drbd_state.c 49 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728
  1. /*
  2. drbd_state.c
  3. This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
  4. Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
  5. Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
  6. Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
  7. Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
  8. from Logicworks, Inc. for making SDP replication support possible.
  9. drbd is free software; you can redistribute it and/or modify
  10. it under the terms of the GNU General Public License as published by
  11. the Free Software Foundation; either version 2, or (at your option)
  12. any later version.
  13. drbd is distributed in the hope that it will be useful,
  14. but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. GNU General Public License for more details.
  17. You should have received a copy of the GNU General Public License
  18. along with drbd; see the file COPYING. If not, write to
  19. the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
  20. */
  21. #include <linux/drbd_limits.h>
  22. #include "drbd_int.h"
  23. #include "drbd_req.h"
  24. struct after_state_chg_work {
  25. struct drbd_work w;
  26. union drbd_state os;
  27. union drbd_state ns;
  28. enum chg_state_flags flags;
  29. struct completion *done;
  30. };
  31. enum sanitize_state_warnings {
  32. NO_WARNING,
  33. ABORTED_ONLINE_VERIFY,
  34. ABORTED_RESYNC,
  35. CONNECTION_LOST_NEGOTIATING,
  36. IMPLICITLY_UPGRADED_DISK,
  37. IMPLICITLY_UPGRADED_PDSK,
  38. };
  39. static int w_after_state_ch(struct drbd_work *w, int unused);
  40. static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
  41. union drbd_state ns, enum chg_state_flags flags);
  42. static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
  43. static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state);
  44. static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
  45. static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
  46. enum sanitize_state_warnings *warn);
  47. static inline bool is_susp(union drbd_state s)
  48. {
  49. return s.susp || s.susp_nod || s.susp_fen;
  50. }
  51. bool conn_all_vols_unconf(struct drbd_tconn *tconn)
  52. {
  53. struct drbd_conf *mdev;
  54. bool rv = true;
  55. int vnr;
  56. rcu_read_lock();
  57. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  58. if (mdev->state.disk != D_DISKLESS ||
  59. mdev->state.conn != C_STANDALONE ||
  60. mdev->state.role != R_SECONDARY) {
  61. rv = false;
  62. break;
  63. }
  64. }
  65. rcu_read_unlock();
  66. return rv;
  67. }
  68. /* Unfortunately the states where not correctly ordered, when
  69. they where defined. therefore can not use max_t() here. */
  70. static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
  71. {
  72. if (role1 == R_PRIMARY || role2 == R_PRIMARY)
  73. return R_PRIMARY;
  74. if (role1 == R_SECONDARY || role2 == R_SECONDARY)
  75. return R_SECONDARY;
  76. return R_UNKNOWN;
  77. }
  78. static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
  79. {
  80. if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
  81. return R_UNKNOWN;
  82. if (role1 == R_SECONDARY || role2 == R_SECONDARY)
  83. return R_SECONDARY;
  84. return R_PRIMARY;
  85. }
  86. enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
  87. {
  88. enum drbd_role role = R_UNKNOWN;
  89. struct drbd_conf *mdev;
  90. int vnr;
  91. rcu_read_lock();
  92. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  93. role = max_role(role, mdev->state.role);
  94. rcu_read_unlock();
  95. return role;
  96. }
  97. enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
  98. {
  99. enum drbd_role peer = R_UNKNOWN;
  100. struct drbd_conf *mdev;
  101. int vnr;
  102. rcu_read_lock();
  103. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  104. peer = max_role(peer, mdev->state.peer);
  105. rcu_read_unlock();
  106. return peer;
  107. }
  108. enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
  109. {
  110. enum drbd_disk_state ds = D_DISKLESS;
  111. struct drbd_conf *mdev;
  112. int vnr;
  113. rcu_read_lock();
  114. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  115. ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
  116. rcu_read_unlock();
  117. return ds;
  118. }
  119. enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
  120. {
  121. enum drbd_disk_state ds = D_MASK;
  122. struct drbd_conf *mdev;
  123. int vnr;
  124. rcu_read_lock();
  125. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  126. ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
  127. rcu_read_unlock();
  128. return ds;
  129. }
  130. enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
  131. {
  132. enum drbd_disk_state ds = D_DISKLESS;
  133. struct drbd_conf *mdev;
  134. int vnr;
  135. rcu_read_lock();
  136. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  137. ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
  138. rcu_read_unlock();
  139. return ds;
  140. }
  141. enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
  142. {
  143. enum drbd_conns conn = C_MASK;
  144. struct drbd_conf *mdev;
  145. int vnr;
  146. rcu_read_lock();
  147. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  148. conn = min_t(enum drbd_conns, conn, mdev->state.conn);
  149. rcu_read_unlock();
  150. return conn;
  151. }
  152. /**
  153. * cl_wide_st_chg() - true if the state change is a cluster wide one
  154. * @mdev: DRBD device.
  155. * @os: old (current) state.
  156. * @ns: new (wanted) state.
  157. */
  158. static int cl_wide_st_chg(struct drbd_conf *mdev,
  159. union drbd_state os, union drbd_state ns)
  160. {
  161. return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
  162. ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
  163. (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
  164. (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
  165. (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))) ||
  166. (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
  167. (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S);
  168. }
  169. static union drbd_state
  170. apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
  171. {
  172. union drbd_state ns;
  173. ns.i = (os.i & ~mask.i) | val.i;
  174. return ns;
  175. }
  176. enum drbd_state_rv
  177. drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
  178. union drbd_state mask, union drbd_state val)
  179. {
  180. unsigned long flags;
  181. union drbd_state ns;
  182. enum drbd_state_rv rv;
  183. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  184. ns = apply_mask_val(drbd_read_state(mdev), mask, val);
  185. rv = _drbd_set_state(mdev, ns, f, NULL);
  186. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  187. return rv;
  188. }
  189. /**
  190. * drbd_force_state() - Impose a change which happens outside our control on our state
  191. * @mdev: DRBD device.
  192. * @mask: mask of state bits to change.
  193. * @val: value of new state bits.
  194. */
  195. void drbd_force_state(struct drbd_conf *mdev,
  196. union drbd_state mask, union drbd_state val)
  197. {
  198. drbd_change_state(mdev, CS_HARD, mask, val);
  199. }
  200. static enum drbd_state_rv
  201. _req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
  202. union drbd_state val)
  203. {
  204. union drbd_state os, ns;
  205. unsigned long flags;
  206. enum drbd_state_rv rv;
  207. if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
  208. return SS_CW_SUCCESS;
  209. if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
  210. return SS_CW_FAILED_BY_PEER;
  211. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  212. os = drbd_read_state(mdev);
  213. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  214. rv = is_valid_transition(os, ns);
  215. if (rv == SS_SUCCESS)
  216. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  217. if (!cl_wide_st_chg(mdev, os, ns))
  218. rv = SS_CW_NO_NEED;
  219. if (rv == SS_UNKNOWN_ERROR) {
  220. rv = is_valid_state(mdev, ns);
  221. if (rv == SS_SUCCESS) {
  222. rv = is_valid_soft_transition(os, ns);
  223. if (rv == SS_SUCCESS)
  224. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  225. }
  226. }
  227. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  228. return rv;
  229. }
  230. /**
  231. * drbd_req_state() - Perform an eventually cluster wide state change
  232. * @mdev: DRBD device.
