drbd_state.c 54 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865
  1. /*
  2. drbd_state.c
  3. This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
  4. Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
  5. Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
  6. Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
  7. Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
  8. from Logicworks, Inc. for making SDP replication support possible.
  9. drbd is free software; you can redistribute it and/or modify
  10. it under the terms of the GNU General Public License as published by
  11. the Free Software Foundation; either version 2, or (at your option)
  12. any later version.
  13. drbd is distributed in the hope that it will be useful,
  14. but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. GNU General Public License for more details.
  17. You should have received a copy of the GNU General Public License
  18. along with drbd; see the file COPYING. If not, write to
  19. the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
  20. */
  21. #include <linux/drbd_limits.h>
  22. #include "drbd_int.h"
  23. #include "drbd_req.h"
  24. /* in drbd_main.c */
  25. extern void tl_abort_disk_io(struct drbd_conf *mdev);
  26. struct after_state_chg_work {
  27. struct drbd_work w;
  28. union drbd_state os;
  29. union drbd_state ns;
  30. enum chg_state_flags flags;
  31. struct completion *done;
  32. };
  33. enum sanitize_state_warnings {
  34. NO_WARNING,
  35. ABORTED_ONLINE_VERIFY,
  36. ABORTED_RESYNC,
  37. CONNECTION_LOST_NEGOTIATING,
  38. IMPLICITLY_UPGRADED_DISK,
  39. IMPLICITLY_UPGRADED_PDSK,
  40. };
  41. static int w_after_state_ch(struct drbd_work *w, int unused);
  42. static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
  43. union drbd_state ns, enum chg_state_flags flags);
  44. static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
  45. static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *);
  46. static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
  47. static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
  48. enum sanitize_state_warnings *warn);
  49. static inline bool is_susp(union drbd_state s)
  50. {
  51. return s.susp || s.susp_nod || s.susp_fen;
  52. }
  53. bool conn_all_vols_unconf(struct drbd_tconn *tconn)
  54. {
  55. struct drbd_conf *mdev;
  56. bool rv = true;
  57. int vnr;
  58. rcu_read_lock();
  59. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  60. if (mdev->state.disk != D_DISKLESS ||
  61. mdev->state.conn != C_STANDALONE ||
  62. mdev->state.role != R_SECONDARY) {
  63. rv = false;
  64. break;
  65. }
  66. }
  67. rcu_read_unlock();
  68. return rv;
  69. }
  70. /* Unfortunately the states where not correctly ordered, when
  71. they where defined. therefore can not use max_t() here. */
  72. static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
  73. {
  74. if (role1 == R_PRIMARY || role2 == R_PRIMARY)
  75. return R_PRIMARY;
  76. if (role1 == R_SECONDARY || role2 == R_SECONDARY)
  77. return R_SECONDARY;
  78. return R_UNKNOWN;
  79. }
  80. static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
  81. {
  82. if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
  83. return R_UNKNOWN;
  84. if (role1 == R_SECONDARY || role2 == R_SECONDARY)
  85. return R_SECONDARY;
  86. return R_PRIMARY;
  87. }
  88. enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
  89. {
  90. enum drbd_role role = R_UNKNOWN;
  91. struct drbd_conf *mdev;
  92. int vnr;
  93. rcu_read_lock();
  94. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  95. role = max_role(role, mdev->state.role);
  96. rcu_read_unlock();
  97. return role;
  98. }
  99. enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
  100. {
  101. enum drbd_role peer = R_UNKNOWN;
  102. struct drbd_conf *mdev;
  103. int vnr;
  104. rcu_read_lock();
  105. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  106. peer = max_role(peer, mdev->state.peer);
  107. rcu_read_unlock();
  108. return peer;
  109. }
  110. enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
  111. {
  112. enum drbd_disk_state ds = D_DISKLESS;
  113. struct drbd_conf *mdev;
  114. int vnr;
  115. rcu_read_lock();
  116. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  117. ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
  118. rcu_read_unlock();
  119. return ds;
  120. }
  121. enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
  122. {
  123. enum drbd_disk_state ds = D_MASK;
  124. struct drbd_conf *mdev;
  125. int vnr;
  126. rcu_read_lock();
  127. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  128. ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
  129. rcu_read_unlock();
  130. return ds;
  131. }
  132. enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
  133. {
  134. enum drbd_disk_state ds = D_DISKLESS;
  135. struct drbd_conf *mdev;
  136. int vnr;
  137. rcu_read_lock();
  138. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  139. ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
  140. rcu_read_unlock();
  141. return ds;
  142. }
  143. enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
  144. {
  145. enum drbd_conns conn = C_MASK;
  146. struct drbd_conf *mdev;
  147. int vnr;
  148. rcu_read_lock();
  149. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  150. conn = min_t(enum drbd_conns, conn, mdev->state.conn);
  151. rcu_read_unlock();
  152. return conn;
  153. }
  154. static bool no_peer_wf_report_params(struct drbd_tconn *tconn)
  155. {
  156. struct drbd_conf *mdev;
  157. int vnr;
  158. bool rv = true;
  159. rcu_read_lock();
  160. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  161. if (mdev->state.conn == C_WF_REPORT_PARAMS) {
  162. rv = false;
  163. break;
  164. }
  165. rcu_read_unlock();
  166. return rv;
  167. }
  168. /**
  169. * cl_wide_st_chg() - true if the state change is a cluster wide one
  170. * @mdev: DRBD device.
  171. * @os: old (current) state.
  172. * @ns: new (wanted) state.
  173. */
  174. static int cl_wide_st_chg(struct drbd_conf *mdev,
  175. union drbd_state os, union drbd_state ns)
  176. {
  177. return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
  178. ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
  179. (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
  180. (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
  181. (os.disk != D_FAILED && ns.disk == D_FAILED))) ||
  182. (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
  183. (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) ||
  184. (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS);
  185. }
  186. static union drbd_state
  187. apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
  188. {
  189. union drbd_state ns;
  190. ns.i = (os.i & ~mask.i) | val.i;
  191. return ns;
  192. }
  193. enum drbd_state_rv
  194. drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
  195. union drbd_state mask, union drbd_state val)
  196. {
  197. unsigned long flags;
  198. union drbd_state ns;
  199. enum drbd_state_rv rv;
  200. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  201. ns = apply_mask_val(drbd_read_state(mdev), mask, val);
  202. rv = _drbd_set_state(mdev, ns, f, NULL);
  203. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  204. return rv;
  205. }
  206. /**
  207. * drbd_force_state() - Impose a change which happens outside our control on our state
  208. * @mdev: DRBD device.
  209. * @mask: mask of state bits to change.
  210. * @val: value of new state bits.
  211. */
  212. void drbd_force_state(struct drbd_conf *mdev,
  213. union drbd_state mask, union drbd_state val)
  214. {
  215. drbd_change_state(mdev, CS_HARD, mask, val);
  216. }
  217. static enum drbd_state_rv
  218. _req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
  219. union drbd_state val)
  220. {
  221. union drbd_state os, ns;
  222. unsigned long flags;
  223. enum drbd_state_rv rv;
  224. if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
  225. return SS_CW_SUCCESS;
  226. if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
  227. return SS_CW_FAILED_BY_PEER;
  228. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  229. os = drbd_read_state(mdev);
  230. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  231. rv = is_valid_transition(os, ns);
  232. if (rv >= SS_SUCCESS)
  233. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  234. if (!cl_wide_st_chg(mdev, os, ns))
  235. rv = SS_CW_NO_NEED;
  236. if (rv == SS_UNKNOWN_ERROR) {
  237. rv = is_valid_state(mdev, ns);
  238. if (rv >= SS_SUCCESS) {
  239. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  240. if (rv >= SS_SUCCESS)
  241. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  242. }
  243. }
  244. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  245. return rv;
  246. }
  247. /**
  248. * drbd_req_state() - Perform an eventually cluster wide state change
  249. * @mdev: DRBD device.
