Commit | Line | Data |
---|---|---|
b8907339 PR |
1 | /* |
2 | drbd_state.c | |
3 | ||
4 | This file is part of DRBD by Philipp Reisner and Lars Ellenberg. | |
5 | ||
6 | Copyright (C) 2001-2008, LINBIT Information Technologies GmbH. | |
7 | Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>. | |
8 | Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>. | |
9 | ||
10 | Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev | |
11 | from Logicworks, Inc. for making SDP replication support possible. | |
12 | ||
13 | drbd is free software; you can redistribute it and/or modify | |
14 | it under the terms of the GNU General Public License as published by | |
15 | the Free Software Foundation; either version 2, or (at your option) | |
16 | any later version. | |
17 | ||
18 | drbd is distributed in the hope that it will be useful, | |
19 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
21 | GNU General Public License for more details. | |
22 | ||
23 | You should have received a copy of the GNU General Public License | |
24 | along with drbd; see the file COPYING. If not, write to | |
25 | the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. | |
26 | */ | |
27 | ||
28 | #include <linux/drbd_limits.h> | |
29 | #include "drbd_int.h" | |
30 | #include "drbd_req.h" | |
31 | ||
cdfda633 | 32 | /* in drbd_main.c */ |
71fc7eed | 33 | extern void tl_abort_disk_io(struct drbd_conf *mdev); |
cdfda633 | 34 | |
b8907339 PR |
35 | struct after_state_chg_work { |
36 | struct drbd_work w; | |
37 | union drbd_state os; | |
38 | union drbd_state ns; | |
39 | enum chg_state_flags flags; | |
40 | struct completion *done; | |
41 | }; | |
42 | ||
d942ae44 PR |
43 | enum sanitize_state_warnings { |
44 | NO_WARNING, | |
45 | ABORTED_ONLINE_VERIFY, | |
46 | ABORTED_RESYNC, | |
47 | CONNECTION_LOST_NEGOTIATING, | |
48 | IMPLICITLY_UPGRADED_DISK, | |
49 | IMPLICITLY_UPGRADED_PDSK, | |
50 | }; | |
51 | ||
99920dc5 | 52 | static int w_after_state_ch(struct drbd_work *w, int unused); |
b8907339 PR |
53 | static void after_state_ch(struct drbd_conf *mdev, union drbd_state os, |
54 | union drbd_state ns, enum chg_state_flags flags); | |
a75f34ad | 55 | static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state); |
a1096a6e | 56 | static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *); |
3509502d | 57 | static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns); |
4308a0a3 | 58 | static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns, |
d942ae44 | 59 | enum sanitize_state_warnings *warn); |
b8907339 | 60 | |
2aebfabb PR |
61 | static inline bool is_susp(union drbd_state s) |
62 | { | |
63 | return s.susp || s.susp_nod || s.susp_fen; | |
64 | } | |
65 | ||
d0456c72 | 66 | bool conn_all_vols_unconf(struct drbd_tconn *tconn) |
0e29d163 PR |
67 | { |
68 | struct drbd_conf *mdev; | |
695d08fa | 69 | bool rv = true; |
e90285e0 | 70 | int vnr; |
0e29d163 | 71 | |
695d08fa | 72 | rcu_read_lock(); |
e90285e0 | 73 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
d0456c72 LE |
74 | if (mdev->state.disk != D_DISKLESS || |
75 | mdev->state.conn != C_STANDALONE || | |
695d08fa PR |
76 | mdev->state.role != R_SECONDARY) { |
77 | rv = false; | |
78 | break; | |
79 | } | |
0e29d163 | 80 | } |
695d08fa PR |
81 | rcu_read_unlock(); |
82 | ||
83 | return rv; | |
0e29d163 PR |
84 | } |
85 | ||
cb703454 PR |
86 | /* Unfortunately the states where not correctly ordered, when |
87 | they where defined. therefore can not use max_t() here. */ | |
88 | static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2) | |
89 | { | |
90 | if (role1 == R_PRIMARY || role2 == R_PRIMARY) | |
91 | return R_PRIMARY; | |
92 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
93 | return R_SECONDARY; | |
94 | return R_UNKNOWN; | |
95 | } | |
96 | static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2) | |
97 | { | |
98 | if (role1 == R_UNKNOWN || role2 == R_UNKNOWN) | |
99 | return R_UNKNOWN; | |
100 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
101 | return R_SECONDARY; | |
102 | return R_PRIMARY; | |
103 | } | |
104 | ||
105 | enum drbd_role conn_highest_role(struct drbd_tconn *tconn) | |
106 | { | |
107 | enum drbd_role role = R_UNKNOWN; | |
108 | struct drbd_conf *mdev; | |
109 | int vnr; | |
110 | ||
695d08fa | 111 | rcu_read_lock(); |
cb703454 PR |
112 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
113 | role = max_role(role, mdev->state.role); | |
695d08fa | 114 | rcu_read_unlock(); |
cb703454 PR |
115 | |
116 | return role; | |
117 | } | |
118 | ||
119 | enum drbd_role conn_highest_peer(struct drbd_tconn *tconn) | |
120 | { | |
121 | enum drbd_role peer = R_UNKNOWN; | |
122 | struct drbd_conf *mdev; | |
123 | int vnr; | |
124 | ||
695d08fa | 125 | rcu_read_lock(); |
cb703454 PR |
126 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
127 | peer = max_role(peer, mdev->state.peer); | |
695d08fa | 128 | rcu_read_unlock(); |
cb703454 PR |
129 | |
130 | return peer; | |
131 | } | |
132 | ||
133 | enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn) | |
134 | { | |
135 | enum drbd_disk_state ds = D_DISKLESS; | |
136 | struct drbd_conf *mdev; | |
137 | int vnr; | |
138 | ||
695d08fa | 139 | rcu_read_lock(); |
cb703454 PR |
140 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
141 | ds = max_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 142 | rcu_read_unlock(); |
cb703454 PR |
143 | |
144 | return ds; | |
145 | } | |
146 | ||
4669265a PR |
147 | enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn) |
148 | { | |
149 | enum drbd_disk_state ds = D_MASK; | |
150 | struct drbd_conf *mdev; | |
151 | int vnr; | |
152 | ||
695d08fa | 153 | rcu_read_lock(); |
4669265a PR |
154 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
155 | ds = min_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 156 | rcu_read_unlock(); |
4669265a PR |
157 | |
158 | return ds; | |
159 | } | |
160 | ||
cb703454 PR |
161 | enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn) |
162 | { | |
163 | enum drbd_disk_state ds = D_DISKLESS; | |
164 | struct drbd_conf *mdev; | |
165 | int vnr; | |
166 | ||
695d08fa | 167 | rcu_read_lock(); |
cb703454 PR |
168 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
169 | ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk); | |
695d08fa | 170 | rcu_read_unlock(); |
cb703454 PR |
171 | |
172 | return ds; | |
173 | } | |
174 | ||
19f83c76 PR |
175 | enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn) |
176 | { | |
177 | enum drbd_conns conn = C_MASK; | |
178 | struct drbd_conf *mdev; | |
179 | int vnr; | |
180 | ||
695d08fa | 181 | rcu_read_lock(); |
19f83c76 PR |
182 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
183 | conn = min_t(enum drbd_conns, conn, mdev->state.conn); | |
695d08fa | 184 | rcu_read_unlock(); |
19f83c76 PR |
185 | |
186 | return conn; | |
187 | } | |
188 | ||
79702011 PR |
189 | static bool no_peer_wf_report_params(struct drbd_tconn *tconn) |
190 | { | |
191 | struct drbd_conf *mdev; | |
192 | int vnr; | |
193 | bool rv = true; | |
194 | ||
195 | rcu_read_lock(); | |
196 | idr_for_each_entry(&tconn->volumes, mdev, vnr) | |
197 | if (mdev->state.conn == C_WF_REPORT_PARAMS) { | |
198 | rv = false; | |
199 | break; | |
200 | } | |
201 | rcu_read_unlock(); | |
202 | ||
203 | return rv; | |
204 | } | |
205 | ||
206 | ||
b8907339 PR |
207 | /** |
208 | * cl_wide_st_chg() - true if the state change is a cluster wide one | |
209 | * @mdev: DRBD device. | |
210 | * @os: old (current) state. | |
211 | * @ns: new (wanted) state. | |
212 | */ | |
213 | static int cl_wide_st_chg(struct drbd_conf *mdev, | |
214 | union drbd_state os, union drbd_state ns) | |
215 | { | |
216 | return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED && | |
217 | ((os.role != R_PRIMARY && ns.role == R_PRIMARY) || | |
218 | (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
219 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) || | |
e8744f5a | 220 | (os.disk != D_FAILED && ns.disk == D_FAILED))) || |
b8907339 | 221 | (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) || |
369bea63 PR |
222 | (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) || |
223 | (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS); | |
b8907339 PR |
224 | } |
225 | ||
56707f9e PR |
226 | static union drbd_state |
227 | apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val) | |
228 | { | |
229 | union drbd_state ns; | |
230 | ns.i = (os.i & ~mask.i) | val.i; | |
231 | return ns; | |
232 | } | |
233 | ||
b8907339 PR |
234 | enum drbd_state_rv |
235 | drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f, | |
236 | union drbd_state mask, union drbd_state val) | |
237 | { | |
238 | unsigned long flags; | |
56707f9e | 239 | union drbd_state ns; |
b8907339 PR |
240 | enum drbd_state_rv rv; |
241 | ||
242 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 243 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 244 | rv = _drbd_set_state(mdev, ns, f, NULL); |
b8907339 PR |
245 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
246 | ||
247 | return rv; | |
248 | } | |
249 | ||
250 | /** | |
251 | * drbd_force_state() - Impose a change which happens outside our control on our state | |
252 | * @mdev: DRBD device. | |
