drbd_state.c 52 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822
  1. /*
  2. drbd_state.c
  3. This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
  4. Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
  5. Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
  6. Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
  7. Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
  8. from Logicworks, Inc. for making SDP replication support possible.
  9. drbd is free software; you can redistribute it and/or modify
  10. it under the terms of the GNU General Public License as published by
  11. the Free Software Foundation; either version 2, or (at your option)
  12. any later version.
  13. drbd is distributed in the hope that it will be useful,
  14. but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. GNU General Public License for more details.
  17. You should have received a copy of the GNU General Public License
  18. along with drbd; see the file COPYING. If not, write to
  19. the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
  20. */
  21. #include <linux/drbd_limits.h>
  22. #include "drbd_int.h"
  23. #include "drbd_req.h"
  24. /* in drbd_main.c */
  25. extern void tl_abort_disk_io(struct drbd_conf *mdev);
  26. struct after_state_chg_work {
  27. struct drbd_work w;
  28. union drbd_state os;
  29. union drbd_state ns;
  30. enum chg_state_flags flags;
  31. struct completion *done;
  32. };
  33. enum sanitize_state_warnings {
  34. NO_WARNING,
  35. ABORTED_ONLINE_VERIFY,
  36. ABORTED_RESYNC,
  37. CONNECTION_LOST_NEGOTIATING,
  38. IMPLICITLY_UPGRADED_DISK,
  39. IMPLICITLY_UPGRADED_PDSK,
  40. };
  41. static int w_after_state_ch(struct drbd_work *w, int unused);
  42. static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
  43. union drbd_state ns, enum chg_state_flags flags);
  44. static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
  45. static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *);
  46. static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
  47. static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
  48. enum sanitize_state_warnings *warn);
  49. static inline bool is_susp(union drbd_state s)
  50. {
  51. return s.susp || s.susp_nod || s.susp_fen;
  52. }
  53. bool conn_all_vols_unconf(struct drbd_tconn *tconn)
  54. {
  55. struct drbd_conf *mdev;
  56. bool rv = true;
  57. int vnr;
  58. rcu_read_lock();
  59. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  60. if (mdev->state.disk != D_DISKLESS ||
  61. mdev->state.conn != C_STANDALONE ||
  62. mdev->state.role != R_SECONDARY) {
  63. rv = false;
  64. break;
  65. }
  66. }
  67. rcu_read_unlock();
  68. return rv;
  69. }
  70. /* Unfortunately the states where not correctly ordered, when
  71. they where defined. therefore can not use max_t() here. */
  72. static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
  73. {
  74. if (role1 == R_PRIMARY || role2 == R_PRIMARY)
  75. return R_PRIMARY;
  76. if (role1 == R_SECONDARY || role2 == R_SECONDARY)
  77. return R_SECONDARY;
  78. return R_UNKNOWN;
  79. }
  80. static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
  81. {
  82. if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
  83. return R_UNKNOWN;
  84. if (role1 == R_SECONDARY || role2 == R_SECONDARY)
  85. return R_SECONDARY;
  86. return R_PRIMARY;
  87. }
  88. enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
  89. {
  90. enum drbd_role role = R_UNKNOWN;
  91. struct drbd_conf *mdev;
  92. int vnr;
  93. rcu_read_lock();
  94. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  95. role = max_role(role, mdev->state.role);
  96. rcu_read_unlock();
  97. return role;
  98. }
  99. enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
  100. {
  101. enum drbd_role peer = R_UNKNOWN;
  102. struct drbd_conf *mdev;
  103. int vnr;
  104. rcu_read_lock();
  105. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  106. peer = max_role(peer, mdev->state.peer);
  107. rcu_read_unlock();
  108. return peer;
  109. }
  110. enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
  111. {
  112. enum drbd_disk_state ds = D_DISKLESS;
  113. struct drbd_conf *mdev;
  114. int vnr;
  115. rcu_read_lock();
  116. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  117. ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
  118. rcu_read_unlock();
  119. return ds;
  120. }
  121. enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
  122. {
  123. enum drbd_disk_state ds = D_MASK;
  124. struct drbd_conf *mdev;
  125. int vnr;
  126. rcu_read_lock();
  127. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  128. ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
  129. rcu_read_unlock();
  130. return ds;
  131. }
  132. enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
  133. {
  134. enum drbd_disk_state ds = D_DISKLESS;
  135. struct drbd_conf *mdev;
  136. int vnr;
  137. rcu_read_lock();
  138. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  139. ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
  140. rcu_read_unlock();
  141. return ds;
  142. }
  143. enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
  144. {
  145. enum drbd_conns conn = C_MASK;
  146. struct drbd_conf *mdev;
  147. int vnr;
  148. rcu_read_lock();
  149. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  150. conn = min_t(enum drbd_conns, conn, mdev->state.conn);
  151. rcu_read_unlock();
  152. return conn;
  153. }
  154. /**
  155. * cl_wide_st_chg() - true if the state change is a cluster wide one
  156. * @mdev: DRBD device.