  233. * @mask: mask of state bits to change.
  234. * @val: value of new state bits.
  235. * @f: flags
  236. *
  237. * Should not be called directly, use drbd_request_state() or
  238. * _drbd_request_state().
  239. */
  240. static enum drbd_state_rv
  241. drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
  242. union drbd_state val, enum chg_state_flags f)
  243. {
  244. struct completion done;
  245. unsigned long flags;
  246. union drbd_state os, ns;
  247. enum drbd_state_rv rv;
  248. init_completion(&done);
  249. if (f & CS_SERIALIZE)
  250. mutex_lock(mdev->state_mutex);
  251. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  252. os = drbd_read_state(mdev);
  253. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  254. rv = is_valid_transition(os, ns);
  255. if (rv < SS_SUCCESS) {
  256. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  257. goto abort;
  258. }
  259. if (cl_wide_st_chg(mdev, os, ns)) {
  260. rv = is_valid_state(mdev, ns);
  261. if (rv == SS_SUCCESS)
  262. rv = is_valid_soft_transition(os, ns);
  263. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  264. if (rv < SS_SUCCESS) {
  265. if (f & CS_VERBOSE)
  266. print_st_err(mdev, os, ns, rv);
  267. goto abort;
  268. }
  269. if (drbd_send_state_req(mdev, mask, val)) {
  270. rv = SS_CW_FAILED_BY_PEER;
  271. if (f & CS_VERBOSE)
  272. print_st_err(mdev, os, ns, rv);
  273. goto abort;
  274. }
  275. wait_event(mdev->state_wait,
  276. (rv = _req_st_cond(mdev, mask, val)));
  277. if (rv < SS_SUCCESS) {
  278. if (f & CS_VERBOSE)
  279. print_st_err(mdev, os, ns, rv);
  280. goto abort;
  281. }
  282. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  283. ns = apply_mask_val(drbd_read_state(mdev), mask, val);
  284. rv = _drbd_set_state(mdev, ns, f, &done);
  285. } else {
  286. rv = _drbd_set_state(mdev, ns, f, &done);
  287. }
  288. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  289. if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
  290. D_ASSERT(current != mdev->tconn->worker.task);
  291. wait_for_completion(&done);
  292. }
  293. abort:
  294. if (f & CS_SERIALIZE)
  295. mutex_unlock(mdev->state_mutex);
  296. return rv;
  297. }
  298. /**
  299. * _drbd_request_state() - Request a state change (with flags)
  300. * @mdev: DRBD device.
  301. * @mask: mask of state bits to change.
  302. * @val: value of new state bits.
  303. * @f: flags
  304. *
  305. * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
  306. * flag, or when logging of failed state change requests is not desired.
  307. */
  308. enum drbd_state_rv
  309. _drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
  310. union drbd_state val, enum chg_state_flags f)
  311. {
  312. enum drbd_state_rv rv;
  313. wait_event(mdev->state_wait,
  314. (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
  315. return rv;
  316. }
  317. static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
  318. {
  319. dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
  320. name,
  321. drbd_conn_str(ns.conn),
  322. drbd_role_str(ns.role),
  323. drbd_role_str(ns.peer),
  324. drbd_disk_str(ns.disk),
  325. drbd_disk_str(ns.pdsk),
  326. is_susp(ns) ? 's' : 'r',
  327. ns.aftr_isp ? 'a' : '-',
  328. ns.peer_isp ? 'p' : '-',
  329. ns.user_isp ? 'u' : '-',
  330. ns.susp_fen ? 'F' : '-',
  331. ns.susp_nod ? 'N' : '-'
  332. );
  333. }
  334. void print_st_err(struct drbd_conf *mdev, union drbd_state os,
  335. union drbd_state ns, enum drbd_state_rv err)
  336. {
  337. if (err == SS_IN_TRANSIENT_STATE)
  338. return;
  339. dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
  340. print_st(mdev, " state", os);
  341. print_st(mdev, "wanted", ns);
  342. }
  343. static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
  344. enum chg_state_flags flags)
  345. {
  346. char *pbp;
  347. pbp = pb;
  348. *pbp = 0;
  349. if (ns.role != os.role && flags & CS_DC_ROLE)
  350. pbp += sprintf(pbp, "role( %s -> %s ) ",
  351. drbd_role_str(os.role),
  352. drbd_role_str(ns.role));
  353. if (ns.peer != os.peer && flags & CS_DC_PEER)
  354. pbp += sprintf(pbp, "peer( %s -> %s ) ",
  355. drbd_role_str(os.peer),
  356. drbd_role_str(ns.peer));
  357. if (ns.conn != os.conn && flags & CS_DC_CONN)
  358. pbp += sprintf(pbp, "conn( %s -> %s ) ",
  359. drbd_conn_str(os.conn),
  360. drbd_conn_str(ns.conn));
  361. if (ns.disk != os.disk && flags & CS_DC_DISK)
  362. pbp += sprintf(pbp, "disk( %s -> %s ) ",
  363. drbd_disk_str(os.disk),
  364. drbd_disk_str(ns.disk));
  365. if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
  366. pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
  367. drbd_disk_str(os.pdsk),
  368. drbd_disk_str(ns.pdsk));
  369. return pbp - pb;
  370. }
  371. static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
  372. enum chg_state_flags flags)
  373. {
  374. char pb[300];
  375. char *pbp = pb;
  376. pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
  377. if (ns.aftr_isp != os.aftr_isp)
  378. pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
  379. os.aftr_isp,
  380. ns.aftr_isp);
  381. if (ns.peer_isp != os.peer_isp)
  382. pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
  383. os.peer_isp,
  384. ns.peer_isp);
  385. if (ns.user_isp != os.user_isp)
  386. pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
  387. os.user_isp,
  388. ns.user_isp);
  389. if (pbp != pb)
  390. dev_info(DEV, "%s\n", pb);
  391. }
  392. static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
  393. enum chg_state_flags flags)
  394. {
  395. char pb[300];
  396. char *pbp = pb;
  397. pbp += print_state_change(pbp, os, ns, flags);
  398. if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
  399. pbp += sprintf(pbp, "susp( %d -> %d ) ",
  400. is_susp(os),
  401. is_susp(ns));
  402. if (pbp != pb)
  403. conn_info(tconn, "%s\n", pb);
  404. }
  405. /**
  406. * is_valid_state() - Returns an SS_ error code if ns is not valid
  407. * @mdev: DRBD device.
  408. * @ns: State to consider.