253 | * @mask: mask of state bits to change. | |
254 | * @val: value of new state bits. | |
255 | */ | |
256 | void drbd_force_state(struct drbd_conf *mdev, | |
257 | union drbd_state mask, union drbd_state val) | |
258 | { | |
259 | drbd_change_state(mdev, CS_HARD, mask, val); | |
260 | } | |
261 | ||
262 | static enum drbd_state_rv | |
263 | _req_st_cond(struct drbd_conf *mdev, union drbd_state mask, | |
264 | union drbd_state val) | |
265 | { | |
266 | union drbd_state os, ns; | |
267 | unsigned long flags; | |
268 | enum drbd_state_rv rv; | |
269 | ||
270 | if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags)) | |
271 | return SS_CW_SUCCESS; | |
272 | ||
273 | if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags)) | |
274 | return SS_CW_FAILED_BY_PEER; | |
275 | ||
b8907339 | 276 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); |
78bae59b | 277 | os = drbd_read_state(mdev); |
56707f9e | 278 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d | 279 | rv = is_valid_transition(os, ns); |
a3025a27 | 280 | if (rv >= SS_SUCCESS) |
3509502d | 281 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ |
b8907339 PR |
282 | |
283 | if (!cl_wide_st_chg(mdev, os, ns)) | |
284 | rv = SS_CW_NO_NEED; | |
3509502d | 285 | if (rv == SS_UNKNOWN_ERROR) { |
b8907339 | 286 | rv = is_valid_state(mdev, ns); |
a3025a27 | 287 | if (rv >= SS_SUCCESS) { |
a1096a6e | 288 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
a3025a27 | 289 | if (rv >= SS_SUCCESS) |
b8907339 PR |
290 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ |
291 | } | |
292 | } | |
293 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
294 | ||
295 | return rv; | |
296 | } | |
297 | ||
298 | /** | |
299 | * drbd_req_state() - Perform an eventually cluster wide state change | |
300 | * @mdev: DRBD device. | |
301 | * @mask: mask of state bits to change. | |
302 | * @val: value of new state bits. | |
303 | * @f: flags | |
304 | * | |
305 | * Should not be called directly, use drbd_request_state() or | |
306 | * _drbd_request_state(). | |
307 | */ | |
308 | static enum drbd_state_rv | |
309 | drbd_req_state(struct drbd_conf *mdev, union drbd_state mask, | |
310 | union drbd_state val, enum chg_state_flags f) | |
311 | { | |
312 | struct completion done; | |
313 | unsigned long flags; | |
314 | union drbd_state os, ns; | |
315 | enum drbd_state_rv rv; | |
316 | ||
317 | init_completion(&done); | |
318 | ||
319 | if (f & CS_SERIALIZE) | |
8410da8f | 320 | mutex_lock(mdev->state_mutex); |
b8907339 PR |
321 | |
322 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 323 | os = drbd_read_state(mdev); |
56707f9e | 324 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d | 325 | rv = is_valid_transition(os, ns); |
3c5e5f6a LE |
326 | if (rv < SS_SUCCESS) { |
327 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
3509502d | 328 | goto abort; |
3c5e5f6a | 329 | } |
b8907339 PR |
330 | |
331 | if (cl_wide_st_chg(mdev, os, ns)) { | |
332 | rv = is_valid_state(mdev, ns); | |
333 | if (rv == SS_SUCCESS) | |
a1096a6e | 334 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
335 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
336 | ||
337 | if (rv < SS_SUCCESS) { | |
338 | if (f & CS_VERBOSE) | |
339 | print_st_err(mdev, os, ns, rv); | |
340 | goto abort; | |
341 | } | |
342 | ||
d24ae219 | 343 | if (drbd_send_state_req(mdev, mask, val)) { |
b8907339 PR |
344 | rv = SS_CW_FAILED_BY_PEER; |
345 | if (f & CS_VERBOSE) | |
346 | print_st_err(mdev, os, ns, rv); | |
347 | goto abort; | |
348 | } | |
349 | ||
350 | wait_event(mdev->state_wait, | |
351 | (rv = _req_st_cond(mdev, mask, val))); | |
352 | ||
353 | if (rv < SS_SUCCESS) { | |
b8907339 PR |
354 | if (f & CS_VERBOSE) |
355 | print_st_err(mdev, os, ns, rv); | |
356 | goto abort; | |
357 | } | |
358 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 359 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 360 | rv = _drbd_set_state(mdev, ns, f, &done); |
b8907339 PR |
361 | } else { |
362 | rv = _drbd_set_state(mdev, ns, f, &done); | |
363 | } | |
364 | ||
365 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
366 | ||
367 | if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) { | |
368 | D_ASSERT(current != mdev->tconn->worker.task); | |
369 | wait_for_completion(&done); | |
370 | } | |
371 | ||
372 | abort: | |
373 | if (f & CS_SERIALIZE) | |
8410da8f | 374 | mutex_unlock(mdev->state_mutex); |
b8907339 PR |
375 | |
376 | return rv; | |
377 | } | |
378 | ||
379 | /** | |
380 | * _drbd_request_state() - Request a state change (with flags) | |
381 | * @mdev: DRBD device. | |
382 | * @mask: mask of state bits to change. | |
383 | * @val: value of new state bits. | |
384 | * @f: flags | |
385 | * | |
386 | * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE | |
387 | * flag, or when logging of failed state change requests is not desired. | |
388 | */ | |
389 | enum drbd_state_rv | |
390 | _drbd_request_state(struct drbd_conf *mdev, union drbd_state mask, | |
391 | union drbd_state val, enum chg_state_flags f) | |
392 | { | |
393 | enum drbd_state_rv rv; | |
394 | ||
395 | wait_event(mdev->state_wait, | |
396 | (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE); | |
397 | ||
398 | return rv; | |
399 | } | |
400 | ||
401 | static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns) | |
402 | { | |
403 | dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n", | |
404 | name, | |
405 | drbd_conn_str(ns.conn), | |
406 | drbd_role_str(ns.role), | |
407 | drbd_role_str(ns.peer), | |
408 | drbd_disk_str(ns.disk), | |
409 | drbd_disk_str(ns.pdsk), | |
410 | is_susp(ns) ? 's' : 'r', | |
411 | ns.aftr_isp ? 'a' : '-', | |
412 | ns.peer_isp ? 'p' : '-', | |
413 | ns.user_isp ? 'u' : '-', | |
414 | ns.susp_fen ? 'F' : '-', | |
415 | ns.susp_nod ? 'N' : '-' | |
416 | ); | |
417 | } | |
418 | ||
419 | void print_st_err(struct drbd_conf *mdev, union drbd_state os, | |
420 | union drbd_state ns, enum drbd_state_rv err) | |
421 | { | |
422 | if (err == SS_IN_TRANSIENT_STATE) | |
423 | return; | |
424 | dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err)); | |
425 | print_st(mdev, " state", os); | |
426 | print_st(mdev, "wanted", ns); | |
427 | } | |
428 | ||
435693e8 | 429 | static long print_state_change(char *pb, union drbd_state os, union drbd_state ns, |
bbeb641c PR |
430 | enum chg_state_flags flags) |
431 | { | |
435693e8 | 432 | char *pbp; |
bbeb641c PR |
433 | pbp = pb; |
434 | *pbp = 0; | |
706cb24c | 435 | |
435693e8 | 436 | if (ns.role != os.role && flags & CS_DC_ROLE) |
bbeb641c PR |
437 | pbp += sprintf(pbp, "role( %s -> %s ) ", |
438 | drbd_role_str(os.role), | |
439 | drbd_role_str(ns.role)); | |
435693e8 | 440 | if (ns.peer != os.peer && flags & CS_DC_PEER) |
bbeb641c PR |
441 | pbp += sprintf(pbp, "peer( %s -> %s ) ", |
442 | drbd_role_str(os.peer), | |
443 | drbd_role_str(ns.peer)); | |
435693e8 | 444 | if (ns.conn != os.conn && flags & CS_DC_CONN) |
bbeb641c PR |
445 | pbp += sprintf(pbp, "conn( %s -> %s ) ", |
446 | drbd_conn_str(os.conn), | |
447 | drbd_conn_str(ns.conn)); | |
435693e8 | 448 | if (ns.disk != os.disk && flags & CS_DC_DISK) |
bbeb641c PR |
449 | pbp += sprintf(pbp, "disk( %s -> %s ) ", |
450 | drbd_disk_str(os.disk), | |
451 | drbd_disk_str(ns.disk)); | |
435693e8 | 452 | if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK) |
bbeb641c PR |
453 | pbp += sprintf(pbp, "pdsk( %s -> %s ) ", |
454 | drbd_disk_str(os.pdsk), | |
455 | drbd_disk_str(ns.pdsk)); | |
706cb24c PR |
456 | |
457 | return pbp - pb; | |
458 | } | |
459 | ||
460 | static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns, | |
461 | enum chg_state_flags flags) | |
462 | { | |
463 | char pb[300]; | |
464 | char *pbp = pb; | |
465 | ||
466 | pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK); | |
467 | ||
bbeb641c PR |
468 | if (ns.aftr_isp != os.aftr_isp) |
469 | pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ", | |
470 | os.aftr_isp, | |
471 | ns.aftr_isp); | |
472 | if (ns.peer_isp != os.peer_isp) | |
473 | pbp += sprintf(pbp, "peer_isp( %d -> %d ) ", | |
474 | os.peer_isp, | |
475 | ns.peer_isp); | |
476 | if (ns.user_isp != os.user_isp) | |
477 | pbp += sprintf(pbp, "user_isp( %d -> %d ) ", | |
478 | os.user_isp, | |
479 | ns.user_isp); | |
435693e8 | 480 | |
706cb24c | 481 | if (pbp != pb) |
bbeb641c PR |
482 | dev_info(DEV, "%s\n", pb); |
483 | } | |
b8907339 | 484 | |
435693e8 PR |
485 | static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns, |
486 | enum chg_state_flags flags) | |
487 | { | |
488 | char pb[300]; | |
706cb24c PR |
489 | char *pbp = pb; |
490 | ||
491 | pbp += print_state_change(pbp, os, ns, flags); | |
435693e8 | 492 | |
706cb24c PR |
493 | if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP) |
494 | pbp += sprintf(pbp, "susp( %d -> %d ) ", | |
495 | is_susp(os), | |
496 | is_susp(ns)); | |
497 | ||
498 | if (pbp != pb) | |
435693e8 PR |
499 | conn_info(tconn, "%s\n", pb); |
500 | } | |
501 | ||
502 | ||
b8907339 PR |
503 | /** |
504 | * is_valid_state() - Returns an SS_ error code if ns is not valid | |
505 | * @mdev: DRBD device. | |
506 | * @ns: State to consider. | |
507 | */ | |
508 | static enum drbd_state_rv | |