  250. * @mask: mask of state bits to change.
  251. * @val: value of new state bits.
  252. * @f: flags
  253. *
  254. * Should not be called directly, use drbd_request_state() or
  255. * _drbd_request_state().
  256. */
  257. static enum drbd_state_rv
  258. drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
  259. union drbd_state val, enum chg_state_flags f)
  260. {
  261. struct completion done;
  262. unsigned long flags;
  263. union drbd_state os, ns;
  264. enum drbd_state_rv rv;
  265. init_completion(&done);
  266. if (f & CS_SERIALIZE)
  267. mutex_lock(mdev->state_mutex);
  268. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  269. os = drbd_read_state(mdev);
  270. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  271. rv = is_valid_transition(os, ns);
  272. if (rv < SS_SUCCESS) {
  273. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  274. goto abort;
  275. }
  276. if (cl_wide_st_chg(mdev, os, ns)) {
  277. rv = is_valid_state(mdev, ns);
  278. if (rv == SS_SUCCESS)
  279. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  280. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  281. if (rv < SS_SUCCESS) {
  282. if (f & CS_VERBOSE)
  283. print_st_err(mdev, os, ns, rv);
  284. goto abort;
  285. }
  286. if (drbd_send_state_req(mdev, mask, val)) {
  287. rv = SS_CW_FAILED_BY_PEER;
  288. if (f & CS_VERBOSE)
  289. print_st_err(mdev, os, ns, rv);
  290. goto abort;
  291. }
  292. wait_event(mdev->state_wait,
  293. (rv = _req_st_cond(mdev, mask, val)));
  294. if (rv < SS_SUCCESS) {
  295. if (f & CS_VERBOSE)
  296. print_st_err(mdev, os, ns, rv);
  297. goto abort;
  298. }
  299. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  300. ns = apply_mask_val(drbd_read_state(mdev), mask, val);
  301. rv = _drbd_set_state(mdev, ns, f, &done);
  302. } else {
  303. rv = _drbd_set_state(mdev, ns, f, &done);
  304. }
  305. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  306. if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
  307. D_ASSERT(current != mdev->tconn->worker.task);
  308. wait_for_completion(&done);
  309. }
  310. abort:
  311. if (f & CS_SERIALIZE)
  312. mutex_unlock(mdev->state_mutex);
  313. return rv;
  314. }
  315. /**
  316. * _drbd_request_state() - Request a state change (with flags)
  317. * @mdev: DRBD device.
  318. * @mask: mask of state bits to change.
  319. * @val: value of new state bits.
  320. * @f: flags
  321. *
  322. * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
  323. * flag, or when logging of failed state change requests is not desired.
  324. */
  325. enum drbd_state_rv
  326. _drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
  327. union drbd_state val, enum chg_state_flags f)
  328. {
  329. enum drbd_state_rv rv;
  330. wait_event(mdev->state_wait,
  331. (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
  332. return rv;
  333. }
  334. static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
  335. {
  336. dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
  337. name,
  338. drbd_conn_str(ns.conn),
  339. drbd_role_str(ns.role),
  340. drbd_role_str(ns.peer),
  341. drbd_disk_str(ns.disk),
  342. drbd_disk_str(ns.pdsk),
  343. is_susp(ns) ? 's' : 'r',
  344. ns.aftr_isp ? 'a' : '-',
  345. ns.peer_isp ? 'p' : '-',
  346. ns.user_isp ? 'u' : '-',
  347. ns.susp_fen ? 'F' : '-',
  348. ns.susp_nod ? 'N' : '-'
  349. );
  350. }
  351. void print_st_err(struct drbd_conf *mdev, union drbd_state os,
  352. union drbd_state ns, enum drbd_state_rv err)
  353. {
  354. if (err == SS_IN_TRANSIENT_STATE)
  355. return;
  356. dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
  357. print_st(mdev, " state", os);
  358. print_st(mdev, "wanted", ns);
  359. }
  360. static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
  361. enum chg_state_flags flags)
  362. {
  363. char *pbp;
  364. pbp = pb;
  365. *pbp = 0;
  366. if (ns.role != os.role && flags & CS_DC_ROLE)
  367. pbp += sprintf(pbp, "role( %s -> %s ) ",
  368. drbd_role_str(os.role),
  369. drbd_role_str(ns.role));
  370. if (ns.peer != os.peer && flags & CS_DC_PEER)
  371. pbp += sprintf(pbp, "peer( %s -> %s ) ",
  372. drbd_role_str(os.peer),
  373. drbd_role_str(ns.peer));
  374. if (ns.conn != os.conn && flags & CS_DC_CONN)
  375. pbp += sprintf(pbp, "conn( %s -> %s ) ",
  376. drbd_conn_str(os.conn),
  377. drbd_conn_str(ns.conn));
  378. if (ns.disk != os.disk && flags & CS_DC_DISK)
  379. pbp += sprintf(pbp, "disk( %s -> %s ) ",
  380. drbd_disk_str(os.disk),
  381. drbd_disk_str(ns.disk));
  382. if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
  383. pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
  384. drbd_disk_str(os.pdsk),
  385. drbd_disk_str(ns.pdsk));
  386. return pbp - pb;
  387. }
  388. static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
  389. enum chg_state_flags flags)
  390. {
  391. char pb[300];
  392. char *pbp = pb;
  393. pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
  394. if (ns.aftr_isp != os.aftr_isp)
  395. pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
  396. os.aftr_isp,
  397. ns.aftr_isp);
  398. if (ns.peer_isp != os.peer_isp)
  399. pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
  400. os.peer_isp,
  401. ns.peer_isp);
  402. if (ns.user_isp != os.user_isp)
  403. pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
  404. os.user_isp,
  405. ns.user_isp);
  406. if (pbp != pb)
  407. dev_info(DEV, "%s\n", pb);
  408. }
  409. static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
  410. enum chg_state_flags flags)
  411. {
  412. char pb[300];
  413. char *pbp = pb;
  414. pbp += print_state_change(pbp, os, ns, flags);
  415. if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
  416. pbp += sprintf(pbp, "susp( %d -> %d ) ",
  417. is_susp(os),
  418. is_susp(ns));
  419. if (pbp != pb)
  420. conn_info(tconn, "%s\n", pb);
  421. }
  422. /**
  423. * is_valid_state() - Returns an SS_ error code if ns is not valid
  424. * @mdev: DRBD device.
  425. * @ns: State to consider.