  409. */
  410. static enum drbd_state_rv
  411. is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
  412. {
  413. /* See drbd_state_sw_errors in drbd_strings.c */
  414. enum drbd_fencing_p fp;
  415. enum drbd_state_rv rv = SS_SUCCESS;
  416. struct net_conf *nc;
  417. rcu_read_lock();
  418. fp = FP_DONT_CARE;
  419. if (get_ldev(mdev)) {
  420. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  421. put_ldev(mdev);
  422. }
  423. nc = rcu_dereference(mdev->tconn->net_conf);
  424. if (nc) {
  425. if (!nc->two_primaries && ns.role == R_PRIMARY) {
  426. if (ns.peer == R_PRIMARY)
  427. rv = SS_TWO_PRIMARIES;
  428. else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
  429. rv = SS_O_VOL_PEER_PRI;
  430. }
  431. }
  432. if (rv <= 0)
  433. /* already found a reason to abort */;
  434. else if (ns.role == R_SECONDARY && mdev->open_cnt)
  435. rv = SS_DEVICE_IN_USE;
  436. else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
  437. rv = SS_NO_UP_TO_DATE_DISK;
  438. else if (fp >= FP_RESOURCE &&
  439. ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
  440. rv = SS_PRIMARY_NOP;
  441. else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
  442. rv = SS_NO_UP_TO_DATE_DISK;
  443. else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
  444. rv = SS_NO_LOCAL_DISK;
  445. else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
  446. rv = SS_NO_REMOTE_DISK;
  447. else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
  448. rv = SS_NO_UP_TO_DATE_DISK;
  449. else if ((ns.conn == C_CONNECTED ||
  450. ns.conn == C_WF_BITMAP_S ||
  451. ns.conn == C_SYNC_SOURCE ||
  452. ns.conn == C_PAUSED_SYNC_S) &&
  453. ns.disk == D_OUTDATED)
  454. rv = SS_CONNECTED_OUTDATES;
  455. else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  456. (nc->verify_alg[0] == 0))
  457. rv = SS_NO_VERIFY_ALG;
  458. else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  459. mdev->tconn->agreed_pro_version < 88)
  460. rv = SS_NOT_SUPPORTED;
  461. else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
  462. rv = SS_CONNECTED_OUTDATES;
  463. rcu_read_unlock();
  464. return rv;
  465. }
  466. /**
  467. * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
  468. * This function limits state transitions that may be declined by DRBD. I.e.
  469. * user requests (aka soft transitions).
  470. * @mdev: DRBD device.
  471. * @ns: new state.
  472. * @os: old state.
  473. */
  474. static enum drbd_state_rv
  475. is_valid_soft_transition(union drbd_state os, union drbd_state ns)
  476. {
  477. enum drbd_state_rv rv = SS_SUCCESS;
  478. if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
  479. os.conn > C_CONNECTED)
  480. rv = SS_RESYNC_RUNNING;
  481. if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
  482. rv = SS_ALREADY_STANDALONE;
  483. if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
  484. rv = SS_IS_DISKLESS;
  485. if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
  486. rv = SS_NO_NET_CONFIG;
  487. if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
  488. rv = SS_LOWER_THAN_OUTDATED;
  489. if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
  490. rv = SS_IN_TRANSIENT_STATE;
  491. /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
  492. rv = SS_IN_TRANSIENT_STATE; */
  493. if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
  494. rv = SS_NEED_CONNECTION;
  495. if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  496. ns.conn != os.conn && os.conn > C_CONNECTED)
  497. rv = SS_RESYNC_RUNNING;
  498. if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
  499. os.conn < C_CONNECTED)
  500. rv = SS_NEED_CONNECTION;
  501. if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
  502. && os.conn < C_WF_REPORT_PARAMS)
  503. rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
  504. return rv;
  505. }
  506. static enum drbd_state_rv
  507. is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
  508. {
  509. /* no change -> nothing to do, at least for the connection part */
  510. if (oc == nc)
  511. return SS_NOTHING_TO_DO;
  512. /* disconnect of an unconfigured connection does not make sense */
  513. if (oc == C_STANDALONE && nc == C_DISCONNECTING)
  514. return SS_ALREADY_STANDALONE;
  515. /* from C_STANDALONE, we start with C_UNCONNECTED */
  516. if (oc == C_STANDALONE && nc != C_UNCONNECTED)
  517. return SS_NEED_CONNECTION;
  518. /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
  519. if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
  520. return SS_IN_TRANSIENT_STATE;
  521. /* After C_DISCONNECTING only C_STANDALONE may follow */
  522. if (oc == C_DISCONNECTING && nc != C_STANDALONE)
  523. return SS_IN_TRANSIENT_STATE;
  524. return SS_SUCCESS;
  525. }
  526. /**
  527. * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
  528. * This limits hard state transitions. Hard state transitions are facts there are
  529. * imposed on DRBD by the environment. E.g. disk broke or network broke down.
  530. * But those hard state transitions are still not allowed to do everything.
  531. * @ns: new state.
  532. * @os: old state.
  533. */
  534. static enum drbd_state_rv
  535. is_valid_transition(union drbd_state os, union drbd_state ns)
  536. {
  537. enum drbd_state_rv rv;
  538. rv = is_valid_conn_transition(os.conn, ns.conn);
  539. /* we cannot fail (again) if we already detached */
  540. if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
  541. rv = SS_IS_DISKLESS;
  542. return rv;
  543. }
  544. static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
  545. {
  546. static const char *msg_table[] = {
  547. [NO_WARNING] = "",
  548. [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
  549. [ABORTED_RESYNC] = "Resync aborted.",
  550. [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
  551. [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
  552. [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
  553. };
  554. if (warn != NO_WARNING)
  555. dev_warn(DEV, "%s\n", msg_table[warn]);
  556. }
  557. /**
  558. * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
  559. * @mdev: DRBD device.
  560. * @os: old state.
  561. * @ns: new state.
  562. * @warn_sync_abort:
  563. *
  564. * When we loose connection, we have to set the state of the peers disk (pdsk)
  565. * to D_UNKNOWN. This rule and many more along those lines are in this function.