509 | is_valid_state(struct drbd_conf *mdev, union drbd_state ns) | |
510 | { | |
511 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
512 | ||
513 | enum drbd_fencing_p fp; | |
514 | enum drbd_state_rv rv = SS_SUCCESS; | |
44ed167d | 515 | struct net_conf *nc; |
b8907339 | 516 | |
daeda1cc | 517 | rcu_read_lock(); |
b8907339 PR |
518 | fp = FP_DONT_CARE; |
519 | if (get_ldev(mdev)) { | |
daeda1cc | 520 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; |
b8907339 PR |
521 | put_ldev(mdev); |
522 | } | |
523 | ||
44ed167d PR |
524 | nc = rcu_dereference(mdev->tconn->net_conf); |
525 | if (nc) { | |
526 | if (!nc->two_primaries && ns.role == R_PRIMARY) { | |
047e95e2 PR |
527 | if (ns.peer == R_PRIMARY) |
528 | rv = SS_TWO_PRIMARIES; | |
cb703454 | 529 | else if (conn_highest_peer(mdev->tconn) == R_PRIMARY) |
047e95e2 | 530 | rv = SS_O_VOL_PEER_PRI; |
44ed167d | 531 | } |
b8907339 PR |
532 | } |
533 | ||
534 | if (rv <= 0) | |
535 | /* already found a reason to abort */; | |
536 | else if (ns.role == R_SECONDARY && mdev->open_cnt) | |
537 | rv = SS_DEVICE_IN_USE; | |
538 | ||
539 | else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE) | |
540 | rv = SS_NO_UP_TO_DATE_DISK; | |
541 | ||
542 | else if (fp >= FP_RESOURCE && | |
543 | ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN) | |
544 | rv = SS_PRIMARY_NOP; | |
545 | ||
546 | else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT) | |
547 | rv = SS_NO_UP_TO_DATE_DISK; | |
548 | ||
549 | else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT) | |
550 | rv = SS_NO_LOCAL_DISK; | |
551 | ||
552 | else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT) | |
553 | rv = SS_NO_REMOTE_DISK; | |
554 | ||
555 | else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE) | |
556 | rv = SS_NO_UP_TO_DATE_DISK; | |
557 | ||
558 | else if ((ns.conn == C_CONNECTED || | |
559 | ns.conn == C_WF_BITMAP_S || | |
560 | ns.conn == C_SYNC_SOURCE || | |
561 | ns.conn == C_PAUSED_SYNC_S) && | |
562 | ns.disk == D_OUTDATED) | |
563 | rv = SS_CONNECTED_OUTDATES; | |
564 | ||
565 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
44ed167d | 566 | (nc->verify_alg[0] == 0)) |
b8907339 PR |
567 | rv = SS_NO_VERIFY_ALG; |
568 | ||
569 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
570 | mdev->tconn->agreed_pro_version < 88) | |
571 | rv = SS_NOT_SUPPORTED; | |
572 | ||
5c4f13d9 PR |
573 | else if (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE) |
574 | rv = SS_NO_UP_TO_DATE_DISK; | |
575 | ||
576 | else if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) && | |
577 | ns.pdsk == D_UNKNOWN) | |
578 | rv = SS_NEED_CONNECTION; | |
579 | ||
b8907339 PR |
580 | else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN) |
581 | rv = SS_CONNECTED_OUTDATES; | |
582 | ||
44ed167d PR |
583 | rcu_read_unlock(); |
584 | ||
b8907339 PR |
585 | return rv; |
586 | } | |
587 | ||
588 | /** | |
a75f34ad | 589 | * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible |
3509502d PR |
590 | * This function limits state transitions that may be declined by DRBD. I.e. |
591 | * user requests (aka soft transitions). | |
b8907339 PR |
592 | * @mdev: DRBD device. |
593 | * @ns: new state. | |
594 | * @os: old state. | |
595 | */ | |
596 | static enum drbd_state_rv | |
a1096a6e | 597 | is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn) |
b8907339 PR |
598 | { |
599 | enum drbd_state_rv rv = SS_SUCCESS; | |
600 | ||
601 | if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) && | |
602 | os.conn > C_CONNECTED) | |
603 | rv = SS_RESYNC_RUNNING; | |
604 | ||
605 | if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE) | |
606 | rv = SS_ALREADY_STANDALONE; | |
607 | ||
608 | if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS) | |
609 | rv = SS_IS_DISKLESS; | |
610 | ||
611 | if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED) | |
612 | rv = SS_NO_NET_CONFIG; | |
613 | ||
614 | if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING) | |
615 | rv = SS_LOWER_THAN_OUTDATED; | |
616 | ||
617 | if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED) | |
618 | rv = SS_IN_TRANSIENT_STATE; | |
619 | ||
2325eb66 PR |
620 | /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS) |
621 | rv = SS_IN_TRANSIENT_STATE; */ | |
b8907339 | 622 | |
a1096a6e PR |
623 | /* While establishing a connection only allow cstate to change. |
624 | Delay/refuse role changes, detach attach etc... */ | |
625 | if (test_bit(STATE_SENT, &tconn->flags) && | |
626 | !(os.conn == C_WF_REPORT_PARAMS || | |
627 | (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION))) | |
628 | rv = SS_IN_TRANSIENT_STATE; | |
629 | ||
b8907339 PR |
630 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED) |
631 | rv = SS_NEED_CONNECTION; | |
632 | ||
633 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
634 | ns.conn != os.conn && os.conn > C_CONNECTED) | |
635 | rv = SS_RESYNC_RUNNING; | |
636 | ||
637 | if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) && | |
638 | os.conn < C_CONNECTED) | |
639 | rv = SS_NEED_CONNECTION; | |
640 | ||
641 | if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE) | |
642 | && os.conn < C_WF_REPORT_PARAMS) | |
643 | rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */ | |
644 | ||
2bd5ed5d PR |
645 | if (ns.conn == C_DISCONNECTING && ns.pdsk == D_OUTDATED && |
646 | os.conn < C_CONNECTED && os.pdsk > D_OUTDATED) | |
647 | rv = SS_OUTDATE_WO_CONN; | |
648 | ||
b8907339 PR |
649 | return rv; |
650 | } | |
651 | ||
3509502d | 652 | static enum drbd_state_rv |
fda74117 | 653 | is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc) |
3509502d | 654 | { |
d9cc6e23 LE |
655 | /* no change -> nothing to do, at least for the connection part */ |
656 | if (oc == nc) | |
657 | return SS_NOTHING_TO_DO; | |
3509502d | 658 | |
d9cc6e23 LE |
659 | /* disconnect of an unconfigured connection does not make sense */ |
660 | if (oc == C_STANDALONE && nc == C_DISCONNECTING) | |
661 | return SS_ALREADY_STANDALONE; | |
662 | ||
663 | /* from C_STANDALONE, we start with C_UNCONNECTED */ | |
664 | if (oc == C_STANDALONE && nc != C_UNCONNECTED) | |
665 | return SS_NEED_CONNECTION; | |
3509502d | 666 | |
25b0d6c8 PR |
667 | /* When establishing a connection we need to go through WF_REPORT_PARAMS! |
668 | Necessary to do the right thing upon invalidate-remote on a disconnected resource */ | |
669 | if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED) | |
670 | return SS_NEED_CONNECTION; | |
671 | ||
3509502d | 672 | /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */ |
fda74117 | 673 | if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING) |
d9cc6e23 | 674 | return SS_IN_TRANSIENT_STATE; |
3509502d PR |
675 | |
676 | /* After C_DISCONNECTING only C_STANDALONE may follow */ | |
fda74117 | 677 | if (oc == C_DISCONNECTING && nc != C_STANDALONE) |
d9cc6e23 | 678 | return SS_IN_TRANSIENT_STATE; |
3509502d | 679 | |
d9cc6e23 | 680 | return SS_SUCCESS; |
fda74117 PR |
681 | } |
682 | ||
683 | ||
684 | /** | |
685 | * is_valid_transition() - Returns an SS_ error code if the state transition is not possible | |
686 | * This limits hard state transitions. Hard state transitions are facts there are | |
687 | * imposed on DRBD by the environment. E.g. disk broke or network broke down. | |
688 | * But those hard state transitions are still not allowed to do everything. | |
689 | * @ns: new state. | |
690 | * @os: old state. | |
691 | */ | |
692 | static enum drbd_state_rv | |
693 | is_valid_transition(union drbd_state os, union drbd_state ns) | |
694 | { | |
695 | enum drbd_state_rv rv; | |
696 | ||
697 | rv = is_valid_conn_transition(os.conn, ns.conn); | |
698 | ||
3509502d PR |
699 | /* we cannot fail (again) if we already detached */ |
700 | if (ns.disk == D_FAILED && os.disk == D_DISKLESS) | |
701 | rv = SS_IS_DISKLESS; | |
702 | ||
703 | return rv; | |
704 | } | |
705 | ||
d942ae44 PR |
706 | static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn) |
707 | { | |
708 | static const char *msg_table[] = { | |
709 | [NO_WARNING] = "", | |
710 | [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.", | |
711 | [ABORTED_RESYNC] = "Resync aborted.", | |
712 | [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!", | |
713 | [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk", | |
714 | [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk", | |
715 | }; | |
716 | ||
717 | if (warn != NO_WARNING) | |
718 | dev_warn(DEV, "%s\n", msg_table[warn]); | |
719 | } | |
720 | ||
b8907339 PR |
721 | /** |
722 | * sanitize_state() - Resolves implicitly necessary additional changes to a state transition | |
723 | * @mdev: DRBD device. | |
724 | * @os: old state. | |
725 | * @ns: new state. | |
726 | * @warn_sync_abort: | |
727 | * | |
728 | * When we loose connection, we have to set the state of the peers disk (pdsk) | |
729 | * to D_UNKNOWN. This rule and many more along those lines are in this function. | |
730 | */ | |
4308a0a3 | 731 | static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns, |
d942ae44 | 732 | enum sanitize_state_warnings *warn) |
b8907339 PR |
733 | { |
734 | enum drbd_fencing_p fp; | |
735 | enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max; | |
736 | ||