  157. * @os: old (current) state.
  158. * @ns: new (wanted) state.
  159. */
  160. static int cl_wide_st_chg(struct drbd_conf *mdev,
  161. union drbd_state os, union drbd_state ns)
  162. {
  163. return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
  164. ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
  165. (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
  166. (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
  167. (os.disk != D_FAILED && ns.disk == D_FAILED))) ||
  168. (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
  169. (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) ||
  170. (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS);
  171. }
  172. static union drbd_state
  173. apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
  174. {
  175. union drbd_state ns;
  176. ns.i = (os.i & ~mask.i) | val.i;
  177. return ns;
  178. }
  179. enum drbd_state_rv
  180. drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
  181. union drbd_state mask, union drbd_state val)
  182. {
  183. unsigned long flags;
  184. union drbd_state ns;
  185. enum drbd_state_rv rv;
  186. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  187. ns = apply_mask_val(drbd_read_state(mdev), mask, val);
  188. rv = _drbd_set_state(mdev, ns, f, NULL);
  189. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  190. return rv;
  191. }
  192. /**
  193. * drbd_force_state() - Impose a change which happens outside our control on our state
  194. * @mdev: DRBD device.
  195. * @mask: mask of state bits to change.
  196. * @val: value of new state bits.
  197. */
  198. void drbd_force_state(struct drbd_conf *mdev,
  199. union drbd_state mask, union drbd_state val)
  200. {
  201. drbd_change_state(mdev, CS_HARD, mask, val);
  202. }
  203. static enum drbd_state_rv
  204. _req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
  205. union drbd_state val)
  206. {
  207. union drbd_state os, ns;
  208. unsigned long flags;
  209. enum drbd_state_rv rv;
  210. if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
  211. return SS_CW_SUCCESS;
  212. if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
  213. return SS_CW_FAILED_BY_PEER;
  214. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  215. os = drbd_read_state(mdev);
  216. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  217. rv = is_valid_transition(os, ns);
  218. if (rv == SS_SUCCESS)
  219. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  220. if (!cl_wide_st_chg(mdev, os, ns))
  221. rv = SS_CW_NO_NEED;
  222. if (rv == SS_UNKNOWN_ERROR) {
  223. rv = is_valid_state(mdev, ns);
  224. if (rv == SS_SUCCESS) {
  225. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  226. if (rv == SS_SUCCESS)
  227. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  228. }
  229. }
  230. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  231. return rv;
  232. }
  233. /**
  234. * drbd_req_state() - Perform an eventually cluster wide state change
  235. * @mdev: DRBD device.
  236. * @mask: mask of state bits to change.
  237. * @val: value of new state bits.
  238. * @f: flags
  239. *
  240. * Should not be called directly, use drbd_request_state() or
  241. * _drbd_request_state().
  242. */
  243. static enum drbd_state_rv
  244. drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
  245. union drbd_state val, enum chg_state_flags f)
  246. {
  247. struct completion done;
  248. unsigned long flags;
  249. union drbd_state os, ns;
  250. enum drbd_state_rv rv;
  251. init_completion(&done);
  252. if (f & CS_SERIALIZE)
  253. mutex_lock(mdev->state_mutex);
  254. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  255. os = drbd_read_state(mdev);
  256. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  257. rv = is_valid_transition(os, ns);
  258. if (rv < SS_SUCCESS) {
  259. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  260. goto abort;
  261. }
  262. if (cl_wide_st_chg(mdev, os, ns)) {
  263. rv = is_valid_state(mdev, ns);
  264. if (rv == SS_SUCCESS)
  265. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  266. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  267. if (rv < SS_SUCCESS) {
  268. if (f & CS_VERBOSE)
  269. print_st_err(mdev, os, ns, rv);
  270. goto abort;
  271. }
  272. if (drbd_send_state_req(mdev, mask, val)) {
  273. rv = SS_CW_FAILED_BY_PEER;
  274. if (f & CS_VERBOSE)
  275. print_st_err(mdev, os, ns, rv);
  276. goto abort;
  277. }
  278. wait_event(mdev->state_wait,
  279. (rv = _req_st_cond(mdev, mask, val)));
  280. if (rv < SS_SUCCESS) {
  281. if (f & CS_VERBOSE)
  282. print_st_err(mdev, os, ns, rv);
  283. goto abort;
  284. }
  285. spin_lock_irqsave(&mdev->tconn->req_lock, flags);
  286. ns = apply_mask_val(drbd_read_state(mdev), mask, val);
  287. rv = _drbd_set_state(mdev, ns, f, &done);
  288. } else {
  289. rv = _drbd_set_state(mdev, ns, f, &done);
  290. }
  291. spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
  292. if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
  293. D_ASSERT(current != mdev->tconn->worker.task);
  294. wait_for_completion(&done);
  295. }
  296. abort:
  297. if (f & CS_SERIALIZE)
  298. mutex_unlock(mdev->state_mutex);
  299. return rv;
  300. }
  301. /**
  302. * _drbd_request_state() - Request a state change (with flags)
  303. * @mdev: DRBD device.