  566. */
  567. static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
  568. enum sanitize_state_warnings *warn)
  569. {
  570. enum drbd_fencing_p fp;
  571. enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
  572. if (warn)
  573. *warn = NO_WARNING;
  574. fp = FP_DONT_CARE;
  575. if (get_ldev(mdev)) {
  576. rcu_read_lock();
  577. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  578. rcu_read_unlock();
  579. put_ldev(mdev);
  580. }
  581. /* Implications from connection to peer and peer_isp */
  582. if (ns.conn < C_CONNECTED) {
  583. ns.peer_isp = 0;
  584. ns.peer = R_UNKNOWN;
  585. if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
  586. ns.pdsk = D_UNKNOWN;
  587. }
  588. /* Clear the aftr_isp when becoming unconfigured */
  589. if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
  590. ns.aftr_isp = 0;
  591. /* An implication of the disk states onto the connection state */
  592. /* Abort resync if a disk fails/detaches */
  593. if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
  594. if (warn)
  595. *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
  596. ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
  597. ns.conn = C_CONNECTED;
  598. }
  599. /* Connection breaks down before we finished "Negotiating" */
  600. if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
  601. get_ldev_if_state(mdev, D_NEGOTIATING)) {
  602. if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
  603. ns.disk = mdev->new_state_tmp.disk;
  604. ns.pdsk = mdev->new_state_tmp.pdsk;
  605. } else {
  606. if (warn)
  607. *warn = CONNECTION_LOST_NEGOTIATING;
  608. ns.disk = D_DISKLESS;
  609. ns.pdsk = D_UNKNOWN;
  610. }
  611. put_ldev(mdev);
  612. }
  613. /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
  614. if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
  615. if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
  616. ns.disk = D_UP_TO_DATE;
  617. if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
  618. ns.pdsk = D_UP_TO_DATE;
  619. }
  620. /* Implications of the connection stat on the disk states */
  621. disk_min = D_DISKLESS;
  622. disk_max = D_UP_TO_DATE;
  623. pdsk_min = D_INCONSISTENT;
  624. pdsk_max = D_UNKNOWN;
  625. switch ((enum drbd_conns)ns.conn) {
  626. case C_WF_BITMAP_T:
  627. case C_PAUSED_SYNC_T:
  628. case C_STARTING_SYNC_T:
  629. case C_WF_SYNC_UUID:
  630. case C_BEHIND:
  631. disk_min = D_INCONSISTENT;
  632. disk_max = D_OUTDATED;
  633. pdsk_min = D_UP_TO_DATE;
  634. pdsk_max = D_UP_TO_DATE;
  635. break;
  636. case C_VERIFY_S:
  637. case C_VERIFY_T:
  638. disk_min = D_UP_TO_DATE;
  639. disk_max = D_UP_TO_DATE;
  640. pdsk_min = D_UP_TO_DATE;
  641. pdsk_max = D_UP_TO_DATE;
  642. break;
  643. case C_CONNECTED:
  644. disk_min = D_DISKLESS;
  645. disk_max = D_UP_TO_DATE;
  646. pdsk_min = D_DISKLESS;
  647. pdsk_max = D_UP_TO_DATE;
  648. break;
  649. case C_WF_BITMAP_S:
  650. case C_PAUSED_SYNC_S:
  651. case C_STARTING_SYNC_S:
  652. case C_AHEAD:
  653. disk_min = D_UP_TO_DATE;
  654. disk_max = D_UP_TO_DATE;
  655. pdsk_min = D_INCONSISTENT;
  656. pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
  657. break;
  658. case C_SYNC_TARGET:
  659. disk_min = D_INCONSISTENT;
  660. disk_max = D_INCONSISTENT;
  661. pdsk_min = D_UP_TO_DATE;
  662. pdsk_max = D_UP_TO_DATE;
  663. break;
  664. case C_SYNC_SOURCE:
  665. disk_min = D_UP_TO_DATE;
  666. disk_max = D_UP_TO_DATE;
  667. pdsk_min = D_INCONSISTENT;
  668. pdsk_max = D_INCONSISTENT;
  669. break;
  670. case C_STANDALONE:
  671. case C_DISCONNECTING:
  672. case C_UNCONNECTED:
  673. case C_TIMEOUT:
  674. case C_BROKEN_PIPE:
  675. case C_NETWORK_FAILURE:
  676. case C_PROTOCOL_ERROR:
  677. case C_TEAR_DOWN:
  678. case C_WF_CONNECTION:
  679. case C_WF_REPORT_PARAMS:
  680. case C_MASK:
  681. break;
  682. }
  683. if (ns.disk > disk_max)
  684. ns.disk = disk_max;
  685. if (ns.disk < disk_min) {
  686. if (warn)
  687. *warn = IMPLICITLY_UPGRADED_DISK;
  688. ns.disk = disk_min;
  689. }
  690. if (ns.pdsk > pdsk_max)
  691. ns.pdsk = pdsk_max;
  692. if (ns.pdsk < pdsk_min) {
  693. if (warn)
  694. *warn = IMPLICITLY_UPGRADED_PDSK;
  695. ns.pdsk = pdsk_min;
  696. }
  697. if (fp == FP_STONITH &&
  698. (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
  699. ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
  700. if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
  701. (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
  702. ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
  703. if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
  704. if (ns.conn == C_SYNC_SOURCE)
  705. ns.conn = C_PAUSED_SYNC_S;
  706. if (ns.conn == C_SYNC_TARGET)
  707. ns.conn = C_PAUSED_SYNC_T;
  708. } else {
  709. if (ns.conn == C_PAUSED_SYNC_S)
  710. ns.conn = C_SYNC_SOURCE;
  711. if (ns.conn == C_PAUSED_SYNC_T)
  712. ns.conn = C_SYNC_TARGET;
  713. }
  714. return ns;
  715. }
  716. void drbd_resume_al(struct drbd_conf *mdev)
  717. {
  718. if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
  719. dev_info(DEV, "Resumed AL updates\n");
  720. }
  721. /* helper for __drbd_set_state */
  722. static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
  723. {
  724. if (mdev->tconn->agreed_pro_version < 90)
  725. mdev->ov_start_sector = 0;
  726. mdev->rs_total = drbd_bm_bits(mdev);
  727. mdev->ov_position = 0;
  728. if (cs == C_VERIFY_T) {
  729. /* starting online verify from an arbitrary position
  730. * does not fit well into the existing protocol.
  731. * on C_VERIFY_T, we initialize ov_left and friends
  732. * implicitly in receive_DataRequest once the
  733. * first P_OV_REQUEST is received */
  734. mdev->ov_start_sector = ~(sector_t)0;
  735. } else {
  736. unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
  737. if (bit >= mdev->rs_total) {
  738. mdev->ov_start_sector =
  739. BM_BIT_TO_SECT(mdev->rs_total - 1);
  740. mdev->rs_total = 1;
  741. } else
  742. mdev->rs_total -= bit;
  743. mdev->ov_position = mdev->ov_start_sector;
  744. }
  745. mdev->ov_left = mdev->rs_total;
  746. }
  747. /**
  748. * __drbd_set_state() - Set a new DRBD state
  749. * @mdev: DRBD device.
  750. * @ns: new state.
  751. * @flags: Flags
  752. * @done: Optional completion, that will get completed after the after_state_ch() finished
  753. *
  754. * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
  755. */
  756. enum drbd_state_rv
  757. __drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
  758. enum chg_state_flags flags, struct completion *done)
  759. {
  760. union drbd_state os;
  761. enum drbd_state_rv rv = SS_SUCCESS;
  762. enum sanitize_state_warnings ssw;
  763. struct after_state_chg_work *ascw;
  764. os = drbd_read_state(mdev);
  765. ns = sanitize_state(mdev, ns, &ssw);
  766. if (ns.i == os.i)
  767. return SS_NOTHING_TO_DO;
  768. rv = is_valid_transition(os, ns);
  769. if (rv < SS_SUCCESS)
  770. return rv;
  771. if (!(flags & CS_HARD)) {
  772. /* pre-state-change checks ; only look at ns */
  773. /* See drbd_state_sw_errors in drbd_strings.c */
  774. rv = is_valid_state(mdev, ns);
  775. if (rv < SS_SUCCESS) {
  776. /* If the old state was illegal as well, then let
  777. this happen...*/
  778. if (is_valid_state(mdev, os) == rv)
  779. rv = is_valid_soft_transition(os, ns);
  780. } else
  781. rv = is_valid_soft_transition(os, ns);
  782. }
  783. if (rv < SS_SUCCESS) {
  784. if (flags & CS_VERBOSE)
  785. print_st_err(mdev, os, ns, rv);
  786. return rv;
  787. }
  788. print_sanitize_warnings(mdev, ssw);
  789. drbd_pr_state_change(mdev, os, ns, flags);
  790. /* Display changes to the susp* flags that where caused by the call to
  791. sanitize_state(). Only display it here if we where not called from
  792. _conn_request_state() */
  793. if (!(flags & CS_DC_SUSP))
  794. conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
  795. /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
  796. * on the ldev here, to be sure the transition -> D_DISKLESS resp.