d942ae44 PR |
737 | if (warn) |
738 | *warn = NO_WARNING; | |
739 | ||
b8907339 PR |
740 | fp = FP_DONT_CARE; |
741 | if (get_ldev(mdev)) { | |
daeda1cc PR |
742 | rcu_read_lock(); |
743 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; | |
744 | rcu_read_unlock(); | |
b8907339 PR |
745 | put_ldev(mdev); |
746 | } | |
747 | ||
3509502d | 748 | /* Implications from connection to peer and peer_isp */ |
b8907339 PR |
749 | if (ns.conn < C_CONNECTED) { |
750 | ns.peer_isp = 0; | |
751 | ns.peer = R_UNKNOWN; | |
752 | if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT) | |
753 | ns.pdsk = D_UNKNOWN; | |
754 | } | |
755 | ||
756 | /* Clear the aftr_isp when becoming unconfigured */ | |
757 | if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY) | |
758 | ns.aftr_isp = 0; | |
759 | ||
4308a0a3 | 760 | /* An implication of the disk states onto the connection state */ |
b8907339 | 761 | /* Abort resync if a disk fails/detaches */ |
4308a0a3 | 762 | if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) { |
d942ae44 PR |
763 | if (warn) |
764 | *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ? | |
765 | ABORTED_ONLINE_VERIFY : ABORTED_RESYNC; | |
b8907339 PR |
766 | ns.conn = C_CONNECTED; |
767 | } | |
768 | ||
769 | /* Connection breaks down before we finished "Negotiating" */ | |
770 | if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING && | |
771 | get_ldev_if_state(mdev, D_NEGOTIATING)) { | |
772 | if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) { | |
773 | ns.disk = mdev->new_state_tmp.disk; | |
774 | ns.pdsk = mdev->new_state_tmp.pdsk; | |
775 | } else { | |
d942ae44 PR |
776 | if (warn) |
777 | *warn = CONNECTION_LOST_NEGOTIATING; | |
b8907339 PR |
778 | ns.disk = D_DISKLESS; |
779 | ns.pdsk = D_UNKNOWN; | |
780 | } | |
781 | put_ldev(mdev); | |
782 | } | |
783 | ||
784 | /* D_CONSISTENT and D_OUTDATED vanish when we get connected */ | |
785 | if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) { | |
786 | if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED) | |
787 | ns.disk = D_UP_TO_DATE; | |
788 | if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED) | |
789 | ns.pdsk = D_UP_TO_DATE; | |
790 | } | |
791 | ||
792 | /* Implications of the connection stat on the disk states */ | |
793 | disk_min = D_DISKLESS; | |
794 | disk_max = D_UP_TO_DATE; | |
795 | pdsk_min = D_INCONSISTENT; | |
796 | pdsk_max = D_UNKNOWN; | |
797 | switch ((enum drbd_conns)ns.conn) { | |
798 | case C_WF_BITMAP_T: | |
799 | case C_PAUSED_SYNC_T: | |
800 | case C_STARTING_SYNC_T: | |
801 | case C_WF_SYNC_UUID: | |
802 | case C_BEHIND: | |
803 | disk_min = D_INCONSISTENT; | |
804 | disk_max = D_OUTDATED; | |
805 | pdsk_min = D_UP_TO_DATE; | |
806 | pdsk_max = D_UP_TO_DATE; | |
807 | break; | |
808 | case C_VERIFY_S: | |
809 | case C_VERIFY_T: | |
810 | disk_min = D_UP_TO_DATE; | |
811 | disk_max = D_UP_TO_DATE; | |
812 | pdsk_min = D_UP_TO_DATE; | |
813 | pdsk_max = D_UP_TO_DATE; | |
814 | break; | |
815 | case C_CONNECTED: | |
816 | disk_min = D_DISKLESS; | |
817 | disk_max = D_UP_TO_DATE; | |
818 | pdsk_min = D_DISKLESS; | |
819 | pdsk_max = D_UP_TO_DATE; | |
820 | break; | |
821 | case C_WF_BITMAP_S: | |
822 | case C_PAUSED_SYNC_S: | |
823 | case C_STARTING_SYNC_S: | |
824 | case C_AHEAD: | |
825 | disk_min = D_UP_TO_DATE; | |
826 | disk_max = D_UP_TO_DATE; | |
827 | pdsk_min = D_INCONSISTENT; | |
828 | pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/ | |
829 | break; | |
830 | case C_SYNC_TARGET: | |
831 | disk_min = D_INCONSISTENT; | |
832 | disk_max = D_INCONSISTENT; | |
833 | pdsk_min = D_UP_TO_DATE; | |
834 | pdsk_max = D_UP_TO_DATE; | |
835 | break; | |
836 | case C_SYNC_SOURCE: | |
837 | disk_min = D_UP_TO_DATE; | |
838 | disk_max = D_UP_TO_DATE; | |
839 | pdsk_min = D_INCONSISTENT; | |
840 | pdsk_max = D_INCONSISTENT; | |
841 | break; | |
842 | case C_STANDALONE: | |
843 | case C_DISCONNECTING: | |
844 | case C_UNCONNECTED: | |
845 | case C_TIMEOUT: | |
846 | case C_BROKEN_PIPE: | |
847 | case C_NETWORK_FAILURE: | |
848 | case C_PROTOCOL_ERROR: | |
849 | case C_TEAR_DOWN: | |
850 | case C_WF_CONNECTION: | |
851 | case C_WF_REPORT_PARAMS: | |
852 | case C_MASK: | |
853 | break; | |
854 | } | |
855 | if (ns.disk > disk_max) | |
856 | ns.disk = disk_max; | |
857 | ||
858 | if (ns.disk < disk_min) { | |
d942ae44 PR |
859 | if (warn) |
860 | *warn = IMPLICITLY_UPGRADED_DISK; | |
b8907339 PR |
861 | ns.disk = disk_min; |
862 | } | |
863 | if (ns.pdsk > pdsk_max) | |
864 | ns.pdsk = pdsk_max; | |
865 | ||
866 | if (ns.pdsk < pdsk_min) { | |
d942ae44 PR |
867 | if (warn) |
868 | *warn = IMPLICITLY_UPGRADED_PDSK; | |
b8907339 PR |
869 | ns.pdsk = pdsk_min; |
870 | } | |
871 | ||
872 | if (fp == FP_STONITH && | |
4308a0a3 | 873 | (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED)) |
b8907339 PR |
874 | ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */ |
875 | ||
f399002e | 876 | if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO && |
4308a0a3 | 877 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) |
b8907339 PR |
878 | ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */ |
879 | ||
880 | if (ns.aftr_isp || ns.peer_isp || ns.user_isp) { | |
881 | if (ns.conn == C_SYNC_SOURCE) | |
882 | ns.conn = C_PAUSED_SYNC_S; | |
883 | if (ns.conn == C_SYNC_TARGET) | |
884 | ns.conn = C_PAUSED_SYNC_T; | |
885 | } else { | |
886 | if (ns.conn == C_PAUSED_SYNC_S) | |
887 | ns.conn = C_SYNC_SOURCE; | |
888 | if (ns.conn == C_PAUSED_SYNC_T) | |
889 | ns.conn = C_SYNC_TARGET; | |
890 | } | |
891 | ||
892 | return ns; | |
893 | } | |
894 | ||
895 | void drbd_resume_al(struct drbd_conf *mdev) | |
896 | { | |
897 | if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags)) | |
898 | dev_info(DEV, "Resumed AL updates\n"); | |
899 | } | |
900 | ||
901 | /* helper for __drbd_set_state */ | |
902 | static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs) | |
903 | { | |
904 | if (mdev->tconn->agreed_pro_version < 90) | |
905 | mdev->ov_start_sector = 0; | |
906 | mdev->rs_total = drbd_bm_bits(mdev); | |
907 | mdev->ov_position = 0; | |
908 | if (cs == C_VERIFY_T) { | |
909 | /* starting online verify from an arbitrary position | |
910 | * does not fit well into the existing protocol. | |
911 | * on C_VERIFY_T, we initialize ov_left and friends | |
912 | * implicitly in receive_DataRequest once the | |
913 | * first P_OV_REQUEST is received */ | |
914 | mdev->ov_start_sector = ~(sector_t)0; | |
915 | } else { | |
916 | unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector); | |
917 | if (bit >= mdev->rs_total) { | |
918 | mdev->ov_start_sector = | |
919 | BM_BIT_TO_SECT(mdev->rs_total - 1); | |
920 | mdev->rs_total = 1; | |
921 | } else | |
922 | mdev->rs_total -= bit; | |
923 | mdev->ov_position = mdev->ov_start_sector; | |
924 | } | |
925 | mdev->ov_left = mdev->rs_total; | |
926 | } | |
927 | ||
928 | /** | |
929 | * __drbd_set_state() - Set a new DRBD state | |
930 | * @mdev: DRBD device. | |
931 | * @ns: new state. | |
932 | * @flags: Flags | |
933 | * @done: Optional completion, that will get completed after the after_state_ch() finished | |
934 | * | |
935 | * Caller needs to hold req_lock, and global_state_lock. Do not call directly. | |
936 | */ | |
937 | enum drbd_state_rv | |
938 | __drbd_set_state(struct drbd_conf *mdev, union drbd_state ns, | |
939 | enum chg_state_flags flags, struct completion *done) | |
940 | { | |
941 | union drbd_state os; | |
942 | enum drbd_state_rv rv = SS_SUCCESS; | |
d942ae44 | 943 | enum sanitize_state_warnings ssw; |
b8907339 | 944 | struct after_state_chg_work *ascw; |
2681f7f6 | 945 | bool did_remote, should_do_remote; |
b8907339 | 946 | |
78bae59b | 947 | os = drbd_read_state(mdev); |
b8907339 | 948 | |
d942ae44 | 949 | ns = sanitize_state(mdev, ns, &ssw); |
b8907339 PR |
950 | if (ns.i == os.i) |
951 | return SS_NOTHING_TO_DO; | |
952 | ||
3509502d PR |
953 | rv = is_valid_transition(os, ns); |
954 | if (rv < SS_SUCCESS) | |
955 | return rv; | |
956 | ||
b8907339 PR |
957 | if (!(flags & CS_HARD)) { |
958 | /* pre-state-change checks ; only look at ns */ | |
959 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
960 | ||
961 | rv = is_valid_state(mdev, ns); | |
962 | if (rv < SS_SUCCESS) { | |
963 | /* If the old state was illegal as well, then let | |
964 | this happen...*/ | |
965 | ||
966 | if (is_valid_state(mdev, os) == rv) | |
a1096a6e | 967 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 | 968 | } else |
a1096a6e | 969 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
970 | } |
971 | ||
972 | if (rv < SS_SUCCESS) { | |
973 | if (flags & CS_VERBOSE) | |
974 | print_st_err(mdev, os, ns, rv); | |
975 | return rv; | |
976 | } | |
977 | ||
d942ae44 | 978 | print_sanitize_warnings(mdev, ssw); |
b8907339 | 979 | |
435693e8 | 980 | drbd_pr_state_change(mdev, os, ns, flags); |
b8907339 | 981 | |
706cb24c PR |
982 | /* Display changes to the susp* flags that where caused by the call to |
983 | sanitize_state(). Only display it here if we where not called from | |
984 | _conn_request_state() */ | |
985 | if (!(flags & CS_DC_SUSP)) | |
986 | conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP); | |
987 | ||
b8907339 PR |