  426. */
  427. static enum drbd_state_rv
  428. is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
  429. {
  430. /* See drbd_state_sw_errors in drbd_strings.c */
  431. enum drbd_fencing_p fp;
  432. enum drbd_state_rv rv = SS_SUCCESS;
  433. struct net_conf *nc;
  434. rcu_read_lock();
  435. fp = FP_DONT_CARE;
  436. if (get_ldev(mdev)) {
  437. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  438. put_ldev(mdev);
  439. }
  440. nc = rcu_dereference(mdev->tconn->net_conf);
  441. if (nc) {
  442. if (!nc->two_primaries && ns.role == R_PRIMARY) {
  443. if (ns.peer == R_PRIMARY)
  444. rv = SS_TWO_PRIMARIES;
  445. else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
  446. rv = SS_O_VOL_PEER_PRI;
  447. }
  448. }
  449. if (rv <= 0)
  450. /* already found a reason to abort */;
  451. else if (ns.role == R_SECONDARY && mdev->open_cnt)
  452. rv = SS_DEVICE_IN_USE;
  453. else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
  454. rv = SS_NO_UP_TO_DATE_DISK;
  455. else if (fp >= FP_RESOURCE &&
  456. ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
  457. rv = SS_PRIMARY_NOP;
  458. else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
  459. rv = SS_NO_UP_TO_DATE_DISK;
  460. else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
  461. rv = SS_NO_LOCAL_DISK;
  462. else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
  463. rv = SS_NO_REMOTE_DISK;
  464. else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
  465. rv = SS_NO_UP_TO_DATE_DISK;
  466. else if ((ns.conn == C_CONNECTED ||
  467. ns.conn == C_WF_BITMAP_S ||
  468. ns.conn == C_SYNC_SOURCE ||
  469. ns.conn == C_PAUSED_SYNC_S) &&
  470. ns.disk == D_OUTDATED)
  471. rv = SS_CONNECTED_OUTDATES;
  472. else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  473. (nc->verify_alg[0] == 0))
  474. rv = SS_NO_VERIFY_ALG;
  475. else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  476. mdev->tconn->agreed_pro_version < 88)
  477. rv = SS_NOT_SUPPORTED;
  478. else if (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
  479. rv = SS_NO_UP_TO_DATE_DISK;
  480. else if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
  481. ns.pdsk == D_UNKNOWN)
  482. rv = SS_NEED_CONNECTION;
  483. else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
  484. rv = SS_CONNECTED_OUTDATES;
  485. rcu_read_unlock();
  486. return rv;
  487. }
  488. /**
  489. * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
  490. * This function limits state transitions that may be declined by DRBD. I.e.
  491. * user requests (aka soft transitions).
  492. * @mdev: DRBD device.
  493. * @ns: new state.
  494. * @os: old state.
  495. */
  496. static enum drbd_state_rv
  497. is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn)
  498. {
  499. enum drbd_state_rv rv = SS_SUCCESS;
  500. if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
  501. os.conn > C_CONNECTED)
  502. rv = SS_RESYNC_RUNNING;
  503. if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
  504. rv = SS_ALREADY_STANDALONE;
  505. if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
  506. rv = SS_IS_DISKLESS;
  507. if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
  508. rv = SS_NO_NET_CONFIG;
  509. if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
  510. rv = SS_LOWER_THAN_OUTDATED;
  511. if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
  512. rv = SS_IN_TRANSIENT_STATE;
  513. /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
  514. rv = SS_IN_TRANSIENT_STATE; */
  515. /* While establishing a connection only allow cstate to change.
  516. Delay/refuse role changes, detach attach etc... */
  517. if (test_bit(STATE_SENT, &tconn->flags) &&
  518. !(os.conn == C_WF_REPORT_PARAMS ||
  519. (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION)))
  520. rv = SS_IN_TRANSIENT_STATE;
  521. if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
  522. rv = SS_NEED_CONNECTION;
  523. if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  524. ns.conn != os.conn && os.conn > C_CONNECTED)
  525. rv = SS_RESYNC_RUNNING;
  526. if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
  527. os.conn < C_CONNECTED)
  528. rv = SS_NEED_CONNECTION;
  529. if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
  530. && os.conn < C_WF_REPORT_PARAMS)
  531. rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
  532. if (ns.conn == C_DISCONNECTING && ns.pdsk == D_OUTDATED &&
  533. os.conn < C_CONNECTED && os.pdsk > D_OUTDATED)
  534. rv = SS_OUTDATE_WO_CONN;
  535. return rv;
  536. }
  537. static enum drbd_state_rv
  538. is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
  539. {
  540. /* no change -> nothing to do, at least for the connection part */
  541. if (oc == nc)
  542. return SS_NOTHING_TO_DO;
  543. /* disconnect of an unconfigured connection does not make sense */
  544. if (oc == C_STANDALONE && nc == C_DISCONNECTING)
  545. return SS_ALREADY_STANDALONE;
  546. /* from C_STANDALONE, we start with C_UNCONNECTED */
  547. if (oc == C_STANDALONE && nc != C_UNCONNECTED)
  548. return SS_NEED_CONNECTION;
  549. /* When establishing a connection we need to go through WF_REPORT_PARAMS!
  550. Necessary to do the right thing upon invalidate-remote on a disconnected resource */
  551. if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED)
  552. return SS_NEED_CONNECTION;
  553. /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
  554. if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
  555. return SS_IN_TRANSIENT_STATE;
  556. /* After C_DISCONNECTING only C_STANDALONE may follow */
  557. if (oc == C_DISCONNECTING && nc != C_STANDALONE)
  558. return SS_IN_TRANSIENT_STATE;
  559. return SS_SUCCESS;
  560. }
  561. /**
  562. * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
  563. * This limits hard state transitions. Hard state transitions are facts there are
  564. * imposed on DRBD by the environment. E.g. disk broke or network broke down.
  565. * But those hard state transitions are still not allowed to do everything.
  566. * @ns: new state.
  567. * @os: old state.
  568. */
  569. static enum drbd_state_rv
  570. is_valid_transition(union drbd_state os, union drbd_state ns)
  571. {
  572. enum drbd_state_rv rv;
  573. rv = is_valid_conn_transition(os.conn, ns.conn);
  574. /* we cannot fail (again) if we already detached */
  575. if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
  576. rv = SS_IS_DISKLESS;
  577. return rv;
  578. }
  579. static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
  580. {
  581. static const char *msg_table[] = {
  582. [NO_WARNING] = "",
  583. [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
  584. [ABORTED_RESYNC] = "Resync aborted.",
  585. [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
  586. [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
  587. [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
  588. };
  589. if (warn != NO_WARNING)
  590. dev_warn(DEV, "%s\n", msg_table[warn]);
  591. }
  592. /**
  593. * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
  594. * @mdev: DRBD device.
  595. * @os: old state.
  596. * @ns: new state.
  597. * @warn_sync_abort:
  598. *
  599. * When we loose connection, we have to set the state of the peers disk (pdsk)
  600. * to D_UNKNOWN. This rule and many more along those lines are in this function.