  797. * drbd_ldev_destroy() won't happen before our corresponding
  798. * after_state_ch works run, where we put_ldev again. */
  799. if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
  800. (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
  801. atomic_inc(&mdev->local_cnt);
  802. mdev->state.i = ns.i;
  803. mdev->tconn->susp = ns.susp;
  804. mdev->tconn->susp_nod = ns.susp_nod;
  805. mdev->tconn->susp_fen = ns.susp_fen;
  806. if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
  807. drbd_print_uuids(mdev, "attached to UUIDs");
  808. wake_up(&mdev->misc_wait);
  809. wake_up(&mdev->state_wait);
  810. wake_up(&mdev->tconn->ping_wait);
  811. /* aborted verify run. log the last position */
  812. if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
  813. ns.conn < C_CONNECTED) {
  814. mdev->ov_start_sector =
  815. BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
  816. dev_info(DEV, "Online Verify reached sector %llu\n",
  817. (unsigned long long)mdev->ov_start_sector);
  818. }
  819. if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
  820. (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
  821. dev_info(DEV, "Syncer continues.\n");
  822. mdev->rs_paused += (long)jiffies
  823. -(long)mdev->rs_mark_time[mdev->rs_last_mark];
  824. if (ns.conn == C_SYNC_TARGET)
  825. mod_timer(&mdev->resync_timer, jiffies);
  826. }
  827. if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
  828. (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
  829. dev_info(DEV, "Resync suspended\n");
  830. mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
  831. }
  832. if (os.conn == C_CONNECTED &&
  833. (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
  834. unsigned long now = jiffies;
  835. int i;
  836. set_ov_position(mdev, ns.conn);
  837. mdev->rs_start = now;
  838. mdev->rs_last_events = 0;
  839. mdev->rs_last_sect_ev = 0;
  840. mdev->ov_last_oos_size = 0;
  841. mdev->ov_last_oos_start = 0;
  842. for (i = 0; i < DRBD_SYNC_MARKS; i++) {
  843. mdev->rs_mark_left[i] = mdev->ov_left;
  844. mdev->rs_mark_time[i] = now;
  845. }
  846. drbd_rs_controller_reset(mdev);
  847. if (ns.conn == C_VERIFY_S) {
  848. dev_info(DEV, "Starting Online Verify from sector %llu\n",
  849. (unsigned long long)mdev->ov_position);
  850. mod_timer(&mdev->resync_timer, jiffies);
  851. }
  852. }
  853. if (get_ldev(mdev)) {
  854. u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
  855. MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
  856. MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
  857. if (test_bit(CRASHED_PRIMARY, &mdev->flags))
  858. mdf |= MDF_CRASHED_PRIMARY;
  859. if (mdev->state.role == R_PRIMARY ||
  860. (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
  861. mdf |= MDF_PRIMARY_IND;
  862. if (mdev->state.conn > C_WF_REPORT_PARAMS)
  863. mdf |= MDF_CONNECTED_IND;
  864. if (mdev->state.disk > D_INCONSISTENT)
  865. mdf |= MDF_CONSISTENT;
  866. if (mdev->state.disk > D_OUTDATED)
  867. mdf |= MDF_WAS_UP_TO_DATE;
  868. if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
  869. mdf |= MDF_PEER_OUT_DATED;
  870. if (mdf != mdev->ldev->md.flags) {
  871. mdev->ldev->md.flags = mdf;
  872. drbd_md_mark_dirty(mdev);
  873. }
  874. if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
  875. drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
  876. put_ldev(mdev);
  877. }
  878. /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
  879. if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
  880. os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
  881. set_bit(CONSIDER_RESYNC, &mdev->flags);
  882. /* Receiver should clean up itself */
  883. if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
  884. drbd_thread_stop_nowait(&mdev->tconn->receiver);
  885. /* Now the receiver finished cleaning up itself, it should die */
  886. if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
  887. drbd_thread_stop_nowait(&mdev->tconn->receiver);
  888. /* Upon network failure, we need to restart the receiver. */
  889. if (os.conn > C_TEAR_DOWN &&
  890. ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
  891. drbd_thread_restart_nowait(&mdev->tconn->receiver);
  892. /* Resume AL writing if we get a connection */
  893. if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED)
  894. drbd_resume_al(mdev);
  895. ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
  896. if (ascw) {
  897. ascw->os = os;
  898. ascw->ns = ns;
  899. ascw->flags = flags;
  900. ascw->w.cb = w_after_state_ch;
  901. ascw->w.mdev = mdev;
  902. ascw->done = done;
  903. drbd_queue_work(&mdev->tconn->data.work, &ascw->w);
  904. } else {
  905. dev_err(DEV, "Could not kmalloc an ascw\n");
  906. }
  907. return rv;
  908. }
  909. static int w_after_state_ch(struct drbd_work *w, int unused)
  910. {
  911. struct after_state_chg_work *ascw =
  912. container_of(w, struct after_state_chg_work, w);
  913. struct drbd_conf *mdev = w->mdev;
  914. after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
  915. if (ascw->flags & CS_WAIT_COMPLETE) {
  916. D_ASSERT(ascw->done != NULL);
  917. complete(ascw->done);
  918. }
  919. kfree(ascw);
  920. return 0;
  921. }
  922. static void abw_start_sync(struct drbd_conf *mdev, int rv)
  923. {
  924. if (rv) {
  925. dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
  926. _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
  927. return;
  928. }
  929. switch (mdev->state.conn) {
  930. case C_STARTING_SYNC_T:
  931. _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
  932. break;
  933. case C_STARTING_SYNC_S:
  934. drbd_start_resync(mdev, C_SYNC_SOURCE);
  935. break;
  936. }
  937. }
  938. int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
  939. int (*io_fn)(struct drbd_conf *),
  940. char *why, enum bm_flag flags)
  941. {
  942. int rv;
  943. D_ASSERT(current == mdev->tconn->worker.task);
  944. /* open coded non-blocking drbd_suspend_io(mdev); */
  945. set_bit(SUSPEND_IO, &mdev->flags);
  946. drbd_bm_lock(mdev, why, flags);
  947. rv = io_fn(mdev);
  948. drbd_bm_unlock(mdev);
  949. drbd_resume_io(mdev);
  950. return rv;
  951. }
  952. /**
  953. * after_state_ch() - Perform after state change actions that may sleep
  954. * @mdev: DRBD device.