988 | /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference |
989 | * on the ldev here, to be sure the transition -> D_DISKLESS resp. | |
990 | * drbd_ldev_destroy() won't happen before our corresponding | |
991 | * after_state_ch works run, where we put_ldev again. */ | |
992 | if ((os.disk != D_FAILED && ns.disk == D_FAILED) || | |
993 | (os.disk != D_DISKLESS && ns.disk == D_DISKLESS)) | |
994 | atomic_inc(&mdev->local_cnt); | |
995 | ||
2681f7f6 | 996 | did_remote = drbd_should_do_remote(mdev->state); |
da9fbc27 | 997 | mdev->state.i = ns.i; |
2681f7f6 | 998 | should_do_remote = drbd_should_do_remote(mdev->state); |
8e0af25f PR |
999 | mdev->tconn->susp = ns.susp; |
1000 | mdev->tconn->susp_nod = ns.susp_nod; | |
1001 | mdev->tconn->susp_fen = ns.susp_fen; | |
b8907339 | 1002 | |
2681f7f6 LE |
1003 | /* put replicated vs not-replicated requests in seperate epochs */ |
1004 | if (did_remote != should_do_remote) | |
1005 | start_new_tl_epoch(mdev->tconn); | |
1006 | ||
b8907339 PR |
1007 | if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING) |
1008 | drbd_print_uuids(mdev, "attached to UUIDs"); | |
1009 | ||
79702011 PR |
1010 | /* Wake up role changes, that were delayed because of connection establishing */ |
1011 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS && | |
1012 | no_peer_wf_report_params(mdev->tconn)) | |
1013 | clear_bit(STATE_SENT, &mdev->tconn->flags); | |
1014 | ||
b8907339 PR |
1015 | wake_up(&mdev->misc_wait); |
1016 | wake_up(&mdev->state_wait); | |
2a67d8b9 | 1017 | wake_up(&mdev->tconn->ping_wait); |
b8907339 | 1018 | |
58ffa580 LE |
1019 | /* Aborted verify run, or we reached the stop sector. |
1020 | * Log the last position, unless end-of-device. */ | |
b8907339 | 1021 | if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) && |
58ffa580 | 1022 | ns.conn <= C_CONNECTED) { |
b8907339 PR |
1023 | mdev->ov_start_sector = |
1024 | BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left); | |
58ffa580 LE |
1025 | if (mdev->ov_left) |
1026 | dev_info(DEV, "Online Verify reached sector %llu\n", | |
1027 | (unsigned long long)mdev->ov_start_sector); | |
b8907339 PR |
1028 | } |
1029 | ||
1030 | if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) && | |
1031 | (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) { | |
1032 | dev_info(DEV, "Syncer continues.\n"); | |
1033 | mdev->rs_paused += (long)jiffies | |
1034 | -(long)mdev->rs_mark_time[mdev->rs_last_mark]; | |
1035 | if (ns.conn == C_SYNC_TARGET) | |
1036 | mod_timer(&mdev->resync_timer, jiffies); | |
1037 | } | |
1038 | ||
1039 | if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) && | |
1040 | (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) { | |
1041 | dev_info(DEV, "Resync suspended\n"); | |
1042 | mdev->rs_mark_time[mdev->rs_last_mark] = jiffies; | |
1043 | } | |
1044 | ||
1045 | if (os.conn == C_CONNECTED && | |
1046 | (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) { | |
1047 | unsigned long now = jiffies; | |
1048 | int i; | |
1049 | ||
1050 | set_ov_position(mdev, ns.conn); | |
1051 | mdev->rs_start = now; | |
1052 | mdev->rs_last_events = 0; | |
1053 | mdev->rs_last_sect_ev = 0; | |
1054 | mdev->ov_last_oos_size = 0; | |
1055 | mdev->ov_last_oos_start = 0; | |
1056 | ||
1057 | for (i = 0; i < DRBD_SYNC_MARKS; i++) { | |
1058 | mdev->rs_mark_left[i] = mdev->ov_left; | |
1059 | mdev->rs_mark_time[i] = now; | |
1060 | } | |
1061 | ||
1062 | drbd_rs_controller_reset(mdev); | |
1063 | ||
1064 | if (ns.conn == C_VERIFY_S) { | |
1065 | dev_info(DEV, "Starting Online Verify from sector %llu\n", | |
1066 | (unsigned long long)mdev->ov_position); | |
1067 | mod_timer(&mdev->resync_timer, jiffies); | |
1068 | } | |
1069 | } | |
1070 | ||
1071 | if (get_ldev(mdev)) { | |
1072 | u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND| | |
1073 | MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE| | |
1074 | MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY); | |
1075 | ||
d5d7ebd4 | 1076 | mdf &= ~MDF_AL_CLEAN; |
b8907339 PR |
1077 | if (test_bit(CRASHED_PRIMARY, &mdev->flags)) |
1078 | mdf |= MDF_CRASHED_PRIMARY; | |
1079 | if (mdev->state.role == R_PRIMARY || | |
1080 | (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY)) | |
1081 | mdf |= MDF_PRIMARY_IND; | |
1082 | if (mdev->state.conn > C_WF_REPORT_PARAMS) | |
1083 | mdf |= MDF_CONNECTED_IND; | |
1084 | if (mdev->state.disk > D_INCONSISTENT) | |
1085 | mdf |= MDF_CONSISTENT; | |
1086 | if (mdev->state.disk > D_OUTDATED) | |
1087 | mdf |= MDF_WAS_UP_TO_DATE; | |
1088 | if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT) | |
1089 | mdf |= MDF_PEER_OUT_DATED; | |
1090 | if (mdf != mdev->ldev->md.flags) { | |
1091 | mdev->ldev->md.flags = mdf; | |
1092 | drbd_md_mark_dirty(mdev); | |
1093 | } | |
1094 | if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT) | |
1095 | drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]); | |
1096 | put_ldev(mdev); | |
1097 | } | |
1098 | ||
1099 | /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */ | |
1100 | if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT && | |
1101 | os.peer == R_SECONDARY && ns.peer == R_PRIMARY) | |
1102 | set_bit(CONSIDER_RESYNC, &mdev->flags); | |
1103 | ||
1104 | /* Receiver should clean up itself */ | |
1105 | if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING) | |
1106 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1107 | ||
1108 | /* Now the receiver finished cleaning up itself, it should die */ | |
1109 | if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE) | |
1110 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1111 | ||
1112 | /* Upon network failure, we need to restart the receiver. */ | |
823bd832 | 1113 | if (os.conn > C_WF_CONNECTION && |
b8907339 PR |
1114 | ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT) |
1115 | drbd_thread_restart_nowait(&mdev->tconn->receiver); | |
1116 | ||
1117 | /* Resume AL writing if we get a connection */ | |
28e448bb | 1118 | if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED) { |
b8907339 | 1119 | drbd_resume_al(mdev); |
28e448bb PR |
1120 | mdev->tconn->connect_cnt++; |
1121 | } | |
b8907339 | 1122 | |
07be15b1 LE |
1123 | /* remember last attach time so request_timer_fn() won't |
1124 | * kill newly established sessions while we are still trying to thaw | |
1125 | * previously frozen IO */ | |
1126 | if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) && | |
1127 | ns.disk > D_NEGOTIATING) | |
1128 | mdev->last_reattach_jif = jiffies; | |
1129 | ||
b8907339 PR |
1130 | ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC); |
1131 | if (ascw) { | |
1132 | ascw->os = os; | |
1133 | ascw->ns = ns; | |
1134 | ascw->flags = flags; | |
1135 | ascw->w.cb = w_after_state_ch; | |
a21e9298 | 1136 | ascw->w.mdev = mdev; |
b8907339 | 1137 | ascw->done = done; |
d5b27b01 | 1138 | drbd_queue_work(&mdev->tconn->sender_work, &ascw->w); |
b8907339 | 1139 | } else { |
bbeb641c | 1140 | dev_err(DEV, "Could not kmalloc an ascw\n"); |
b8907339 PR |
1141 | } |
1142 | ||
1143 | return rv; | |
1144 | } | |
1145 | ||
99920dc5 | 1146 | static int w_after_state_ch(struct drbd_work *w, int unused) |
b8907339 PR |
1147 | { |
1148 | struct after_state_chg_work *ascw = | |
1149 | container_of(w, struct after_state_chg_work, w); | |
00d56944 | 1150 | struct drbd_conf *mdev = w->mdev; |
b8907339 PR |
1151 | |
1152 | after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags); | |
1153 | if (ascw->flags & CS_WAIT_COMPLETE) { | |
1154 | D_ASSERT(ascw->done != NULL); | |
1155 | complete(ascw->done); | |
1156 | } | |
1157 | kfree(ascw); | |
1158 | ||
99920dc5 | 1159 | return 0; |
b8907339 PR |
1160 | } |
1161 | ||
1162 | static void abw_start_sync(struct drbd_conf *mdev, int rv) | |
1163 | { | |
1164 | if (rv) { | |
1165 | dev_err(DEV, "Writing the bitmap failed not starting resync.\n"); | |
1166 | _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE); | |
1167 | return; | |
1168 | } | |
1169 | ||
1170 | switch (mdev->state.conn) { | |
1171 | case C_STARTING_SYNC_T: | |
1172 | _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE); | |
1173 | break; | |
1174 | case C_STARTING_SYNC_S: | |
1175 | drbd_start_resync(mdev, C_SYNC_SOURCE); | |
1176 | break; | |
1177 | } | |
1178 | } | |
1179 | ||
1180 | int drbd_bitmap_io_from_worker(struct drbd_conf *mdev, | |
1181 | int (*io_fn)(struct drbd_conf *), | |
1182 | char *why, enum bm_flag flags) | |
1183 | { | |
1184 | int rv; | |
1185 | ||
1186 | D_ASSERT(current == mdev->tconn->worker.task); | |
1187 | ||
1188 | /* open coded non-blocking drbd_suspend_io(mdev); */ | |
1189 | set_bit(SUSPEND_IO, &mdev->flags); | |
1190 | ||
1191 | drbd_bm_lock(mdev, why, flags); | |
1192 | rv = io_fn(mdev); | |
1193 | drbd_bm_unlock(mdev); | |
1194 | ||
1195 | drbd_resume_io(mdev); | |
1196 | ||
1197 | return rv; | |
1198 | } | |
1199 | ||
1200 | /** | |
1201 | * after_state_ch() - Perform after state change actions that may sleep | |
1202 | * @mdev: DRBD device. | |
1203 | * @os: old state. | |
1204 | * @ns: new state. | |
1205 | * @flags: Flags | |
1206 | */ | |
1207 | static void after_state_ch(struct drbd_conf *mdev, union drbd_state os, | |
1208 | union drbd_state ns, enum chg_state_flags flags) | |
