
1441 /* In case we want to get something to stable storage still,
1442 * this may be the last chance.
1443 * Following put_ldev may transition to D_DISKLESS. */
1444 drbd_md_sync(mdev);
1445 }
b8907339 1446 put_ldev(mdev);
b8907339
PR
1447 }
1448
1449 /* second half of local IO error, failure to attach,
1450 * or administrative detach,
1451 * after local_cnt references have reached zero again */
1452 if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
1453 /* We must still be diskless,
1454 * re-attach has to be serialized with this! */
1455 if (mdev->state.disk != D_DISKLESS)
1456 dev_err(DEV,
1457 "ASSERT FAILED: disk is %s while going diskless\n",
1458 drbd_disk_str(mdev->state.disk));
1459
6ab9b1b6
PR
1460 if (ns.conn >= C_CONNECTED)
1461 drbd_send_state(mdev, ns);
b8907339
PR
1462 /* corresponding get_ldev in __drbd_set_state
1463 * this may finally trigger drbd_ldev_destroy. */
1464 put_ldev(mdev);
1465 }
1466
1467 /* Notify peer that I had a local IO error, and did not detached.. */
6ab9b1b6 1468 if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED)
43de7c85 1469 drbd_send_state(mdev, ns);
b8907339
PR
1470
1471 /* Disks got bigger while they were detached */
1472 if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
1473 test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
1474 if (ns.conn == C_CONNECTED)
1475 resync_after_online_grow(mdev);
1476 }
1477
1478 /* A resync finished or aborted, wake paused devices... */
1479 if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
1480 (os.peer_isp && !ns.peer_isp) ||
1481 (os.user_isp && !ns.user_isp))
1482 resume_next_sg(mdev);
1483
1484 /* sync target done with resync. Explicitly notify peer, even though
1485 * it should (at least for non-empty resyncs) already know itself. */
1486 if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
43de7c85 1487 drbd_send_state(mdev, ns);
b8907339 1488
58ffa580
LE
1489 /* Verify finished, or reached stop sector. Peer did not know about
1490 * the stop sector, and we may even have changed the stop sector during
1491 * verify to interrupt/stop early. Send the new state. */
1492 if (os.conn == C_VERIFY_S && ns.conn == C_CONNECTED
1493 && verify_can_do_stop_sector(mdev))
1494 drbd_send_state(mdev, ns);
1495
b8907339
PR
1496 /* This triggers bitmap writeout of potentially still unwritten pages
1497 * if the resync finished cleanly, or aborted because of peer disk
1498 * failure, or because of connection loss.
1499 * For resync aborted because of local disk failure, we cannot do
1500 * any bitmap writeout anymore.
1501 * No harm done if some bits change during this phase.
1502 */
1503 if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
a220d291
LE
1504 drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL,
1505 "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED);
b8907339
PR
1506 put_ldev(mdev);
1507 }
1508
1509 if (ns.disk == D_DISKLESS &&
1510 ns.conn == C_STANDALONE &&
1511 ns.role == R_SECONDARY) {
1512 if (os.aftr_isp != ns.aftr_isp)
1513 resume_next_sg(mdev);
1514 }
1515
b8907339
PR
1516 drbd_md_sync(mdev);
1517}
1518
bbeb641c
PR
1519struct after_conn_state_chg_work {
1520 struct drbd_work w;
1521 enum drbd_conns oc;
8c7e16c3 1522 union drbd_state ns_min;
5f082f98 1523 union drbd_state ns_max; /* new, max state, over all mdevs */
bbeb641c
PR
1524 enum chg_state_flags flags;
1525};
1526
99920dc5 1527static int w_after_conn_state_ch(struct drbd_work *w, int unused)
bbeb641c
PR
1528{
1529 struct after_conn_state_chg_work *acscw =
1530 container_of(w, struct after_conn_state_chg_work, w);
1531 struct drbd_tconn *tconn = w->tconn;
1532 enum drbd_conns oc = acscw->oc;
5f082f98 1533 union drbd_state ns_max = acscw->ns_max;
a6d00c8e
PR
1534 struct drbd_conf *mdev;
1535 int vnr;
bbeb641c
PR
1536
1537 kfree(acscw);
1538
b8907339 1539 /* Upon network configuration, we need to start the receiver */
5f082f98 1540 if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
b8907339
PR