  955. * @os: old state.
  956. * @ns: new state.
  957. * @flags: Flags
  958. */
  959. static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
  960. union drbd_state ns, enum chg_state_flags flags)
  961. {
  962. enum drbd_fencing_p fp;
  963. struct sib_info sib;
  964. sib.sib_reason = SIB_STATE_CHANGE;
  965. sib.os = os;
  966. sib.ns = ns;
  967. if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
  968. clear_bit(CRASHED_PRIMARY, &mdev->flags);
  969. if (mdev->p_uuid)
  970. mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
  971. }
  972. fp = FP_DONT_CARE;
  973. if (get_ldev(mdev)) {
  974. rcu_read_lock();
  975. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  976. rcu_read_unlock();
  977. put_ldev(mdev);
  978. }
  979. /* Inform userspace about the change... */
  980. drbd_bcast_event(mdev, &sib);
  981. if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
  982. (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
  983. drbd_khelper(mdev, "pri-on-incon-degr");
  984. /* Here we have the actions that are performed after a
  985. state change. This function might sleep */
  986. if (ns.susp_nod) {
  987. enum drbd_req_event what = NOTHING;
  988. if (os.conn < C_CONNECTED && conn_lowest_conn(mdev->tconn) >= C_CONNECTED)
  989. what = RESEND;
  990. if (os.disk == D_ATTACHING && conn_lowest_disk(mdev->tconn) > D_ATTACHING)
  991. what = RESTART_FROZEN_DISK_IO;
  992. if (what != NOTHING) {
  993. spin_lock_irq(&mdev->tconn->req_lock);
  994. _tl_restart(mdev->tconn, what);
  995. _drbd_set_state(_NS(mdev, susp_nod, 0), CS_VERBOSE, NULL);
  996. spin_unlock_irq(&mdev->tconn->req_lock);
  997. }
  998. }
  999. /* Became sync source. With protocol >= 96, we still need to send out
  1000. * the sync uuid now. Need to do that before any drbd_send_state, or
  1001. * the other side may go "paused sync" before receiving the sync uuids,
  1002. * which is unexpected. */
  1003. if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
  1004. (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
  1005. mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
  1006. drbd_gen_and_send_sync_uuid(mdev);
  1007. put_ldev(mdev);
  1008. }
  1009. /* Do not change the order of the if above and the two below... */
  1010. if (os.pdsk == D_DISKLESS && ns.pdsk > D_DISKLESS) { /* attach on the peer */
  1011. drbd_send_uuids(mdev);
  1012. drbd_send_state(mdev);
  1013. }
  1014. /* No point in queuing send_bitmap if we don't have a connection
  1015. * anymore, so check also the _current_ state, not only the new state
  1016. * at the time this work was queued. */
  1017. if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
  1018. mdev->state.conn == C_WF_BITMAP_S)
  1019. drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
  1020. "send_bitmap (WFBitMapS)",
  1021. BM_LOCKED_TEST_ALLOWED);
  1022. /* Lost contact to peer's copy of the data */
  1023. if ((os.pdsk >= D_INCONSISTENT &&
  1024. os.pdsk != D_UNKNOWN &&
  1025. os.pdsk != D_OUTDATED)
  1026. && (ns.pdsk < D_INCONSISTENT ||
  1027. ns.pdsk == D_UNKNOWN ||
  1028. ns.pdsk == D_OUTDATED)) {
  1029. if (get_ldev(mdev)) {
  1030. if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
  1031. mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
  1032. if (drbd_suspended(mdev)) {
  1033. set_bit(NEW_CUR_UUID, &mdev->flags);
  1034. } else {
  1035. drbd_uuid_new_current(mdev);
  1036. drbd_send_uuids(mdev);
  1037. }
  1038. }
  1039. put_ldev(mdev);
  1040. }
  1041. }
  1042. if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
  1043. if (ns.peer == R_PRIMARY && mdev->ldev->md.uuid[UI_BITMAP] == 0) {
  1044. drbd_uuid_new_current(mdev);
  1045. drbd_send_uuids(mdev);
  1046. }
  1047. /* D_DISKLESS Peer becomes secondary */
  1048. if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
  1049. /* We may still be Primary ourselves.
  1050. * No harm done if the bitmap still changes,
  1051. * redirtied pages will follow later. */
  1052. drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
  1053. "demote diskless peer", BM_LOCKED_SET_ALLOWED);
  1054. put_ldev(mdev);
  1055. }
  1056. /* Write out all changed bits on demote.
  1057. * Though, no need to da that just yet
  1058. * if there is a resync going on still */
  1059. if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
  1060. mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
  1061. /* No changes to the bitmap expected this time, so assert that,
  1062. * even though no harm was done if it did change. */
  1063. drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
  1064. "demote", BM_LOCKED_TEST_ALLOWED);
  1065. put_ldev(mdev);
  1066. }
  1067. /* Last part of the attaching process ... */
  1068. if (ns.conn >= C_CONNECTED &&
  1069. os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
  1070. drbd_send_sizes(mdev, 0, 0); /* to start sync... */
  1071. drbd_send_uuids(mdev);
  1072. drbd_send_state(mdev);
  1073. }
  1074. /* We want to pause/continue resync, tell peer. */
  1075. if (ns.conn >= C_CONNECTED &&
  1076. ((os.aftr_isp != ns.aftr_isp) ||
  1077. (os.user_isp != ns.user_isp)))
  1078. drbd_send_state(mdev);
  1079. /* In case one of the isp bits got set, suspend other devices. */
  1080. if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
  1081. (ns.aftr_isp || ns.peer_isp || ns.user_isp))
  1082. suspend_other_sg(mdev);
  1083. /* Make sure the peer gets informed about eventual state
  1084. changes (ISP bits) while we were in WFReportParams. */
  1085. if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
  1086. drbd_send_state(mdev);
  1087. if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
  1088. drbd_send_state(mdev);
  1089. /* We are in the progress to start a full sync... */
  1090. if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
  1091. (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
  1092. /* no other bitmap changes expected during this phase */
  1093. drbd_queue_bitmap_io(mdev,
  1094. &drbd_bmio_set_n_write, &abw_start_sync,
  1095. "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
  1096. /* We are invalidating our self... */
  1097. if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED &&
  1098. os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT)
  1099. /* other bitmap operation expected during this phase */
  1100. drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL,
  1101. "set_n_write from invalidate", BM_LOCKED_MASK);
  1102. /* first half of local IO error, failure to attach,
  1103. * or administrative detach */
  1104. if (os.disk != D_FAILED && ns.disk == D_FAILED) {
  1105. enum drbd_io_error_p eh;
  1106. int was_io_error;
  1107. /* corresponding get_ldev was in __drbd_set_state, to serialize
  1108. * our cleanup here with the transition to D_DISKLESS,
  1109. * so it is safe to dreference ldev here. */
  1110. rcu_read_lock();
  1111. eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
  1112. rcu_read_unlock();
  1113. was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
  1114. /* current state still has to be D_FAILED,
  1115. * there is only one way out: to D_DISKLESS,
  1116. * and that may only happen after our put_ldev below. */
  1117. if (mdev->state.disk != D_FAILED)
  1118. dev_err(DEV,
  1119. "ASSERT FAILED: disk is %s during detach\n",
  1120. drbd_disk_str(mdev->state.disk));
  1121. if (!drbd_send_state(mdev))
  1122. dev_info(DEV, "Notified peer that I am detaching my disk\n");
  1123. drbd_rs_cancel_all(mdev);
  1124. /* In case we want to get something to stable storage still,
  1125. * this may be the last chance.