  601. */
  602. static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
  603. enum sanitize_state_warnings *warn)
  604. {
  605. enum drbd_fencing_p fp;
  606. enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
  607. if (warn)
  608. *warn = NO_WARNING;
  609. fp = FP_DONT_CARE;
  610. if (get_ldev(mdev)) {
  611. rcu_read_lock();
  612. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  613. rcu_read_unlock();
  614. put_ldev(mdev);
  615. }
  616. /* Implications from connection to peer and peer_isp */
  617. if (ns.conn < C_CONNECTED) {
  618. ns.peer_isp = 0;
  619. ns.peer = R_UNKNOWN;
  620. if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
  621. ns.pdsk = D_UNKNOWN;
  622. }
  623. /* Clear the aftr_isp when becoming unconfigured */
  624. if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
  625. ns.aftr_isp = 0;
  626. /* An implication of the disk states onto the connection state */
  627. /* Abort resync if a disk fails/detaches */
  628. if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
  629. if (warn)
  630. *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
  631. ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
  632. ns.conn = C_CONNECTED;
  633. }
  634. /* Connection breaks down before we finished "Negotiating" */
  635. if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
  636. get_ldev_if_state(mdev, D_NEGOTIATING)) {
  637. if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
  638. ns.disk = mdev->new_state_tmp.disk;
  639. ns.pdsk = mdev->new_state_tmp.pdsk;
  640. } else {
  641. if (warn)
  642. *warn = CONNECTION_LOST_NEGOTIATING;
  643. ns.disk = D_DISKLESS;
  644. ns.pdsk = D_UNKNOWN;
  645. }
  646. put_ldev(mdev);
  647. }
  648. /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
  649. if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
  650. if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
  651. ns.disk = D_UP_TO_DATE;
  652. if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
  653. ns.pdsk = D_UP_TO_DATE;
  654. }
  655. /* Implications of the connection stat on the disk states */
  656. disk_min = D_DISKLESS;
  657. disk_max = D_UP_TO_DATE;
  658. pdsk_min = D_INCONSISTENT;
  659. pdsk_max = D_UNKNOWN;
  660. switch ((enum drbd_conns)ns.conn) {
  661. case C_WF_BITMAP_T:
  662. case C_PAUSED_SYNC_T:
  663. case C_STARTING_SYNC_T:
  664. case C_WF_SYNC_UUID:
  665. case C_BEHIND:
  666. disk_min = D_INCONSISTENT;
  667. disk_max = D_OUTDATED;
  668. pdsk_min = D_UP_TO_DATE;
  669. pdsk_max = D_UP_TO_DATE;
  670. break;
  671. case C_VERIFY_S:
  672. case C_VERIFY_T:
  673. disk_min = D_UP_TO_DATE;
  674. disk_max = D_UP_TO_DATE;
  675. pdsk_min = D_UP_TO_DATE;
  676. pdsk_max = D_UP_TO_DATE;
  677. break;
  678. case C_CONNECTED:
  679. disk_min = D_DISKLESS;
  680. disk_max = D_UP_TO_DATE;
  681. pdsk_min = D_DISKLESS;
  682. pdsk_max = D_UP_TO_DATE;
  683. break;
  684. case C_WF_BITMAP_S:
  685. case C_PAUSED_SYNC_S:
  686. case C_STARTING_SYNC_S:
  687. case C_AHEAD:
  688. disk_min = D_UP_TO_DATE;
  689. disk_max = D_UP_TO_DATE;
  690. pdsk_min = D_INCONSISTENT;
  691. pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
  692. break;
  693. case C_SYNC_TARGET:
  694. disk_min = D_INCONSISTENT;
  695. disk_max = D_INCONSISTENT;
  696. pdsk_min = D_UP_TO_DATE;
  697. pdsk_max = D_UP_TO_DATE;
  698. break;
  699. case C_SYNC_SOURCE:
  700. disk_min = D_UP_TO_DATE;
  701. disk_max = D_UP_TO_DATE;
  702. pdsk_min = D_INCONSISTENT;
  703. pdsk_max = D_INCONSISTENT;
  704. break;
  705. case C_STANDALONE:
  706. case C_DISCONNECTING:
  707. case C_UNCONNECTED:
  708. case C_TIMEOUT:
  709. case C_BROKEN_PIPE:
  710. case C_NETWORK_FAILURE:
  711. case C_PROTOCOL_ERROR:
  712. case C_TEAR_DOWN:
  713. case C_WF_CONNECTION:
  714. case C_WF_REPORT_PARAMS:
  715. case C_MASK:
  716. break;
  717. }
  718. if (ns.disk > disk_max)
  719. ns.disk = disk_max;
  720. if (ns.disk < disk_min) {
  721. if (warn)
  722. *warn = IMPLICITLY_UPGRADED_DISK;
  723. ns.disk = disk_min;
  724. }
  725. if (ns.pdsk > pdsk_max)
  726. ns.pdsk = pdsk_max;
  727. if (ns.pdsk < pdsk_min) {
  728. if (warn)
  729. *warn = IMPLICITLY_UPGRADED_PDSK;
  730. ns.pdsk = pdsk_min;
  731. }
  732. if (fp == FP_STONITH &&
  733. (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
  734. ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
  735. if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
  736. (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
  737. ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
  738. if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
  739. if (ns.conn == C_SYNC_SOURCE)
  740. ns.conn = C_PAUSED_SYNC_S;
  741. if (ns.conn == C_SYNC_TARGET)
  742. ns.conn = C_PAUSED_SYNC_T;
  743. } else {
  744. if (ns.conn == C_PAUSED_SYNC_S)
  745. ns.conn = C_SYNC_SOURCE;
  746. if (ns.conn == C_PAUSED_SYNC_T)
  747. ns.conn = C_SYNC_TARGET;
  748. }
  749. return ns;
  750. }
  751. void drbd_resume_al(struct drbd_conf *mdev)
  752. {
  753. if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
  754. dev_info(DEV, "Resumed AL updates\n");
  755. }
  756. /* helper for __drbd_set_state */
  757. static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
  758. {
  759. if (mdev->tconn->agreed_pro_version < 90)
  760. mdev->ov_start_sector = 0;
  761. mdev->rs_total = drbd_bm_bits(mdev);
  762. mdev->ov_position = 0;
  763. if (cs == C_VERIFY_T) {
  764. /* starting online verify from an arbitrary position
  765. * does not fit well into the existing protocol.
  766. * on C_VERIFY_T, we initialize ov_left and friends
  767. * implicitly in receive_DataRequest once the
  768. * first P_OV_REQUEST is received */
  769. mdev->ov_start_sector = ~(sector_t)0;
  770. } else {
  771. unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
  772. if (bit >= mdev->rs_total) {
  773. mdev->ov_start_sector =
  774. BM_BIT_TO_SECT(mdev->rs_total - 1);
  775. mdev->rs_total = 1;
  776. } else
  777. mdev->rs_total -= bit;
  778. mdev->ov_position = mdev->ov_start_sector;
  779. }
  780. mdev->ov_left = mdev->rs_total;
  781. }
  782. /**
  783. * __drbd_set_state() - Set a new DRBD state
  784. * @mdev: DRBD device.
  785. * @ns: new state.
  786. * @flags: Flags
  787. * @done: Optional completion, that will get completed after the after_state_ch() finished
  788. *
  789. * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
  790. */
  791. enum drbd_state_rv
  792. __drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
  793. enum chg_state_flags flags, struct completion *done)
  794. {
  795. union drbd_state os;
  796. enum drbd_state_rv rv = SS_SUCCESS;
  797. enum sanitize_state_warnings ssw;
  798. struct after_state_chg_work *ascw;
  799. bool did_remote, should_do_remote;
  800. os = drbd_read_state(mdev);
  801. ns = sanitize_state(mdev, ns, &ssw);
  802. if (ns.i == os.i)
  803. return SS_NOTHING_TO_DO;
  804. rv = is_valid_transition(os, ns);
  805. if (rv < SS_SUCCESS)
  806. return rv;
  807. if (!(flags & CS_HARD)) {
  808. /* pre-state-change checks ; only look at ns */
  809. /* See drbd_state_sw_errors in drbd_strings.c */
  810. rv = is_valid_state(mdev, ns);
  811. if (rv < SS_SUCCESS) {
  812. /* If the old state was illegal as well, then let
  813. this happen...*/
  814. if (is_valid_state(mdev, os) == rv)
  815. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  816. } else
  817. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  818. }
  819. if (rv < SS_SUCCESS) {
  820. if (flags & CS_VERBOSE)
  821. print_st_err(mdev, os, ns, rv);
  822. return rv;
  823. }
  824. print_sanitize_warnings(mdev, ssw);
  825. drbd_pr_state_change(mdev, os, ns, flags);
  826. /* Display changes to the susp* flags that where caused by the call to
  827. sanitize_state(). Only display it here if we where not called from
  828. _conn_request_state() */
  829. if (!(flags & CS_DC_SUSP))
  830. conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
  831. /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
  832. * on the ldev here, to be sure the transition -> D_DISKLESS resp.
  833. * drbd_ldev_destroy() won't happen before our corresponding
  834. * after_state_ch works run, where we put_ldev again. */
  835. if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
  836. (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
  837. atomic_inc(&mdev->local_cnt);
  838. did_remote = drbd_should_do_remote(mdev->state);
  839. mdev->state.i = ns.i;
  840. should_do_remote = drbd_should_do_remote(mdev->state);
  841. mdev->tconn->susp = ns.susp;
  842. mdev->tconn->susp_nod = ns.susp_nod;
  843. mdev->tconn->susp_fen = ns.susp_fen;
  844. /* put replicated vs not-replicated requests in seperate epochs */
  845. if (did_remote != should_do_remote)
  846. start_new_tl_epoch(mdev->tconn);
  847. if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
  848. drbd_print_uuids(mdev, "attached to UUIDs");
  849. /* Wake up role changes, that were delayed because of connection establishing */
  850. if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS &&
  851. no_peer_wf_report_params(mdev->tconn))
  852. clear_bit(STATE_SENT, &mdev->tconn->flags);
  853. wake_up(&mdev->misc_wait);
  854. wake_up(&mdev->state_wait);
  855. wake_up(&mdev->tconn->ping_wait);
  856. /* Aborted verify run, or we reached the stop sector.