1209 | { | |
3b98c0c2 LE |
1210 | struct sib_info sib; |
1211 | ||
1212 | sib.sib_reason = SIB_STATE_CHANGE; | |
1213 | sib.os = os; | |
1214 | sib.ns = ns; | |
b8907339 PR |
1215 | |
1216 | if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) { | |
1217 | clear_bit(CRASHED_PRIMARY, &mdev->flags); | |
1218 | if (mdev->p_uuid) | |
1219 | mdev->p_uuid[UI_FLAGS] &= ~((u64)2); | |
1220 | } | |
1221 | ||
b8907339 | 1222 | /* Inform userspace about the change... */ |
3b98c0c2 | 1223 | drbd_bcast_event(mdev, &sib); |
b8907339 PR |
1224 | |
1225 | if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) && | |
1226 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) | |
1227 | drbd_khelper(mdev, "pri-on-incon-degr"); | |
1228 | ||
1229 | /* Here we have the actions that are performed after a | |
1230 | state change. This function might sleep */ | |
1231 | ||
b8907339 | 1232 | if (ns.susp_nod) { |
892fdd1a | 1233 | struct drbd_tconn *tconn = mdev->tconn; |
a6d00c8e PR |
1234 | enum drbd_req_event what = NOTHING; |
1235 | ||
892fdd1a PR |
1236 | spin_lock_irq(&tconn->req_lock); |
1237 | if (os.conn < C_CONNECTED && conn_lowest_conn(tconn) >= C_CONNECTED) | |
b8907339 PR |
1238 | what = RESEND; |
1239 | ||
3fb4746d | 1240 | if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) && |
892fdd1a | 1241 | conn_lowest_disk(tconn) > D_NEGOTIATING) |
b8907339 PR |
1242 | what = RESTART_FROZEN_DISK_IO; |
1243 | ||
892fdd1a PR |
1244 | if (tconn->susp_nod && what != NOTHING) { |
1245 | _tl_restart(tconn, what); | |
1246 | _conn_request_state(tconn, | |
1247 | (union drbd_state) { { .susp_nod = 1 } }, | |
1248 | (union drbd_state) { { .susp_nod = 0 } }, | |
1249 | CS_VERBOSE); | |
b8907339 | 1250 | } |
892fdd1a | 1251 | spin_unlock_irq(&tconn->req_lock); |
b8907339 PR |
1252 | } |
1253 | ||
88f79ec4 PR |
1254 | if (ns.susp_fen) { |
1255 | struct drbd_tconn *tconn = mdev->tconn; | |
1256 | ||
1257 | spin_lock_irq(&tconn->req_lock); | |
1258 | if (tconn->susp_fen && conn_lowest_conn(tconn) >= C_CONNECTED) { | |
1259 | /* case2: The connection was established again: */ | |
1260 | struct drbd_conf *odev; | |
1261 | int vnr; | |
1262 | ||
1263 | rcu_read_lock(); | |
1264 | idr_for_each_entry(&tconn->volumes, odev, vnr) | |
1265 | clear_bit(NEW_CUR_UUID, &odev->flags); | |
1266 | rcu_read_unlock(); | |
1267 | _tl_restart(tconn, RESEND); | |
1268 | _conn_request_state(tconn, | |
1269 | (union drbd_state) { { .susp_fen = 1 } }, | |
1270 | (union drbd_state) { { .susp_fen = 0 } }, | |
1271 | CS_VERBOSE); | |
1272 | } | |
1273 | spin_unlock_irq(&tconn->req_lock); | |
1274 | } | |
1275 | ||
b8907339 PR |
1276 | /* Became sync source. With protocol >= 96, we still need to send out |
1277 | * the sync uuid now. Need to do that before any drbd_send_state, or | |
1278 | * the other side may go "paused sync" before receiving the sync uuids, | |
1279 | * which is unexpected. */ | |
1280 | if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) && | |
1281 | (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) && | |
1282 | mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) { | |
1283 | drbd_gen_and_send_sync_uuid(mdev); | |
1284 | put_ldev(mdev); | |
1285 | } | |
1286 | ||
1287 | /* Do not change the order of the if above and the two below... */ | |
369bea63 PR |
1288 | if (os.pdsk == D_DISKLESS && |
1289 | ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */ | |
a324896b LE |
1290 | /* we probably will start a resync soon. |
1291 | * make sure those things are properly reset. */ | |
1292 | mdev->rs_total = 0; | |
1293 | mdev->rs_failed = 0; | |
1294 | atomic_set(&mdev->rs_pending_cnt, 0); | |
1295 | drbd_rs_cancel_all(mdev); | |
1296 | ||
b8907339 | 1297 | drbd_send_uuids(mdev); |
43de7c85 | 1298 | drbd_send_state(mdev, ns); |
b8907339 PR |
1299 | } |
1300 | /* No point in queuing send_bitmap if we don't have a connection | |
1301 | * anymore, so check also the _current_ state, not only the new state | |
1302 | * at the time this work was queued. */ | |
1303 | if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S && | |
1304 | mdev->state.conn == C_WF_BITMAP_S) | |
1305 | drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL, | |
1306 | "send_bitmap (WFBitMapS)", | |
1307 | BM_LOCKED_TEST_ALLOWED); | |
1308 | ||
1309 | /* Lost contact to peer's copy of the data */ | |
1310 | if ((os.pdsk >= D_INCONSISTENT && | |
1311 | os.pdsk != D_UNKNOWN && | |
1312 | os.pdsk != D_OUTDATED) | |
1313 | && (ns.pdsk < D_INCONSISTENT || | |
1314 | ns.pdsk == D_UNKNOWN || | |
1315 | ns.pdsk == D_OUTDATED)) { | |
1316 | if (get_ldev(mdev)) { | |
1317 | if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) && | |
1318 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
2aebfabb | 1319 | if (drbd_suspended(mdev)) { |
b8907339 PR |
1320 | set_bit(NEW_CUR_UUID, &mdev->flags); |
1321 | } else { | |
1322 | drbd_uuid_new_current(mdev); | |
1323 | drbd_send_uuids(mdev); | |
1324 | } | |
1325 | } | |
1326 | put_ldev(mdev); | |
1327 | } | |
1328 | } | |
1329 | ||
1330 | if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) { | |
0cfac5dd PR |
1331 | if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY && |
1332 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
1333 | drbd_uuid_new_current(mdev); | |
1334 | drbd_send_uuids(mdev); | |
1335 | } | |
b8907339 PR |
1336 | /* D_DISKLESS Peer becomes secondary */ |
1337 | if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY) | |
1338 | /* We may still be Primary ourselves. | |
1339 | * No harm done if the bitmap still changes, | |
1340 | * redirtied pages will follow later. */ | |
1341 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1342 | "demote diskless peer", BM_LOCKED_SET_ALLOWED); | |
1343 | put_ldev(mdev); | |
1344 | } | |
1345 | ||
1346 | /* Write out all changed bits on demote. | |
1347 | * Though, no need to da that just yet | |
1348 | * if there is a resync going on still */ | |
1349 | if (os.role == R_PRIMARY && ns.role == R_SECONDARY && | |
1350 | mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) { | |
1351 | /* No changes to the bitmap expected this time, so assert that, | |
1352 | * even though no harm was done if it did change. */ | |
1353 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1354 | "demote", BM_LOCKED_TEST_ALLOWED); | |
1355 | put_ldev(mdev); | |
1356 | } | |
1357 | ||
1358 | /* Last part of the attaching process ... */ | |
1359 | if (ns.conn >= C_CONNECTED && | |
1360 | os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) { | |
1361 | drbd_send_sizes(mdev, 0, 0); /* to start sync... */ | |
1362 | drbd_send_uuids(mdev); | |
43de7c85 | 1363 | drbd_send_state(mdev, ns); |
b8907339 PR |
1364 | } |
1365 | ||
1366 | /* We want to pause/continue resync, tell peer. */ | |
1367 | if (ns.conn >= C_CONNECTED && | |
1368 | ((os.aftr_isp != ns.aftr_isp) || | |
1369 | (os.user_isp != ns.user_isp))) | |
43de7c85 | 1370 | drbd_send_state(mdev, ns); |
b8907339 PR |
1371 | |
1372 | /* In case one of the isp bits got set, suspend other devices. */ | |
1373 | if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) && | |
1374 | (ns.aftr_isp || ns.peer_isp || ns.user_isp)) | |
1375 | suspend_other_sg(mdev); | |
1376 | ||
1377 | /* Make sure the peer gets informed about eventual state | |
1378 | changes (ISP bits) while we were in WFReportParams. */ | |
1379 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED) | |
43de7c85 | 1380 | drbd_send_state(mdev, ns); |
b8907339 PR |
1381 | |
1382 | if (os.conn != C_AHEAD && ns.conn == C_AHEAD) | |
43de7c85 | 1383 | drbd_send_state(mdev, ns); |
b8907339 PR |
1384 | |
1385 | /* We are in the progress to start a full sync... */ | |
1386 | if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
1387 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S)) | |
1388 | /* no other bitmap changes expected during this phase */ | |
1389 | drbd_queue_bitmap_io(mdev, | |
1390 | &drbd_bmio_set_n_write, &abw_start_sync, | |
1391 | "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED); | |
1392 | ||
b8907339 PR |
1393 | /* first half of local IO error, failure to attach, |
1394 | * or administrative detach */ | |
1395 | if (os.disk != D_FAILED && ns.disk == D_FAILED) { | |
32db80f6 PR |
1396 | enum drbd_io_error_p eh = EP_PASS_ON; |
1397 | int was_io_error = 0; | |
b8907339 | 1398 | /* corresponding get_ldev was in __drbd_set_state, to serialize |
32db80f6 PR |
1399 | * our cleanup here with the transition to D_DISKLESS. |
1400 | * But is is still not save to dreference ldev here, since | |
1401 | * we might come from an failed Attach before ldev was set. */ | |
1402 | if (mdev->ldev) { | |
1403 | rcu_read_lock(); | |
1404 | eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error; | |
1405 | rcu_read_unlock(); | |
1406 | ||
1407 | was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags); | |
1408 | ||
6f1a6563 LE |
1409 | if (was_io_error && eh == EP_CALL_HELPER) |
1410 | drbd_khelper(mdev, "local-io-error"); | |
1411 | ||
0c849666 LE |
1412 | /* Immediately allow completion of all application IO, |
1413 | * that waits for completion from the local disk, | |
1414 | * if this was a force-detach due to disk_timeout | |