1541 drbd_thread_start(&tconn->receiver);
1542
f3dfa40a
LE
1543 if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
1544 struct net_conf *old_conf;
1545
a0095508 1546 mutex_lock(&tconn->conf_update);
f3dfa40a 1547 old_conf = tconn->net_conf;
089c075d
AG
1548 tconn->my_addr_len = 0;
1549 tconn->peer_addr_len = 0;
f3dfa40a
LE
1550 rcu_assign_pointer(tconn->net_conf, NULL);
1551 conn_free_crypto(tconn);
a0095508 1552 mutex_unlock(&tconn->conf_update);
f3dfa40a
LE
1553
1554 synchronize_rcu();
1555 kfree(old_conf);
1556 }
1557
a6d00c8e
PR
1558 if (ns_max.susp_fen) {
1559 /* case1: The outdate peer handler is successful: */
1560 if (ns_max.pdsk <= D_OUTDATED) {
695d08fa 1561 rcu_read_lock();
a6d00c8e
PR
1562 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1563 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
1564 drbd_uuid_new_current(mdev);
1565 clear_bit(NEW_CUR_UUID, &mdev->flags);
1566 }
1567 }
695d08fa 1568 rcu_read_unlock();
8a0bab2a
PR
1569 spin_lock_irq(&tconn->req_lock);
1570 _tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING);
1571 _conn_request_state(tconn,
1572 (union drbd_state) { { .susp_fen = 1 } },
1573 (union drbd_state) { { .susp_fen = 0 } },
1574 CS_VERBOSE);
1575 spin_unlock_irq(&tconn->req_lock);
a6d00c8e 1576 }
a6d00c8e 1577 }
9dc9fbb3 1578 kref_put(&tconn->kref, &conn_destroy);
19fffd7b
PR
1579
1580 conn_md_sync(tconn);
1581
99920dc5 1582 return 0;
bbeb641c
PR
1583}
1584
435693e8 1585void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
88ef594e 1586{
435693e8 1587 enum chg_state_flags flags = ~0;
88ef594e 1588 struct drbd_conf *mdev;
435693e8 1589 int vnr, first_vol = 1;
e0e16653
PR
1590 union drbd_dev_state os, cs = {
1591 { .role = R_SECONDARY,
1592 .peer = R_UNKNOWN,
1593 .conn = tconn->cstate,
1594 .disk = D_DISKLESS,
1595 .pdsk = D_UNKNOWN,
1596 } };
88ef594e 1597
695d08fa 1598 rcu_read_lock();
88ef594e
PR
1599 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1600 os = mdev->state;
1601
435693e8
PR
1602 if (first_vol) {
1603 cs = os;
1604 first_vol = 0;
1605 continue;
1606 }
1607
1608 if (cs.role != os.role)
1609 flags &= ~CS_DC_ROLE;
1610
1611 if (cs.peer != os.peer)
1612 flags &= ~CS_DC_PEER;
1613
1614 if (cs.conn != os.conn)
1615 flags &= ~CS_DC_CONN;
88ef594e 1616
435693e8
PR
1617 if (cs.disk != os.disk)
1618 flags &= ~CS_DC_DISK;
88ef594e 1619
435693e8
PR
1620 if (cs.pdsk != os.pdsk)
1621 flags &= ~CS_DC_PDSK;
1622 }
695d08fa 1623 rcu_read_unlock();
435693e8
PR
1624
1625 *pf |= CS_DC_MASK;
1626 *pf &= flags;
da9fbc27 1627 (*pcs).i = cs.i;
88ef594e 1628}
bbeb641c 1629
bd0c824a
PR
1630static enum drbd_state_rv
1631conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
88ef594e 1632 enum chg_state_flags flags)
bbeb641c 1633{
bd0c824a 1634 enum drbd_state_rv rv = SS_SUCCESS;
bbeb641c 1635 union drbd_state ns, os;
bd0c824a
PR
1636 struct drbd_conf *mdev;
1637 int vnr;
bbeb641c 1638
695d08fa 1639 rcu_read_lock();
bd0c824a 1640 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
78bae59b 1641 os = drbd_read_state(mdev);
bd0c824a
PR
1642 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
1643
778bcf2e
PR
1644 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1645 ns.disk = os.disk;
1646
bd0c824a
PR
1647 if (ns.i == os.i)
1648 continue;
bbeb641c 1649
bd0c824a
PR
1650 rv = is_valid_transition(os, ns);
1651 if (rv < SS_SUCCESS)
1652 break;
1653
1654 if (!(flags & CS_HARD)) {
1655 rv = is_valid_state(mdev, ns);
1656 if (rv < SS_SUCCESS) {
1657 if (is_valid_state(mdev, os) == rv)
a1096a6e 1658 rv = is_valid_soft_transition(os, ns, tconn);
bd0c824a 1659 } else
a1096a6e 1660 rv = is_valid_soft_transition(os, ns, tconn);
bd0c824a
PR
1661 }
1662 if (rv < SS_SUCCESS)
1663 break;
bbeb641c 1664 }
695d08fa 1665 rcu_read_unlock();
bbeb641c 1666
bd0c824a
PR
1667 if (rv < SS_SUCCESS && flags & CS_VERBOSE)
1668 print_st_err(mdev, os, ns, rv);
1669
1670 return rv;
bbeb641c
PR
1671}
1672
8c7e16c3 1673void
bd0c824a 1674conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