  304. * @mask: mask of state bits to change.
  305. * @val: value of new state bits.
  306. * @f: flags
  307. *
  308. * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
  309. * flag, or when logging of failed state change requests is not desired.
  310. */
  311. enum drbd_state_rv
  312. _drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
  313. union drbd_state val, enum chg_state_flags f)
  314. {
  315. enum drbd_state_rv rv;
  316. wait_event(mdev->state_wait,
  317. (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
  318. return rv;
  319. }
  320. static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
  321. {
  322. dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
  323. name,
  324. drbd_conn_str(ns.conn),
  325. drbd_role_str(ns.role),
  326. drbd_role_str(ns.peer),
  327. drbd_disk_str(ns.disk),
  328. drbd_disk_str(ns.pdsk),
  329. is_susp(ns) ? 's' : 'r',
  330. ns.aftr_isp ? 'a' : '-',
  331. ns.peer_isp ? 'p' : '-',
  332. ns.user_isp ? 'u' : '-',
  333. ns.susp_fen ? 'F' : '-',
  334. ns.susp_nod ? 'N' : '-'
  335. );
  336. }
  337. void print_st_err(struct drbd_conf *mdev, union drbd_state os,
  338. union drbd_state ns, enum drbd_state_rv err)
  339. {
  340. if (err == SS_IN_TRANSIENT_STATE)
  341. return;
  342. dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
  343. print_st(mdev, " state", os);
  344. print_st(mdev, "wanted", ns);
  345. }
  346. static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
  347. enum chg_state_flags flags)
  348. {
  349. char *pbp;
  350. pbp = pb;
  351. *pbp = 0;
  352. if (ns.role != os.role && flags & CS_DC_ROLE)
  353. pbp += sprintf(pbp, "role( %s -> %s ) ",
  354. drbd_role_str(os.role),
  355. drbd_role_str(ns.role));
  356. if (ns.peer != os.peer && flags & CS_DC_PEER)
  357. pbp += sprintf(pbp, "peer( %s -> %s ) ",
  358. drbd_role_str(os.peer),
  359. drbd_role_str(ns.peer));
  360. if (ns.conn != os.conn && flags & CS_DC_CONN)
  361. pbp += sprintf(pbp, "conn( %s -> %s ) ",
  362. drbd_conn_str(os.conn),
  363. drbd_conn_str(ns.conn));
  364. if (ns.disk != os.disk && flags & CS_DC_DISK)
  365. pbp += sprintf(pbp, "disk( %s -> %s ) ",
  366. drbd_disk_str(os.disk),
  367. drbd_disk_str(ns.disk));
  368. if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
  369. pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
  370. drbd_disk_str(os.pdsk),
  371. drbd_disk_str(ns.pdsk));
  372. return pbp - pb;
  373. }
  374. static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
  375. enum chg_state_flags flags)
  376. {
  377. char pb[300];
  378. char *pbp = pb;
  379. pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
  380. if (ns.aftr_isp != os.aftr_isp)
  381. pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
  382. os.aftr_isp,
  383. ns.aftr_isp);
  384. if (ns.peer_isp != os.peer_isp)
  385. pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
  386. os.peer_isp,
  387. ns.peer_isp);
  388. if (ns.user_isp != os.user_isp)
  389. pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
  390. os.user_isp,
  391. ns.user_isp);
  392. if (pbp != pb)
  393. dev_info(DEV, "%s\n", pb);
  394. }
  395. static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
  396. enum chg_state_flags flags)
  397. {
  398. char pb[300];
  399. char *pbp = pb;
  400. pbp += print_state_change(pbp, os, ns, flags);
  401. if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
  402. pbp += sprintf(pbp, "susp( %d -> %d ) ",
  403. is_susp(os),
  404. is_susp(ns));
  405. if (pbp != pb)
  406. conn_info(tconn, "%s\n", pb);
  407. }
  408. /**
  409. * is_valid_state() - Returns an SS_ error code if ns is not valid
  410. * @mdev: DRBD device.