1415 | * or administrator request (drbdsetup detach --force). | |
1416 | * Do NOT abort otherwise. | |
1417 | * Aborting local requests may cause serious problems, | |
1418 | * if requests are completed to upper layers already, | |
1419 | * and then later the already submitted local bio completes. | |
1420 | * This can cause DMA into former bio pages that meanwhile | |
1421 | * have been re-used for other things. | |
1422 | * So aborting local requests may cause crashes, | |
1423 | * or even worse, silent data corruption. | |
1424 | */ | |
1425 | if (test_and_clear_bit(FORCE_DETACH, &mdev->flags)) | |
1426 | tl_abort_disk_io(mdev); | |
32db80f6 PR |
1427 | |
1428 | /* current state still has to be D_FAILED, | |
1429 | * there is only one way out: to D_DISKLESS, | |
1430 | * and that may only happen after our put_ldev below. */ | |
1431 | if (mdev->state.disk != D_FAILED) | |
1432 | dev_err(DEV, | |
1433 | "ASSERT FAILED: disk is %s during detach\n", | |
1434 | drbd_disk_str(mdev->state.disk)); | |
1435 | ||
1436 | if (ns.conn >= C_CONNECTED) | |
1437 | drbd_send_state(mdev, ns); | |
1438 | ||
1439 | drbd_rs_cancel_all(mdev); | |
1440 | ||
1441 | /* In case we want to get something to stable storage still, | |
1442 | * this may be the last chance. | |
1443 | * Following put_ldev may transition to D_DISKLESS. */ | |
1444 | drbd_md_sync(mdev); | |
1445 | } | |
b8907339 | 1446 | put_ldev(mdev); |
b8907339 PR |
1447 | } |
1448 | ||
1449 | /* second half of local IO error, failure to attach, | |
1450 | * or administrative detach, | |
1451 | * after local_cnt references have reached zero again */ | |
1452 | if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) { | |
1453 | /* We must still be diskless, | |
1454 | * re-attach has to be serialized with this! */ | |
1455 | if (mdev->state.disk != D_DISKLESS) | |
1456 | dev_err(DEV, | |
1457 | "ASSERT FAILED: disk is %s while going diskless\n", | |
1458 | drbd_disk_str(mdev->state.disk)); | |
1459 | ||
6ab9b1b6 PR |
1460 | if (ns.conn >= C_CONNECTED) |
1461 | drbd_send_state(mdev, ns); | |
b8907339 PR |
1462 | /* corresponding get_ldev in __drbd_set_state |
1463 | * this may finally trigger drbd_ldev_destroy. */ | |
1464 | put_ldev(mdev); | |
1465 | } | |
1466 | ||
1467 | /* Notify peer that I had a local IO error, and did not detached.. */ | |
6ab9b1b6 | 1468 | if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED) |
43de7c85 | 1469 | drbd_send_state(mdev, ns); |
b8907339 PR |
1470 | |
1471 | /* Disks got bigger while they were detached */ | |
1472 | if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING && | |
1473 | test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) { | |
1474 | if (ns.conn == C_CONNECTED) | |
1475 | resync_after_online_grow(mdev); | |
1476 | } | |
1477 | ||
1478 | /* A resync finished or aborted, wake paused devices... */ | |
1479 | if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) || | |
1480 | (os.peer_isp && !ns.peer_isp) || | |
1481 | (os.user_isp && !ns.user_isp)) | |
1482 | resume_next_sg(mdev); | |
1483 | ||
1484 | /* sync target done with resync. Explicitly notify peer, even though | |
1485 | * it should (at least for non-empty resyncs) already know itself. */ | |
1486 | if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED) | |
43de7c85 | 1487 | drbd_send_state(mdev, ns); |
b8907339 | 1488 | |
58ffa580 LE |
1489 | /* Verify finished, or reached stop sector. Peer did not know about |
1490 | * the stop sector, and we may even have changed the stop sector during | |
1491 | * verify to interrupt/stop early. Send the new state. */ | |
1492 | if (os.conn == C_VERIFY_S && ns.conn == C_CONNECTED | |
1493 | && verify_can_do_stop_sector(mdev)) | |
1494 | drbd_send_state(mdev, ns); | |
1495 | ||
b8907339 PR |
1496 | /* This triggers bitmap writeout of potentially still unwritten pages |
1497 | * if the resync finished cleanly, or aborted because of peer disk | |
1498 | * failure, or because of connection loss. | |
1499 | * For resync aborted because of local disk failure, we cannot do | |
1500 | * any bitmap writeout anymore. | |
1501 | * No harm done if some bits change during this phase. | |
1502 | */ | |
1503 | if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) { | |
a220d291 LE |
1504 | drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL, |
1505 | "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED); | |
b8907339 PR |
1506 | put_ldev(mdev); |
1507 | } | |
1508 | ||
1509 | if (ns.disk == D_DISKLESS && | |
1510 | ns.conn == C_STANDALONE && | |
1511 | ns.role == R_SECONDARY) { | |
1512 | if (os.aftr_isp != ns.aftr_isp) | |
1513 | resume_next_sg(mdev); | |
1514 | } | |
1515 | ||
b8907339 PR |
1516 | drbd_md_sync(mdev); |
1517 | } | |
1518 | ||
bbeb641c PR |
1519 | struct after_conn_state_chg_work { |
1520 | struct drbd_work w; | |
1521 | enum drbd_conns oc; | |
8c7e16c3 | 1522 | union drbd_state ns_min; |
5f082f98 | 1523 | union drbd_state ns_max; /* new, max state, over all mdevs */ |
bbeb641c PR |
1524 | enum chg_state_flags flags; |
1525 | }; | |
1526 | ||
99920dc5 | 1527 | static int w_after_conn_state_ch(struct drbd_work *w, int unused) |
bbeb641c PR |
1528 | { |
1529 | struct after_conn_state_chg_work *acscw = | |
1530 | container_of(w, struct after_conn_state_chg_work, w); | |
1531 | struct drbd_tconn *tconn = w->tconn; | |
1532 | enum drbd_conns oc = acscw->oc; | |
5f082f98 | 1533 | union drbd_state ns_max = acscw->ns_max; |
a6d00c8e PR |
1534 | struct drbd_conf *mdev; |
1535 | int vnr; | |
bbeb641c PR |
1536 | |
1537 | kfree(acscw); | |
1538 | ||
b8907339 | 1539 | /* Upon network configuration, we need to start the receiver */ |
5f082f98 | 1540 | if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED) |
b8907339 PR |
1541 | drbd_thread_start(&tconn->receiver); |
1542 | ||
f3dfa40a LE |
1543 | if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) { |
1544 | struct net_conf *old_conf; | |
1545 | ||
a0095508 | 1546 | mutex_lock(&tconn->conf_update); |
f3dfa40a | 1547 | old_conf = tconn->net_conf; |
089c075d AG |
1548 | tconn->my_addr_len = 0; |
1549 | tconn->peer_addr_len = 0; | |
f3dfa40a LE |
1550 | rcu_assign_pointer(tconn->net_conf, NULL); |
1551 | conn_free_crypto(tconn); | |
a0095508 | 1552 | mutex_unlock(&tconn->conf_update); |
f3dfa40a LE |
1553 | |
1554 | synchronize_rcu(); | |
1555 | kfree(old_conf); | |
1556 | } | |
1557 | ||
a6d00c8e PR |
1558 | if (ns_max.susp_fen) { |
1559 | /* case1: The outdate peer handler is successful: */ | |
1560 | if (ns_max.pdsk <= D_OUTDATED) { | |
695d08fa | 1561 | rcu_read_lock(); |
a6d00c8e PR |
1562 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1563 | if (test_bit(NEW_CUR_UUID, &mdev->flags)) { | |
1564 | drbd_uuid_new_current(mdev); | |
1565 | clear_bit(NEW_CUR_UUID, &mdev->flags); | |
1566 | } | |
1567 | } | |
695d08fa | 1568 | rcu_read_unlock(); |
8a0bab2a PR |
1569 | spin_lock_irq(&tconn->req_lock); |
1570 | _tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING); | |
1571 | _conn_request_state(tconn, | |
1572 | (union drbd_state) { { .susp_fen = 1 } }, | |
1573 | (union drbd_state) { { .susp_fen = 0 } }, | |
1574 | CS_VERBOSE); | |
1575 | spin_unlock_irq(&tconn->req_lock); | |
a6d00c8e | 1576 | } |
a6d00c8e | 1577 | } |
9dc9fbb3 | 1578 | kref_put(&tconn->kref, &conn_destroy); |
19fffd7b PR |
1579 | |
1580 | conn_md_sync(tconn); | |
1581 | ||
99920dc5 | 1582 | return 0; |
bbeb641c PR |
1583 | } |
1584 | ||
435693e8 | 1585 | void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf) |
88ef594e | 1586 | { |
435693e8 | 1587 | enum chg_state_flags flags = ~0; |
88ef594e | 1588 | struct drbd_conf *mdev; |
435693e8 | 1589 | int vnr, first_vol = 1; |
e0e16653 PR |
1590 | union drbd_dev_state os, cs = { |
1591 | { .role = R_SECONDARY, | |
1592 | .peer = R_UNKNOWN, | |
1593 | .conn = tconn->cstate, | |
1594 | .disk = D_DISKLESS, | |
1595 | .pdsk = D_UNKNOWN, | |
1596 | } }; | |
88ef594e | 1597 | |
695d08fa | 1598 | rcu_read_lock(); |
88ef594e PR |
1599 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1600 | os = mdev->state; | |
1601 | ||
435693e8 PR |
1602 | if (first_vol) { |
1603 | cs = os; | |
1604 | first_vol = 0; | |
1605 | continue; | |
1606 | } | |
1607 | ||
1608 | if (cs.role != os.role) | |
1609 | flags &= ~CS_DC_ROLE; | |
1610 | ||
1611 | if (cs.peer != os.peer) | |
1612 | flags &= ~CS_DC_PEER; | |
1613 | ||
1614 | if (cs.conn != os.conn) | |
1615 | flags &= ~CS_DC_CONN; | |
88ef594e | 1616 | |
435693e8 PR |
1617 | if (cs.disk != os.disk) |
1618 | flags &= ~CS_DC_DISK; | |
88ef594e | 1619 | |
435693e8 PR |
1620 | if (cs.pdsk != os.pdsk) |
1621 | flags &= ~CS_DC_PDSK; | |
1622 | } | |
695d08fa | 1623 | rcu_read_unlock(); |
435693e8 PR |
1624 | |
1625 | *pf |= CS_DC_MASK; | |
1626 | *pf &= flags; | |
da9fbc27 | 1627 | (*pcs).i = cs.i; |
88ef594e | 1628 | } |
bbeb641c | 1629 | |
bd0c824a PR |
1630 | static enum drbd_state_rv |
1631 | conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
88ef594e | 1632 | enum chg_state_flags flags) |
bbeb641c | 1633 | { |
bd0c824a | 1634 | enum drbd_state_rv rv = SS_SUCCESS; |
bbeb641c | 1635 | union drbd_state ns, os; |
bd0c824a PR |
1636 | struct drbd_conf *mdev; |
1637 | int vnr; | |
bbeb641c | 1638 | |
695d08fa | 1639 | rcu_read_lock(); |