8c7e16c3 1675 union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
bbeb641c 1676{
f132f554 1677 union drbd_state ns, os, ns_max = { };
8c7e16c3
PR
1678 union drbd_state ns_min = {
1679 { .role = R_MASK,
1680 .peer = R_MASK,
e0e16653 1681 .conn = val.conn,
8c7e16c3
PR
1682 .disk = D_MASK,
1683 .pdsk = D_MASK
1684 } };
bd0c824a 1685 struct drbd_conf *mdev;
bbeb641c 1686 enum drbd_state_rv rv;
f132f554 1687 int vnr, number_of_volumes = 0;
bbeb641c 1688
07be15b1
LE
1689 if (mask.conn == C_MASK) {
1690 /* remember last connect time so request_timer_fn() won't
1691 * kill newly established sessions while we are still trying to thaw
1692 * previously frozen IO */
1693 if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS)
1694 tconn->last_reconnect_jif = jiffies;
1695
bd0c824a 1696 tconn->cstate = val.conn;
07be15b1 1697 }
bd0c824a 1698
695d08fa 1699 rcu_read_lock();
bd0c824a 1700 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
f132f554 1701 number_of_volumes++;
78bae59b 1702 os = drbd_read_state(mdev);
bd0c824a
PR
1703 ns = apply_mask_val(os, mask, val);
1704 ns = sanitize_state(mdev, ns, NULL);
bbeb641c 1705
778bcf2e
PR
1706 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1707 ns.disk = os.disk;
1708
bd0c824a
PR
1709 rv = __drbd_set_state(mdev, ns, flags, NULL);
1710 if (rv < SS_SUCCESS)
1711 BUG();
bbeb641c 1712
8c7e16c3
PR
1713 ns.i = mdev->state.i;
1714 ns_max.role = max_role(ns.role, ns_max.role);
1715 ns_max.peer = max_role(ns.peer, ns_max.peer);
1716 ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
1717 ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
1718 ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
1719
1720 ns_min.role = min_role(ns.role, ns_min.role);
1721 ns_min.peer = min_role(ns.peer, ns_min.peer);
1722 ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
1723 ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
1724 ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
bd0c824a 1725 }
695d08fa 1726 rcu_read_unlock();
bbeb641c 1727
f132f554
PR
1728 if (number_of_volumes == 0) {
1729 ns_min = ns_max = (union drbd_state) { {
1730 .role = R_SECONDARY,
1731 .peer = R_UNKNOWN,
1732 .conn = val.conn,
1733 .disk = D_DISKLESS,
1734 .pdsk = D_UNKNOWN
1735 } };
1736 }
1737
8c7e16c3
PR
1738 ns_min.susp = ns_max.susp = tconn->susp;
1739 ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
1740 ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
1741
1742 *pns_min = ns_min;
1743 *pns_max = ns_max;
bbeb641c
PR
1744}
1745
df24aa45
PR
1746static enum drbd_state_rv
1747_conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
1748{
df24aa45
PR
1749 enum drbd_state_rv rv;
1750
1751 if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
1752 return SS_CW_SUCCESS;
1753
1754 if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
1755 return SS_CW_FAILED_BY_PEER;
1756
2bd5ed5d
PR
1757 rv = conn_is_valid_transition(tconn, mask, val, 0);
1758 if (rv == SS_SUCCESS && tconn->cstate == C_WF_REPORT_PARAMS)
1759 rv = SS_UNKNOWN_ERROR; /* continue waiting */
df24aa45 1760
df24aa45
PR
1761 return rv;
1762}
1763
bbeb641c
PR
1764enum drbd_state_rv
1765_conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1766 enum chg_state_flags flags)
1767{
1768 enum drbd_state_rv rv = SS_SUCCESS;
bbeb641c
PR
1769 struct after_conn_state_chg_work *acscw;
1770 enum drbd_conns oc = tconn->cstate;
8c7e16c3 1771 union drbd_state ns_max, ns_min, os;
c02abda2 1772 bool have_mutex = false;
bbeb641c 1773
07fc9619
PR
1774 if (mask.conn) {
1775 rv = is_valid_conn_transition(oc, val.conn);
1776 if (rv < SS_SUCCESS)
1777 goto abort;
1778 }
bbeb641c 1779
88ef594e 1780 rv = conn_is_valid_transition(tconn, mask, val, flags);
bbeb641c
PR
1781 if (rv < SS_SUCCESS)
1782 goto abort;
1783
df24aa45
PR
1784 if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
1785 !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
c02abda2
LE
1786
1787 /* This will be a cluster-wide state change.