  1126. * Following put_ldev may transition to D_DISKLESS. */
  1127. drbd_md_sync(mdev);
  1128. put_ldev(mdev);
  1129. if (was_io_error && eh == EP_CALL_HELPER)
  1130. drbd_khelper(mdev, "local-io-error");
  1131. }
  1132. /* second half of local IO error, failure to attach,
  1133. * or administrative detach,
  1134. * after local_cnt references have reached zero again */
  1135. if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
  1136. /* We must still be diskless,
  1137. * re-attach has to be serialized with this! */
  1138. if (mdev->state.disk != D_DISKLESS)
  1139. dev_err(DEV,
  1140. "ASSERT FAILED: disk is %s while going diskless\n",
  1141. drbd_disk_str(mdev->state.disk));
  1142. mdev->rs_total = 0;
  1143. mdev->rs_failed = 0;
  1144. atomic_set(&mdev->rs_pending_cnt, 0);
  1145. if (!drbd_send_state(mdev))
  1146. dev_info(DEV, "Notified peer that I'm now diskless.\n");
  1147. /* corresponding get_ldev in __drbd_set_state
  1148. * this may finally trigger drbd_ldev_destroy. */
  1149. put_ldev(mdev);
  1150. }
  1151. /* Notify peer that I had a local IO error, and did not detached.. */
  1152. if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT)
  1153. drbd_send_state(mdev);
  1154. /* Disks got bigger while they were detached */
  1155. if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
  1156. test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
  1157. if (ns.conn == C_CONNECTED)
  1158. resync_after_online_grow(mdev);
  1159. }
  1160. /* A resync finished or aborted, wake paused devices... */
  1161. if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
  1162. (os.peer_isp && !ns.peer_isp) ||
  1163. (os.user_isp && !ns.user_isp))
  1164. resume_next_sg(mdev);
  1165. /* sync target done with resync. Explicitly notify peer, even though
  1166. * it should (at least for non-empty resyncs) already know itself. */
  1167. if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
  1168. drbd_send_state(mdev);
  1169. /* This triggers bitmap writeout of potentially still unwritten pages
  1170. * if the resync finished cleanly, or aborted because of peer disk
  1171. * failure, or because of connection loss.
  1172. * For resync aborted because of local disk failure, we cannot do
  1173. * any bitmap writeout anymore.
  1174. * No harm done if some bits change during this phase.
  1175. */
  1176. if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
  1177. drbd_queue_bitmap_io(mdev, &drbd_bm_write, NULL,
  1178. "write from resync_finished", BM_LOCKED_SET_ALLOWED);
  1179. put_ldev(mdev);
  1180. }
  1181. if (ns.disk == D_DISKLESS &&
  1182. ns.conn == C_STANDALONE &&
  1183. ns.role == R_SECONDARY) {
  1184. if (os.aftr_isp != ns.aftr_isp)
  1185. resume_next_sg(mdev);
  1186. }
  1187. drbd_md_sync(mdev);
  1188. }
  1189. struct after_conn_state_chg_work {
  1190. struct drbd_work w;
  1191. enum drbd_conns oc;
  1192. union drbd_state ns_min;
  1193. union drbd_state ns_max; /* new, max state, over all mdevs */
  1194. enum chg_state_flags flags;
  1195. };
  1196. static int w_after_conn_state_ch(struct drbd_work *w, int unused)
  1197. {
  1198. struct after_conn_state_chg_work *acscw =
  1199. container_of(w, struct after_conn_state_chg_work, w);
  1200. struct drbd_tconn *tconn = w->tconn;
  1201. enum drbd_conns oc = acscw->oc;
  1202. union drbd_state ns_max = acscw->ns_max;
  1203. union drbd_state ns_min = acscw->ns_min;
  1204. struct drbd_conf *mdev;
  1205. int vnr;
  1206. kfree(acscw);
  1207. /* Upon network configuration, we need to start the receiver */
  1208. if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
  1209. drbd_thread_start(&tconn->receiver);
  1210. if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
  1211. struct net_conf *old_conf;
  1212. mutex_lock(&tconn->conf_update);
  1213. old_conf = tconn->net_conf;
  1214. tconn->my_addr_len = 0;
  1215. tconn->peer_addr_len = 0;
  1216. rcu_assign_pointer(tconn->net_conf, NULL);
  1217. conn_free_crypto(tconn);
  1218. mutex_unlock(&tconn->conf_update);
  1219. synchronize_rcu();
  1220. kfree(old_conf);
  1221. }
  1222. if (ns_max.susp_fen) {
  1223. /* case1: The outdate peer handler is successful: */
  1224. if (ns_max.pdsk <= D_OUTDATED) {
  1225. tl_clear(tconn);
  1226. rcu_read_lock();
  1227. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1228. if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
  1229. drbd_uuid_new_current(mdev);
  1230. clear_bit(NEW_CUR_UUID, &mdev->flags);
  1231. }
  1232. }
  1233. rcu_read_unlock();
  1234. conn_request_state(tconn,
  1235. (union drbd_state) { { .susp_fen = 1 } },
  1236. (union drbd_state) { { .susp_fen = 0 } },
  1237. CS_VERBOSE);
  1238. }
  1239. /* case2: The connection was established again: */
  1240. if (ns_min.conn >= C_CONNECTED) {
  1241. rcu_read_lock();
  1242. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  1243. clear_bit(NEW_CUR_UUID, &mdev->flags);
  1244. rcu_read_unlock();
  1245. spin_lock_irq(&tconn->req_lock);
  1246. _tl_restart(tconn, RESEND);
  1247. _conn_request_state(tconn,
  1248. (union drbd_state) { { .susp_fen = 1 } },
  1249. (union drbd_state) { { .susp_fen = 0 } },
  1250. CS_VERBOSE);
  1251. spin_unlock_irq(&tconn->req_lock);
  1252. }
  1253. }
  1254. kref_put(&tconn->kref, &conn_destroy);
  1255. return 0;
  1256. }
  1257. void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
  1258. {
  1259. enum chg_state_flags flags = ~0;
  1260. union drbd_dev_state os, cs = {}; /* old_state, common_state */
  1261. struct drbd_conf *mdev;
  1262. int vnr, first_vol = 1;
  1263. rcu_read_lock();
  1264. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1265. os = mdev->state;
  1266. if (first_vol) {
  1267. cs = os;
  1268. first_vol = 0;
  1269. continue;
  1270. }
  1271. if (cs.role != os.role)
  1272. flags &= ~CS_DC_ROLE;
  1273. if (cs.peer != os.peer)
  1274. flags &= ~CS_DC_PEER;
  1275. if (cs.conn != os.conn)
  1276. flags &= ~CS_DC_CONN;
  1277. if (cs.disk != os.disk)
  1278. flags &= ~CS_DC_DISK;
  1279. if (cs.pdsk != os.pdsk)
  1280. flags &= ~CS_DC_PDSK;
  1281. }
  1282. rcu_read_unlock();