bd0c824a | 1640 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
78bae59b | 1641 | os = drbd_read_state(mdev); |
bd0c824a PR |
1642 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
1643 | ||
778bcf2e PR |
1644 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1645 | ns.disk = os.disk; | |
1646 | ||
bd0c824a PR |
1647 | if (ns.i == os.i) |
1648 | continue; | |
bbeb641c | 1649 | |
bd0c824a PR |
1650 | rv = is_valid_transition(os, ns); |
1651 | if (rv < SS_SUCCESS) | |
1652 | break; | |
1653 | ||
1654 | if (!(flags & CS_HARD)) { | |
1655 | rv = is_valid_state(mdev, ns); | |
1656 | if (rv < SS_SUCCESS) { | |
1657 | if (is_valid_state(mdev, os) == rv) | |
a1096a6e | 1658 | rv = is_valid_soft_transition(os, ns, tconn); |
bd0c824a | 1659 | } else |
a1096a6e | 1660 | rv = is_valid_soft_transition(os, ns, tconn); |
bd0c824a PR |
1661 | } |
1662 | if (rv < SS_SUCCESS) | |
1663 | break; | |
bbeb641c | 1664 | } |
695d08fa | 1665 | rcu_read_unlock(); |
bbeb641c | 1666 | |
bd0c824a PR |
1667 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) |
1668 | print_st_err(mdev, os, ns, rv); | |
1669 | ||
1670 | return rv; | |
bbeb641c PR |
1671 | } |
1672 | ||
8c7e16c3 | 1673 | void |
bd0c824a | 1674 | conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, |
8c7e16c3 | 1675 | union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags) |
bbeb641c | 1676 | { |
f132f554 | 1677 | union drbd_state ns, os, ns_max = { }; |
8c7e16c3 PR |
1678 | union drbd_state ns_min = { |
1679 | { .role = R_MASK, | |
1680 | .peer = R_MASK, | |
e0e16653 | 1681 | .conn = val.conn, |
8c7e16c3 PR |
1682 | .disk = D_MASK, |
1683 | .pdsk = D_MASK | |
1684 | } }; | |
bd0c824a | 1685 | struct drbd_conf *mdev; |
bbeb641c | 1686 | enum drbd_state_rv rv; |
f132f554 | 1687 | int vnr, number_of_volumes = 0; |
bbeb641c | 1688 | |
07be15b1 LE |
1689 | if (mask.conn == C_MASK) { |
1690 | /* remember last connect time so request_timer_fn() won't | |
1691 | * kill newly established sessions while we are still trying to thaw | |
1692 | * previously frozen IO */ | |
1693 | if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS) | |
1694 | tconn->last_reconnect_jif = jiffies; | |
1695 | ||
bd0c824a | 1696 | tconn->cstate = val.conn; |
07be15b1 | 1697 | } |
bd0c824a | 1698 | |
695d08fa | 1699 | rcu_read_lock(); |
bd0c824a | 1700 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
f132f554 | 1701 | number_of_volumes++; |
78bae59b | 1702 | os = drbd_read_state(mdev); |
bd0c824a PR |
1703 | ns = apply_mask_val(os, mask, val); |
1704 | ns = sanitize_state(mdev, ns, NULL); | |
bbeb641c | 1705 | |
778bcf2e PR |
1706 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1707 | ns.disk = os.disk; | |
1708 | ||
bd0c824a PR |
1709 | rv = __drbd_set_state(mdev, ns, flags, NULL); |
1710 | if (rv < SS_SUCCESS) | |
1711 | BUG(); | |
bbeb641c | 1712 | |
8c7e16c3 PR |
1713 | ns.i = mdev->state.i; |
1714 | ns_max.role = max_role(ns.role, ns_max.role); | |
1715 | ns_max.peer = max_role(ns.peer, ns_max.peer); | |
1716 | ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn); | |
1717 | ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk); | |
1718 | ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk); | |
1719 | ||
1720 | ns_min.role = min_role(ns.role, ns_min.role); | |
1721 | ns_min.peer = min_role(ns.peer, ns_min.peer); | |
1722 | ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn); | |
1723 | ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk); | |
1724 | ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk); | |
bd0c824a | 1725 | } |
695d08fa | 1726 | rcu_read_unlock(); |
bbeb641c | 1727 | |
f132f554 PR |
1728 | if (number_of_volumes == 0) { |
1729 | ns_min = ns_max = (union drbd_state) { { | |
1730 | .role = R_SECONDARY, | |
1731 | .peer = R_UNKNOWN, | |
1732 | .conn = val.conn, | |
1733 | .disk = D_DISKLESS, | |
1734 | .pdsk = D_UNKNOWN | |
1735 | } }; | |
1736 | } | |
1737 | ||
8c7e16c3 PR |
1738 | ns_min.susp = ns_max.susp = tconn->susp; |
1739 | ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod; | |
1740 | ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen; | |
1741 | ||
1742 | *pns_min = ns_min; | |
1743 | *pns_max = ns_max; | |
bbeb641c PR |
1744 | } |
1745 | ||
df24aa45 PR |
1746 | static enum drbd_state_rv |
1747 | _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val) | |
1748 | { | |
df24aa45 PR |
1749 | enum drbd_state_rv rv; |
1750 | ||
1751 | if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags)) | |
1752 | return SS_CW_SUCCESS; | |
1753 | ||
1754 | if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags)) | |
1755 | return SS_CW_FAILED_BY_PEER; | |
1756 | ||
2bd5ed5d PR |
1757 | rv = conn_is_valid_transition(tconn, mask, val, 0); |
1758 | if (rv == SS_SUCCESS && tconn->cstate == C_WF_REPORT_PARAMS) | |
1759 | rv = SS_UNKNOWN_ERROR; /* continue waiting */ | |
df24aa45 | 1760 | |
df24aa45 PR |
1761 | return rv; |
1762 | } | |
1763 | ||
bbeb641c PR |
1764 | enum drbd_state_rv |
1765 | _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1766 | enum chg_state_flags flags) | |
1767 | { | |
1768 | enum drbd_state_rv rv = SS_SUCCESS; | |
bbeb641c PR |
1769 | struct after_conn_state_chg_work *acscw; |
1770 | enum drbd_conns oc = tconn->cstate; | |
8c7e16c3 | 1771 | union drbd_state ns_max, ns_min, os; |
c02abda2 | 1772 | bool have_mutex = false; |
bbeb641c | 1773 | |
07fc9619 PR |
1774 | if (mask.conn) { |
1775 | rv = is_valid_conn_transition(oc, val.conn); | |
1776 | if (rv < SS_SUCCESS) | |
1777 | goto abort; | |
1778 | } | |
bbeb641c | 1779 | |
88ef594e | 1780 | rv = conn_is_valid_transition(tconn, mask, val, flags); |
bbeb641c PR |
1781 | if (rv < SS_SUCCESS) |
1782 | goto abort; | |
1783 | ||
df24aa45 PR |
1784 | if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING && |
1785 | !(flags & (CS_LOCAL_ONLY | CS_HARD))) { | |
c02abda2 LE |
1786 | |
1787 | /* This will be a cluster-wide state change. | |
1788 | * Need to give up the spinlock, grab the mutex, | |
1789 | * then send the state change request, ... */ | |
1790 | spin_unlock_irq(&tconn->req_lock); | |
1791 | mutex_lock(&tconn->cstate_mutex); | |
1792 | have_mutex = true; | |
1793 | ||
1794 | set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
1795 | if (conn_send_state_req(tconn, mask, val)) { | |
1796 | /* sending failed. */ | |
1797 | clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
1798 | rv = SS_CW_FAILED_BY_PEER; | |
1799 | /* need to re-aquire the spin lock, though */ | |
1800 | goto abort_unlocked; | |
1801 | } | |
1802 | ||
1803 | if (val.conn == C_DISCONNECTING) | |
1804 | set_bit(DISCONNECT_SENT, &tconn->flags); | |
1805 | ||
1806 | /* ... and re-aquire the spinlock. | |
1807 | * If _conn_rq_cond() returned >= SS_SUCCESS, we must call | |
1808 | * conn_set_state() within the same spinlock. */ | |
1809 | spin_lock_irq(&tconn->req_lock); | |
1810 | wait_event_lock_irq(tconn->ping_wait, | |
1811 | (rv = _conn_rq_cond(tconn, mask, val)), | |
2cecb730 | 1812 | tconn->req_lock); |
c02abda2 | 1813 | clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); |
df24aa45 PR |
1814 | if (rv < SS_SUCCESS) |
1815 | goto abort; | |
1816 | } | |
1817 | ||
435693e8 | 1818 | conn_old_common_state(tconn, &os, &flags); |
706cb24c | 1819 | flags |= CS_DC_SUSP; |
8c7e16c3 | 1820 | conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags); |
5f082f98 | 1821 | conn_pr_state_change(tconn, os, ns_max, flags); |
bbeb641c PR |
1822 | |
1823 | acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC); | |
1824 | if (acscw) { | |
435693e8 | 1825 | acscw->oc = os.conn; |
8c7e16c3 | 1826 | acscw->ns_min = ns_min; |
5f082f98 | 1827 | acscw->ns_max = ns_max; |
bbeb641c PR |
1828 | acscw->flags = flags; |
1829 | acscw->w.cb = w_after_conn_state_ch; | |
9dc9fbb3 | 1830 | kref_get(&tconn->kref); |
bbeb641c | 1831 | acscw->w.tconn = tconn; |
d5b27b01 | 1832 | drbd_queue_work(&tconn->sender_work, &acscw->w); |
bbeb641c PR |
1833 | } else { |
1834 | conn_err(tconn, "Could not kmalloc an acscw\n"); | |
b8907339 | 1835 | } |
bbeb641c | 1836 | |
a01842eb | 1837 | abort: |
c02abda2 LE |
1838 | if (have_mutex) { |
1839 | /* mutex_unlock() "... must not be used in interrupt context.", | |
1840 | * so give up the spinlock, then re-aquire it */ | |
1841 | spin_unlock_irq(&tconn->req_lock); | |
1842 | abort_unlocked: | |
1843 | mutex_unlock(&tconn->cstate_mutex); | |
1844 | spin_lock_irq(&tconn->req_lock); | |
1845 | } | |
1846 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) { | |
a01842eb | 1847 | conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv)); |
4ae98b4d PR |
1848 | conn_err(tconn, " mask = 0x%x val = 0x%x\n", mask.i, val.i); |
1849 | conn_err(tconn, " old_conn:%s wanted_conn:%s\n", drbd_conn_str(oc), drbd_conn_str(val.conn)); | |
a01842eb | 1850 | } |
bbeb641c PR |
1851 | return rv; |
1852 | } | |
1853 | ||
1854 | enum drbd_state_rv | |
1855 | conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1856 | enum chg_state_flags flags) | |
1857 | { | |
1858 | enum drbd_state_rv rv; | |
1859 | ||
1860 | spin_lock_irq(&tconn->req_lock); | |
1861 | rv = _conn_request_state(tconn, mask, val, flags); | |
1862 | spin_unlock_irq(&tconn->req_lock); | |
1863 | ||
1864 | return rv; | |
b8907339 | 1865 | } |