1788 * Need to give up the spinlock, grab the mutex,
1789 * then send the state change request, ... */
1790 spin_unlock_irq(&tconn->req_lock);
1791 mutex_lock(&tconn->cstate_mutex);
1792 have_mutex = true;
1793
1794 set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
1795 if (conn_send_state_req(tconn, mask, val)) {
1796 /* sending failed. */
1797 clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
1798 rv = SS_CW_FAILED_BY_PEER;
1799 /* need to re-aquire the spin lock, though */
1800 goto abort_unlocked;
1801 }
1802
1803 if (val.conn == C_DISCONNECTING)
1804 set_bit(DISCONNECT_SENT, &tconn->flags);
1805
1806 /* ... and re-aquire the spinlock.
1807 * If _conn_rq_cond() returned >= SS_SUCCESS, we must call
1808 * conn_set_state() within the same spinlock. */
1809 spin_lock_irq(&tconn->req_lock);
1810 wait_event_lock_irq(tconn->ping_wait,
1811 (rv = _conn_rq_cond(tconn, mask, val)),
2cecb730 1812 tconn->req_lock);
c02abda2 1813 clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
df24aa45
PR
1814 if (rv < SS_SUCCESS)
1815 goto abort;
1816 }
1817
435693e8 1818 conn_old_common_state(tconn, &os, &flags);
706cb24c 1819 flags |= CS_DC_SUSP;
8c7e16c3 1820 conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
5f082f98 1821 conn_pr_state_change(tconn, os, ns_max, flags);
bbeb641c
PR
1822
1823 acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
1824 if (acscw) {
435693e8 1825 acscw->oc = os.conn;
8c7e16c3 1826 acscw->ns_min = ns_min;
5f082f98 1827 acscw->ns_max = ns_max;
bbeb641c
PR
1828 acscw->flags = flags;
1829 acscw->w.cb = w_after_conn_state_ch;
9dc9fbb3 1830 kref_get(&tconn->kref);
bbeb641c 1831 acscw->w.tconn = tconn;
d5b27b01 1832 drbd_queue_work(&tconn->sender_work, &acscw->w);
bbeb641c
PR
1833 } else {
1834 conn_err(tconn, "Could not kmalloc an acscw\n");
b8907339 1835 }
bbeb641c 1836
a01842eb 1837 abort:
c02abda2
LE
1838 if (have_mutex) {
1839 /* mutex_unlock() "... must not be used in interrupt context.",
1840 * so give up the spinlock, then re-aquire it */
1841 spin_unlock_irq(&tconn->req_lock);
1842 abort_unlocked:
1843 mutex_unlock(&tconn->cstate_mutex);
1844 spin_lock_irq(&tconn->req_lock);
1845 }
1846 if (rv < SS_SUCCESS && flags & CS_VERBOSE) {
a01842eb 1847 conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv));
4ae98b4d
PR
1848 conn_err(tconn, " mask = 0x%x val = 0x%x\n", mask.i, val.i);
1849 conn_err(tconn, " old_conn:%s wanted_conn:%s\n", drbd_conn_str(oc), drbd_conn_str(val.conn));
a01842eb 1850 }
bbeb641c
PR
1851 return rv;
1852}
1853
1854enum drbd_state_rv
1855conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1856 enum chg_state_flags flags)
1857{
1858 enum drbd_state_rv rv;
1859
1860 spin_lock_irq(&tconn->req_lock);
1861 rv = _conn_request_state(tconn, mask, val, flags);
1862 spin_unlock_irq(&tconn->req_lock);
1863
1864 return rv;
b8907339 1865}
This page took 0.149704 seconds and 5 git commands to generate.