  1283. *pf |= CS_DC_MASK;
  1284. *pf &= flags;
  1285. (*pcs).i = cs.i;
  1286. }
  1287. static enum drbd_state_rv
  1288. conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1289. enum chg_state_flags flags)
  1290. {
  1291. enum drbd_state_rv rv = SS_SUCCESS;
  1292. union drbd_state ns, os;
  1293. struct drbd_conf *mdev;
  1294. int vnr;
  1295. rcu_read_lock();
  1296. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1297. os = drbd_read_state(mdev);
  1298. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  1299. if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
  1300. ns.disk = os.disk;
  1301. if (ns.i == os.i)
  1302. continue;
  1303. rv = is_valid_transition(os, ns);
  1304. if (rv < SS_SUCCESS)
  1305. break;
  1306. if (!(flags & CS_HARD)) {
  1307. rv = is_valid_state(mdev, ns);
  1308. if (rv < SS_SUCCESS) {
  1309. if (is_valid_state(mdev, os) == rv)
  1310. rv = is_valid_soft_transition(os, ns);
  1311. } else
  1312. rv = is_valid_soft_transition(os, ns);
  1313. }
  1314. if (rv < SS_SUCCESS)
  1315. break;
  1316. }
  1317. rcu_read_unlock();
  1318. if (rv < SS_SUCCESS && flags & CS_VERBOSE)
  1319. print_st_err(mdev, os, ns, rv);
  1320. return rv;
  1321. }
  1322. void
  1323. conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1324. union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
  1325. {
  1326. union drbd_state ns, os, ns_max = { };
  1327. union drbd_state ns_min = {
  1328. { .role = R_MASK,
  1329. .peer = R_MASK,
  1330. .disk = D_MASK,
  1331. .pdsk = D_MASK
  1332. } };
  1333. struct drbd_conf *mdev;
  1334. enum drbd_state_rv rv;
  1335. int vnr;
  1336. if (mask.conn == C_MASK)
  1337. tconn->cstate = val.conn;
  1338. rcu_read_lock();
  1339. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1340. os = drbd_read_state(mdev);
  1341. ns = apply_mask_val(os, mask, val);
  1342. ns = sanitize_state(mdev, ns, NULL);
  1343. if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
  1344. ns.disk = os.disk;
  1345. rv = __drbd_set_state(mdev, ns, flags, NULL);
  1346. if (rv < SS_SUCCESS)
  1347. BUG();
  1348. ns.i = mdev->state.i;
  1349. ns_max.role = max_role(ns.role, ns_max.role);
  1350. ns_max.peer = max_role(ns.peer, ns_max.peer);
  1351. ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
  1352. ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
  1353. ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
  1354. ns_min.role = min_role(ns.role, ns_min.role);
  1355. ns_min.peer = min_role(ns.peer, ns_min.peer);
  1356. ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
  1357. ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
  1358. ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
  1359. }
  1360. rcu_read_unlock();
  1361. ns_min.susp = ns_max.susp = tconn->susp;
  1362. ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
  1363. ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
  1364. *pns_min = ns_min;
  1365. *pns_max = ns_max;
  1366. }
  1367. static enum drbd_state_rv
  1368. _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
  1369. {
  1370. enum drbd_state_rv rv;
  1371. if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
  1372. return SS_CW_SUCCESS;
  1373. if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
  1374. return SS_CW_FAILED_BY_PEER;
  1375. spin_lock_irq(&tconn->req_lock);
  1376. rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR;
  1377. if (rv == SS_UNKNOWN_ERROR)
  1378. rv = conn_is_valid_transition(tconn, mask, val, 0);
  1379. if (rv == SS_SUCCESS)
  1380. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  1381. spin_unlock_irq(&tconn->req_lock);
  1382. return rv;
  1383. }
  1384. static enum drbd_state_rv
  1385. conn_cl_wide(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1386. enum chg_state_flags f)
  1387. {
  1388. enum drbd_state_rv rv;
  1389. spin_unlock_irq(&tconn->req_lock);
  1390. mutex_lock(&tconn->cstate_mutex);
  1391. if (conn_send_state_req(tconn, mask, val)) {
  1392. rv = SS_CW_FAILED_BY_PEER;
  1393. /* if (f & CS_VERBOSE)
  1394. print_st_err(mdev, os, ns, rv); */
  1395. goto abort;
  1396. }
  1397. wait_event(tconn->ping_wait, (rv = _conn_rq_cond(tconn, mask, val)));
  1398. abort:
  1399. mutex_unlock(&tconn->cstate_mutex);
  1400. spin_lock_irq(&tconn->req_lock);
  1401. return rv;
  1402. }
  1403. enum drbd_state_rv
  1404. _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1405. enum chg_state_flags flags)
  1406. {
  1407. enum drbd_state_rv rv = SS_SUCCESS;
  1408. struct after_conn_state_chg_work *acscw;
  1409. enum drbd_conns oc = tconn->cstate;
  1410. union drbd_state ns_max, ns_min, os;
  1411. rv = is_valid_conn_transition(oc, val.conn);
  1412. if (rv < SS_SUCCESS)
  1413. goto abort;
  1414. rv = conn_is_valid_transition(tconn, mask, val, flags);
  1415. if (rv < SS_SUCCESS)
  1416. goto abort;
  1417. if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
  1418. !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
  1419. rv = conn_cl_wide(tconn, mask, val, flags);
  1420. if (rv < SS_SUCCESS)
  1421. goto abort;
  1422. }
  1423. conn_old_common_state(tconn, &os, &flags);
  1424. flags |= CS_DC_SUSP;
  1425. conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
  1426. conn_pr_state_change(tconn, os, ns_max, flags);
  1427. acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
  1428. if (acscw) {
  1429. acscw->oc = os.conn;
  1430. acscw->ns_min = ns_min;
  1431. acscw->ns_max = ns_max;
  1432. acscw->flags = flags;
  1433. acscw->w.cb = w_after_conn_state_ch;
  1434. kref_get(&tconn->kref);
  1435. acscw->w.tconn = tconn;
  1436. drbd_queue_work(&tconn->data.work, &acscw->w);
  1437. } else {
  1438. conn_err(tconn, "Could not kmalloc an acscw\n");
  1439. }
  1440. abort:
  1441. return rv;
  1442. }
  1443. enum drbd_state_rv
  1444. conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1445. enum chg_state_flags flags)
  1446. {
  1447. enum drbd_state_rv rv;
  1448. spin_lock_irq(&tconn->req_lock);
  1449. rv = _conn_request_state(tconn, mask, val, flags);
  1450. spin_unlock_irq(&tconn->req_lock);
  1451. return rv;
  1452. }