  857. * Log the last position, unless end-of-device. */
  858. if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
  859. ns.conn <= C_CONNECTED) {
  860. mdev->ov_start_sector =
  861. BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
  862. if (mdev->ov_left)
  863. dev_info(DEV, "Online Verify reached sector %llu\n",
  864. (unsigned long long)mdev->ov_start_sector);
  865. }
  866. if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
  867. (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
  868. dev_info(DEV, "Syncer continues.\n");
  869. mdev->rs_paused += (long)jiffies
  870. -(long)mdev->rs_mark_time[mdev->rs_last_mark];
  871. if (ns.conn == C_SYNC_TARGET)
  872. mod_timer(&mdev->resync_timer, jiffies);
  873. }
  874. if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
  875. (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
  876. dev_info(DEV, "Resync suspended\n");
  877. mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
  878. }
  879. if (os.conn == C_CONNECTED &&
  880. (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
  881. unsigned long now = jiffies;
  882. int i;
  883. set_ov_position(mdev, ns.conn);
  884. mdev->rs_start = now;
  885. mdev->rs_last_events = 0;
  886. mdev->rs_last_sect_ev = 0;
  887. mdev->ov_last_oos_size = 0;
  888. mdev->ov_last_oos_start = 0;
  889. for (i = 0; i < DRBD_SYNC_MARKS; i++) {
  890. mdev->rs_mark_left[i] = mdev->ov_left;
  891. mdev->rs_mark_time[i] = now;
  892. }
  893. drbd_rs_controller_reset(mdev);
  894. if (ns.conn == C_VERIFY_S) {
  895. dev_info(DEV, "Starting Online Verify from sector %llu\n",
  896. (unsigned long long)mdev->ov_position);
  897. mod_timer(&mdev->resync_timer, jiffies);
  898. }
  899. }
  900. if (get_ldev(mdev)) {
  901. u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
  902. MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
  903. MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
  904. mdf &= ~MDF_AL_CLEAN;
  905. if (test_bit(CRASHED_PRIMARY, &mdev->flags))
  906. mdf |= MDF_CRASHED_PRIMARY;
  907. if (mdev->state.role == R_PRIMARY ||
  908. (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
  909. mdf |= MDF_PRIMARY_IND;
  910. if (mdev->state.conn > C_WF_REPORT_PARAMS)
  911. mdf |= MDF_CONNECTED_IND;
  912. if (mdev->state.disk > D_INCONSISTENT)
  913. mdf |= MDF_CONSISTENT;
  914. if (mdev->state.disk > D_OUTDATED)
  915. mdf |= MDF_WAS_UP_TO_DATE;
  916. if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
  917. mdf |= MDF_PEER_OUT_DATED;
  918. if (mdf != mdev->ldev->md.flags) {
  919. mdev->ldev->md.flags = mdf;
  920. drbd_md_mark_dirty(mdev);
  921. }
  922. if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
  923. drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
  924. put_ldev(mdev);
  925. }
  926. /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
  927. if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
  928. os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
  929. set_bit(CONSIDER_RESYNC, &mdev->flags);
  930. /* Receiver should clean up itself */
  931. if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
  932. drbd_thread_stop_nowait(&mdev->tconn->receiver);
  933. /* Now the receiver finished cleaning up itself, it should die */
  934. if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
  935. drbd_thread_stop_nowait(&mdev->tconn->receiver);
  936. /* Upon network failure, we need to restart the receiver. */
  937. if (os.conn > C_WF_CONNECTION &&
  938. ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
  939. drbd_thread_restart_nowait(&mdev->tconn->receiver);
  940. /* Resume AL writing if we get a connection */
  941. if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED) {
  942. drbd_resume_al(mdev);
  943. mdev->tconn->connect_cnt++;
  944. }
  945. /* remember last attach time so request_timer_fn() won't
  946. * kill newly established sessions while we are still trying to thaw
  947. * previously frozen IO */
  948. if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
  949. ns.disk > D_NEGOTIATING)
  950. mdev->last_reattach_jif = jiffies;
  951. ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
  952. if (ascw) {
  953. ascw->os = os;
  954. ascw->ns = ns;
  955. ascw->flags = flags;
  956. ascw->w.cb = w_after_state_ch;
  957. ascw->w.mdev = mdev;
  958. ascw->done = done;
  959. drbd_queue_work(&mdev->tconn->sender_work, &ascw->w);
  960. } else {
  961. dev_err(DEV, "Could not kmalloc an ascw\n");
  962. }
  963. return rv;
  964. }
  965. static int w_after_state_ch(struct drbd_work *w, int unused)
  966. {
  967. struct after_state_chg_work *ascw =
  968. container_of(w, struct after_state_chg_work, w);
  969. struct drbd_conf *mdev = w->mdev;
  970. after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
  971. if (ascw->flags & CS_WAIT_COMPLETE) {
  972. D_ASSERT(ascw->done != NULL);
  973. complete(ascw->done);
  974. }
  975. kfree(ascw);
  976. return 0;
  977. }
  978. static void abw_start_sync(struct drbd_conf *mdev, int rv)
  979. {
  980. if (rv) {
  981. dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
  982. _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
  983. return;
  984. }
  985. switch (mdev->state.conn) {
  986. case C_STARTING_SYNC_T:
  987. _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
  988. break;
  989. case C_STARTING_SYNC_S:
  990. drbd_start_resync(mdev, C_SYNC_SOURCE);
  991. break;
  992. }
  993. }
  994. int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
  995. int (*io_fn)(struct drbd_conf *),
  996. char *why, enum bm_flag flags)
  997. {
  998. int rv;
  999. D_ASSERT(current == mdev->tconn->worker.task);
  1000. /* open coded non-blocking drbd_suspend_io(mdev); */
  1001. set_bit(SUSPEND_IO, &mdev->flags);
  1002. drbd_bm_lock(mdev, why, flags);
  1003. rv = io_fn(mdev);
  1004. drbd_bm_unlock(mdev);
  1005. drbd_resume_io(mdev);
  1006. return rv;
  1007. }
  1008. /**
  1009. * after_state_ch() - Perform after state change actions that may sleep
  1010. * @mdev: DRBD device.
  1011. * @os: old state.
  1012. * @ns: new state.
  1013. * @flags: Flags
  1014. */
  1015. static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
  1016. union drbd_state ns, enum chg_state_flags flags)
  1017. {
  1018. struct sib_info sib;
  1019. sib.sib_reason = SIB_STATE_CHANGE;
  1020. sib.os = os;
  1021. sib.ns = ns;
  1022. if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
  1023. clear_bit(CRASHED_PRIMARY, &mdev->flags);
  1024. if (mdev->p_uuid)
  1025. mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
  1026. }
  1027. /* Inform userspace about the change... */
  1028. drbd_bcast_event(mdev, &sib);
  1029. if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
  1030. (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
  1031. drbd_khelper(mdev, "pri-on-incon-degr");
  1032. /* Here we have the actions that are performed after a
  1033. state change. This function might sleep */
  1034. if (ns.susp_nod) {
  1035. struct drbd_tconn *tconn = mdev->tconn;
  1036. enum drbd_req_event what = NOTHING;
  1037. spin_lock_irq(&tconn->req_lock);
  1038. if (os.conn < C_CONNECTED && conn_lowest_conn(tconn) >= C_CONNECTED)
  1039. what = RESEND;
  1040. if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
  1041. conn_lowest_disk(tconn) > D_NEGOTIATING)
  1042. what = RESTART_FROZEN_DISK_IO;
  1043. if (tconn->susp_nod && what != NOTHING) {
  1044. _tl_restart(tconn, what);
  1045. _conn_request_state(tconn,
  1046. (union drbd_state) { { .susp_nod = 1 } },
  1047. (union drbd_state) { { .susp_nod = 0 } },
  1048. CS_VERBOSE);
  1049. }
  1050. spin_unlock_irq(&tconn->req_lock);
  1051. }
  1052. if (ns.susp_fen) {
  1053. struct drbd_tconn *tconn = mdev->tconn;
  1054. spin_lock_irq(&tconn->req_lock);
  1055. if (tconn->susp_fen && conn_lowest_conn(tconn) >= C_CONNECTED) {
  1056. /* case2: The connection was established again: */
  1057. struct drbd_conf *odev;
  1058. int vnr;
  1059. rcu_read_lock();
  1060. idr_for_each_entry(&tconn->volumes, odev, vnr)
  1061. clear_bit(NEW_CUR_UUID, &odev->flags);
  1062. rcu_read_unlock();
  1063. _tl_restart(tconn, RESEND);
  1064. _conn_request_state(tconn,
  1065. (union drbd_state) { { .susp_fen = 1 } },
  1066. (union drbd_state) { { .susp_fen = 0 } },
  1067. CS_VERBOSE);
  1068. }
  1069. spin_unlock_irq(&tconn->req_lock);
  1070. }
  1071. /* Became sync source. With protocol >= 96, we still need to send out
  1072. * the sync uuid now. Need to do that before any drbd_send_state, or
  1073. * the other side may go "paused sync" before receiving the sync uuids,
  1074. * which is unexpected. */
  1075. if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
  1076. (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
  1077. mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
  1078. drbd_gen_and_send_sync_uuid(mdev);
  1079. put_ldev(mdev);
  1080. }
  1081. /* Do not change the order of the if above and the two below... */
  1082. if (os.pdsk == D_DISKLESS &&
  1083. ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */
  1084. /* we probably will start a resync soon.
  1085. * make sure those things are properly reset. */
  1086. mdev->rs_total = 0;
  1087. mdev->rs_failed = 0;
  1088. atomic_set(&mdev->rs_pending_cnt, 0);
  1089. drbd_rs_cancel_all(mdev);
  1090. drbd_send_uuids(mdev);
  1091. drbd_send_state(mdev, ns);
  1092. }
  1093. /* No point in queuing send_bitmap if we don't have a connection
  1094. * anymore, so check also the _current_ state, not only the new state
  1095. * at the time this work was queued. */
  1096. if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
  1097. mdev->state.conn == C_WF_BITMAP_S)
  1098. drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
  1099. "send_bitmap (WFBitMapS)",
  1100. BM_LOCKED_TEST_ALLOWED);
  1101. /* Lost contact to peer's copy of the data */
  1102. if ((os.pdsk >= D_INCONSISTENT &&
  1103. os.pdsk != D_UNKNOWN &&
  1104. os.pdsk != D_OUTDATED)
  1105. && (ns.pdsk < D_INCONSISTENT ||
  1106. ns.pdsk == D_UNKNOWN ||
  1107. ns.pdsk == D_OUTDATED)) {
  1108. if (get_ldev(mdev)) {
  1109. if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
  1110. mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
  1111. if (drbd_suspended(mdev)) {
  1112. set_bit(NEW_CUR_UUID, &mdev->flags);
  1113. } else {
  1114. drbd_uuid_new_current(mdev);
  1115. drbd_send_uuids(mdev);
  1116. }
  1117. }
  1118. put_ldev(mdev);
  1119. }
  1120. }
  1121. if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
  1122. if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY &&
  1123. mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
  1124. drbd_uuid_new_current(mdev);
  1125. drbd_send_uuids(mdev);
  1126. }
  1127. /* D_DISKLESS Peer becomes secondary */
  1128. if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
  1129. /* We may still be Primary ourselves.
  1130. * No harm done if the bitmap still changes,
  1131. * redirtied pages will follow later. */
  1132. drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
  1133. "demote diskless peer", BM_LOCKED_SET_ALLOWED);
  1134. put_ldev(mdev);
  1135. }
  1136. /* Write out all changed bits on demote.
  1137. * Though, no need to da that just yet
  1138. * if there is a resync going on still */
  1139. if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
  1140. mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
  1141. /* No changes to the bitmap expected this time, so assert that,
  1142. * even though no harm was done if it did change. */
  1143. drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
  1144. "demote", BM_LOCKED_TEST_ALLOWED);
  1145. put_ldev(mdev);
  1146. }
  1147. /* Last part of the attaching process ... */
  1148. if (ns.conn >= C_CONNECTED &&
  1149. os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
  1150. drbd_send_sizes(mdev, 0, 0); /* to start sync... */
  1151. drbd_send_uuids(mdev);
  1152. drbd_send_state(mdev, ns);
  1153. }
  1154. /* We want to pause/continue resync, tell peer. */
  1155. if (ns.conn >= C_CONNECTED &&
  1156. ((os.aftr_isp != ns.aftr_isp) ||
  1157. (os.user_isp != ns.user_isp)))
  1158. drbd_send_state(mdev, ns);
  1159. /* In case one of the isp bits got set, suspend other devices. */
  1160. if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
  1161. (ns.aftr_isp || ns.peer_isp || ns.user_isp))
  1162. suspend_other_sg(mdev);
  1163. /* Make sure the peer gets informed about eventual state
  1164. changes (ISP bits) while we were in WFReportParams. */
  1165. if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
  1166. drbd_send_state(mdev, ns);
  1167. if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
  1168. drbd_send_state(mdev, ns);
  1169. /* We are in the progress to start a full sync... */
  1170. if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
  1171. (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
  1172. /* no other bitmap changes expected during this phase */
  1173. drbd_queue_bitmap_io(mdev,
  1174. &drbd_bmio_set_n_write, &abw_start_sync,
  1175. "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
  1176. /* first half of local IO error, failure to attach,
  1177. * or administrative detach */
  1178. if (os.disk != D_FAILED && ns.disk == D_FAILED) {
  1179. enum drbd_io_error_p eh = EP_PASS_ON;
  1180. int was_io_error = 0;
  1181. /* corresponding get_ldev was in __drbd_set_state, to serialize
  1182. * our cleanup here with the transition to D_DISKLESS.
  1183. * But is is still not save to dreference ldev here, since
  1184. * we might come from an failed Attach before ldev was set. */
  1185. if (mdev->ldev) {
  1186. rcu_read_lock();
  1187. eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
  1188. rcu_read_unlock();
  1189. was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
  1190. if (was_io_error && eh == EP_CALL_HELPER)
  1191. drbd_khelper(mdev, "local-io-error");
  1192. /* Immediately allow completion of all application IO,
  1193. * that waits for completion from the local disk,
  1194. * if this was a force-detach due to disk_timeout
  1195. * or administrator request (drbdsetup detach --force).
  1196. * Do NOT abort otherwise.
  1197. * Aborting local requests may cause serious problems,
  1198. * if requests are completed to upper layers already,
  1199. * and then later the already submitted local bio completes.
  1200. * This can cause DMA into former bio pages that meanwhile
  1201. * have been re-used for other things.
  1202. * So aborting local requests may cause crashes,
  1203. * or even worse, silent data corruption.
  1204. */
  1205. if (test_and_clear_bit(FORCE_DETACH, &mdev->flags))
  1206. tl_abort_disk_io(mdev);
  1207. /* current state still has to be D_FAILED,
  1208. * there is only one way out: to D_DISKLESS,
  1209. * and that may only happen after our put_ldev below. */
  1210. if (mdev->state.disk != D_FAILED)
  1211. dev_err(DEV,
  1212. "ASSERT FAILED: disk is %s during detach\n",
  1213. drbd_disk_str(mdev->state.disk));
  1214. if (ns.conn >= C_CONNECTED)
  1215. drbd_send_state(mdev, ns);
  1216. drbd_rs_cancel_all(mdev);
  1217. /* In case we want to get something to stable storage still,
  1218. * this may be the last chance.
  1219. * Following put_ldev may transition to D_DISKLESS. */
  1220. drbd_md_sync(mdev);
  1221. }
  1222. put_ldev(mdev);
  1223. }
  1224. /* second half of local IO error, failure to attach,
  1225. * or administrative detach,
  1226. * after local_cnt references have reached zero again */
  1227. if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
  1228. /* We must still be diskless,
  1229. * re-attach has to be serialized with this! */
  1230. if (mdev->state.disk != D_DISKLESS)
  1231. dev_err(DEV,
  1232. "ASSERT FAILED: disk is %s while going diskless\n",
  1233. drbd_disk_str(mdev->state.disk));
  1234. if (ns.conn >= C_CONNECTED)
  1235. drbd_send_state(mdev, ns);
  1236. /* corresponding get_ldev in __drbd_set_state
  1237. * this may finally trigger drbd_ldev_destroy. */
  1238. put_ldev(mdev);
  1239. }
  1240. /* Notify peer that I had a local IO error, and did not detached.. */
  1241. if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED)
  1242. drbd_send_state(mdev, ns);
  1243. /* Disks got bigger while they were detached */
  1244. if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
  1245. test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
  1246. if (ns.conn == C_CONNECTED)
  1247. resync_after_online_grow(mdev);
  1248. }
  1249. /* A resync finished or aborted, wake paused devices... */
  1250. if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
  1251. (os.peer_isp && !ns.peer_isp) ||
  1252. (os.user_isp && !ns.user_isp))
  1253. resume_next_sg(mdev);
  1254. /* sync target done with resync. Explicitly notify peer, even though
  1255. * it should (at least for non-empty resyncs) already know itself. */
  1256. if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
  1257. drbd_send_state(mdev, ns);
  1258. /* Verify finished, or reached stop sector. Peer did not know about
  1259. * the stop sector, and we may even have changed the stop sector during
  1260. * verify to interrupt/stop early. Send the new state. */
  1261. if (os.conn == C_VERIFY_S && ns.conn == C_CONNECTED
  1262. && verify_can_do_stop_sector(mdev))
  1263. drbd_send_state(mdev, ns);
  1264. /* This triggers bitmap writeout of potentially still unwritten pages
  1265. * if the resync finished cleanly, or aborted because of peer disk
  1266. * failure, or because of connection loss.
  1267. * For resync aborted because of local disk failure, we cannot do
  1268. * any bitmap writeout anymore.
  1269. * No harm done if some bits change during this phase.
  1270. */
  1271. if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
  1272. drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL,
  1273. "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED);
  1274. put_ldev(mdev);
  1275. }
  1276. if (ns.disk == D_DISKLESS &&
  1277. ns.conn == C_STANDALONE &&
  1278. ns.role == R_SECONDARY) {
  1279. if (os.aftr_isp != ns.aftr_isp)
  1280. resume_next_sg(mdev);
  1281. }
  1282. drbd_md_sync(mdev);
  1283. }
  1284. struct after_conn_state_chg_work {
  1285. struct drbd_work w;
  1286. enum drbd_conns oc;
  1287. union drbd_state ns_min;
  1288. union drbd_state ns_max; /* new, max state, over all mdevs */
  1289. enum chg_state_flags flags;
  1290. };
  1291. static int w_after_conn_state_ch(struct drbd_work *w, int unused)
  1292. {
  1293. struct after_conn_state_chg_work *acscw =
  1294. container_of(w, struct after_conn_state_chg_work, w);
  1295. struct drbd_tconn *tconn = w->tconn;
  1296. enum drbd_conns oc = acscw->oc;
  1297. union drbd_state ns_max = acscw->ns_max;
  1298. struct drbd_conf *mdev;
  1299. int vnr;
  1300. kfree(acscw);
  1301. /* Upon network configuration, we need to start the receiver */
  1302. if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
  1303. drbd_thread_start(&tconn->receiver);
  1304. if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
  1305. struct net_conf *old_conf;
  1306. mutex_lock(&tconn->conf_update);
  1307. old_conf = tconn->net_conf;
  1308. tconn->my_addr_len = 0;
  1309. tconn->peer_addr_len = 0;
  1310. rcu_assign_pointer(tconn->net_conf, NULL);
  1311. conn_free_crypto(tconn);
  1312. mutex_unlock(&tconn->conf_update);
  1313. synchronize_rcu();
  1314. kfree(old_conf);
  1315. }
  1316. if (ns_max.susp_fen) {
  1317. /* case1: The outdate peer handler is successful: */
  1318. if (ns_max.pdsk <= D_OUTDATED) {
  1319. rcu_read_lock();
  1320. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1321. if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
  1322. drbd_uuid_new_current(mdev);
  1323. clear_bit(NEW_CUR_UUID, &mdev->flags);
  1324. }
  1325. }
  1326. rcu_read_unlock();
  1327. spin_lock_irq(&tconn->req_lock);
  1328. _tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING);
  1329. _conn_request_state(tconn,
  1330. (union drbd_state) { { .susp_fen = 1 } },
  1331. (union drbd_state) { { .susp_fen = 0 } },
  1332. CS_VERBOSE);
  1333. spin_unlock_irq(&tconn->req_lock);
  1334. }
  1335. }
  1336. kref_put(&tconn->kref, &conn_destroy);
  1337. conn_md_sync(tconn);
  1338. return 0;
  1339. }
  1340. void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
  1341. {
  1342. enum chg_state_flags flags = ~0;
  1343. struct drbd_conf *mdev;
  1344. int vnr, first_vol = 1;
  1345. union drbd_dev_state os, cs = {
  1346. { .role = R_SECONDARY,
  1347. .peer = R_UNKNOWN,
  1348. .conn = tconn->cstate,
  1349. .disk = D_DISKLESS,
  1350. .pdsk = D_UNKNOWN,
  1351. } };
  1352. rcu_read_lock();
  1353. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1354. os = mdev->state;
  1355. if (first_vol) {
  1356. cs = os;
  1357. first_vol = 0;
  1358. continue;
  1359. }
  1360. if (cs.role != os.role)
  1361. flags &= ~CS_DC_ROLE;
  1362. if (cs.peer != os.peer)
  1363. flags &= ~CS_DC_PEER;
  1364. if (cs.conn != os.conn)
  1365. flags &= ~CS_DC_CONN;
  1366. if (cs.disk != os.disk)
  1367. flags &= ~CS_DC_DISK;
  1368. if (cs.pdsk != os.pdsk)
  1369. flags &= ~CS_DC_PDSK;
  1370. }
  1371. rcu_read_unlock();
  1372. *pf |= CS_DC_MASK;
  1373. *pf &= flags;
  1374. (*pcs).i = cs.i;
  1375. }
  1376. static enum drbd_state_rv
  1377. conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1378. enum chg_state_flags flags)
  1379. {
  1380. enum drbd_state_rv rv = SS_SUCCESS;
  1381. union drbd_state ns, os;
  1382. struct drbd_conf *mdev;
  1383. int vnr;
  1384. rcu_read_lock();
  1385. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1386. os = drbd_read_state(mdev);
  1387. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  1388. if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
  1389. ns.disk = os.disk;
  1390. if (ns.i == os.i)
  1391. continue;
  1392. rv = is_valid_transition(os, ns);
  1393. if (rv < SS_SUCCESS)
  1394. break;
  1395. if (!(flags & CS_HARD)) {
  1396. rv = is_valid_state(mdev, ns);
  1397. if (rv < SS_SUCCESS) {
  1398. if (is_valid_state(mdev, os) == rv)
  1399. rv = is_valid_soft_transition(os, ns, tconn);
  1400. } else
  1401. rv = is_valid_soft_transition(os, ns, tconn);
  1402. }
  1403. if (rv < SS_SUCCESS)
  1404. break;
  1405. }
  1406. rcu_read_unlock();
  1407. if (rv < SS_SUCCESS && flags & CS_VERBOSE)
  1408. print_st_err(mdev, os, ns, rv);
  1409. return rv;
  1410. }
  1411. void
  1412. conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1413. union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
  1414. {
  1415. union drbd_state ns, os, ns_max = { };
  1416. union drbd_state ns_min = {
  1417. { .role = R_MASK,
  1418. .peer = R_MASK,
  1419. .conn = val.conn,
  1420. .disk = D_MASK,
  1421. .pdsk = D_MASK
  1422. } };
  1423. struct drbd_conf *mdev;
  1424. enum drbd_state_rv rv;
  1425. int vnr, number_of_volumes = 0;
  1426. if (mask.conn == C_MASK) {
  1427. /* remember last connect time so request_timer_fn() won't
  1428. * kill newly established sessions while we are still trying to thaw
  1429. * previously frozen IO */
  1430. if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS)
  1431. tconn->last_reconnect_jif = jiffies;
  1432. tconn->cstate = val.conn;
  1433. }
  1434. rcu_read_lock();
  1435. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1436. number_of_volumes++;
  1437. os = drbd_read_state(mdev);
  1438. ns = apply_mask_val(os, mask, val);
  1439. ns = sanitize_state(mdev, ns, NULL);
  1440. if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
  1441. ns.disk = os.disk;
  1442. rv = __drbd_set_state(mdev, ns, flags, NULL);
  1443. if (rv < SS_SUCCESS)
  1444. BUG();
  1445. ns.i = mdev->state.i;
  1446. ns_max.role = max_role(ns.role, ns_max.role);
  1447. ns_max.peer = max_role(ns.peer, ns_max.peer);
  1448. ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
  1449. ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
  1450. ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
  1451. ns_min.role = min_role(ns.role, ns_min.role);
  1452. ns_min.peer = min_role(ns.peer, ns_min.peer);
  1453. ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
  1454. ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
  1455. ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
  1456. }
  1457. rcu_read_unlock();
  1458. if (number_of_volumes == 0) {
  1459. ns_min = ns_max = (union drbd_state) { {
  1460. .role = R_SECONDARY,
  1461. .peer = R_UNKNOWN,
  1462. .conn = val.conn,
  1463. .disk = D_DISKLESS,
  1464. .pdsk = D_UNKNOWN
  1465. } };
  1466. }
  1467. ns_min.susp = ns_max.susp = tconn->susp;
  1468. ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
  1469. ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
  1470. *pns_min = ns_min;
  1471. *pns_max = ns_max;
  1472. }
  1473. static enum drbd_state_rv
  1474. _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
  1475. {
  1476. enum drbd_state_rv rv;
  1477. if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
  1478. return SS_CW_SUCCESS;
  1479. if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
  1480. return SS_CW_FAILED_BY_PEER;
  1481. rv = conn_is_valid_transition(tconn, mask, val, 0);
  1482. if (rv == SS_SUCCESS && tconn->cstate == C_WF_REPORT_PARAMS)
  1483. rv = SS_UNKNOWN_ERROR; /* continue waiting */
  1484. return rv;
  1485. }
  1486. enum drbd_state_rv
  1487. _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1488. enum chg_state_flags flags)
  1489. {
  1490. enum drbd_state_rv rv = SS_SUCCESS;
  1491. struct after_conn_state_chg_work *acscw;
  1492. enum drbd_conns oc = tconn->cstate;
  1493. union drbd_state ns_max, ns_min, os;
  1494. bool have_mutex = false;
  1495. if (mask.conn) {
  1496. rv = is_valid_conn_transition(oc, val.conn);
  1497. if (rv < SS_SUCCESS)
  1498. goto abort;
  1499. }
  1500. rv = conn_is_valid_transition(tconn, mask, val, flags);
  1501. if (rv < SS_SUCCESS)
  1502. goto abort;
  1503. if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
  1504. !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
  1505. /* This will be a cluster-wide state change.
  1506. * Need to give up the spinlock, grab the mutex,
  1507. * then send the state change request, ... */
  1508. spin_unlock_irq(&tconn->req_lock);
  1509. mutex_lock(&tconn->cstate_mutex);
  1510. have_mutex = true;
  1511. set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
  1512. if (conn_send_state_req(tconn, mask, val)) {
  1513. /* sending failed. */
  1514. clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
  1515. rv = SS_CW_FAILED_BY_PEER;
  1516. /* need to re-aquire the spin lock, though */
  1517. goto abort_unlocked;
  1518. }
  1519. if (val.conn == C_DISCONNECTING)
  1520. set_bit(DISCONNECT_SENT, &tconn->flags);
  1521. /* ... and re-aquire the spinlock.
  1522. * If _conn_rq_cond() returned >= SS_SUCCESS, we must call
  1523. * conn_set_state() within the same spinlock. */
  1524. spin_lock_irq(&tconn->req_lock);
  1525. wait_event_lock_irq(tconn->ping_wait,
  1526. (rv = _conn_rq_cond(tconn, mask, val)),
  1527. tconn->req_lock);
  1528. clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
  1529. if (rv < SS_SUCCESS)
  1530. goto abort;
  1531. }
  1532. conn_old_common_state(tconn, &os, &flags);
  1533. flags |= CS_DC_SUSP;
  1534. conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
  1535. conn_pr_state_change(tconn, os, ns_max, flags);
  1536. acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
  1537. if (acscw) {
  1538. acscw->oc = os.conn;
  1539. acscw->ns_min = ns_min;
  1540. acscw->ns_max = ns_max;
  1541. acscw->flags = flags;
  1542. acscw->w.cb = w_after_conn_state_ch;
  1543. kref_get(&tconn->kref);
  1544. acscw->w.tconn = tconn;
  1545. drbd_queue_work(&tconn->sender_work, &acscw->w);
  1546. } else {
  1547. conn_err(tconn, "Could not kmalloc an acscw\n");
  1548. }
  1549. abort:
  1550. if (have_mutex) {
  1551. /* mutex_unlock() "... must not be used in interrupt context.",
  1552. * so give up the spinlock, then re-aquire it */
  1553. spin_unlock_irq(&tconn->req_lock);
  1554. abort_unlocked:
  1555. mutex_unlock(&tconn->cstate_mutex);
  1556. spin_lock_irq(&tconn->req_lock);
  1557. }
  1558. if (rv < SS_SUCCESS && flags & CS_VERBOSE) {
  1559. conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv));
  1560. conn_err(tconn, " mask = 0x%x val = 0x%x\n", mask.i, val.i);
  1561. conn_err(tconn, " old_conn:%s wanted_conn:%s\n", drbd_conn_str(oc), drbd_conn_str(val.conn));
  1562. }
  1563. return rv;
  1564. }
  1565. enum drbd_state_rv
  1566. conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1567. enum chg_state_flags flags)
  1568. {
  1569. enum drbd_state_rv rv;
  1570. spin_lock_irq(&tconn->req_lock);
  1571. rv = _conn_request_state(tconn, mask, val, flags);
  1572. spin_unlock_irq(&tconn->req_lock);
  1573. return rv;
  1574. }