  411. * @ns: State to consider.
  412. */
  413. static enum drbd_state_rv
  414. is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
  415. {
  416. /* See drbd_state_sw_errors in drbd_strings.c */
  417. enum drbd_fencing_p fp;
  418. enum drbd_state_rv rv = SS_SUCCESS;
  419. struct net_conf *nc;
  420. rcu_read_lock();
  421. fp = FP_DONT_CARE;
  422. if (get_ldev(mdev)) {
  423. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  424. put_ldev(mdev);
  425. }
  426. nc = rcu_dereference(mdev->tconn->net_conf);
  427. if (nc) {
  428. if (!nc->two_primaries && ns.role == R_PRIMARY) {
  429. if (ns.peer == R_PRIMARY)
  430. rv = SS_TWO_PRIMARIES;
  431. else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
  432. rv = SS_O_VOL_PEER_PRI;
  433. }
  434. }
  435. if (rv <= 0)
  436. /* already found a reason to abort */;
  437. else if (ns.role == R_SECONDARY && mdev->open_cnt)
  438. rv = SS_DEVICE_IN_USE;
  439. else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
  440. rv = SS_NO_UP_TO_DATE_DISK;
  441. else if (fp >= FP_RESOURCE &&
  442. ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
  443. rv = SS_PRIMARY_NOP;
  444. else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
  445. rv = SS_NO_UP_TO_DATE_DISK;
  446. else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
  447. rv = SS_NO_LOCAL_DISK;
  448. else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
  449. rv = SS_NO_REMOTE_DISK;
  450. else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
  451. rv = SS_NO_UP_TO_DATE_DISK;
  452. else if ((ns.conn == C_CONNECTED ||
  453. ns.conn == C_WF_BITMAP_S ||
  454. ns.conn == C_SYNC_SOURCE ||
  455. ns.conn == C_PAUSED_SYNC_S) &&
  456. ns.disk == D_OUTDATED)
  457. rv = SS_CONNECTED_OUTDATES;
  458. else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  459. (nc->verify_alg[0] == 0))
  460. rv = SS_NO_VERIFY_ALG;
  461. else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  462. mdev->tconn->agreed_pro_version < 88)
  463. rv = SS_NOT_SUPPORTED;
  464. else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
  465. rv = SS_CONNECTED_OUTDATES;
  466. rcu_read_unlock();
  467. return rv;
  468. }
  469. /**
  470. * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
  471. * This function limits state transitions that may be declined by DRBD. I.e.
  472. * user requests (aka soft transitions).
  473. * @mdev: DRBD device.
  474. * @ns: new state.
  475. * @os: old state.
  476. */
  477. static enum drbd_state_rv
  478. is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn)
  479. {
  480. enum drbd_state_rv rv = SS_SUCCESS;
  481. if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
  482. os.conn > C_CONNECTED)
  483. rv = SS_RESYNC_RUNNING;
  484. if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
  485. rv = SS_ALREADY_STANDALONE;
  486. if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
  487. rv = SS_IS_DISKLESS;
  488. if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
  489. rv = SS_NO_NET_CONFIG;
  490. if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
  491. rv = SS_LOWER_THAN_OUTDATED;
  492. if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
  493. rv = SS_IN_TRANSIENT_STATE;
  494. /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
  495. rv = SS_IN_TRANSIENT_STATE; */
  496. /* While establishing a connection only allow cstate to change.
  497. Delay/refuse role changes, detach attach etc... */
  498. if (test_bit(STATE_SENT, &tconn->flags) &&
  499. !(os.conn == C_WF_REPORT_PARAMS ||
  500. (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION)))
  501. rv = SS_IN_TRANSIENT_STATE;
  502. if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
  503. rv = SS_NEED_CONNECTION;
  504. if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
  505. ns.conn != os.conn && os.conn > C_CONNECTED)
  506. rv = SS_RESYNC_RUNNING;
  507. if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
  508. os.conn < C_CONNECTED)
  509. rv = SS_NEED_CONNECTION;
  510. if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
  511. && os.conn < C_WF_REPORT_PARAMS)
  512. rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
  513. return rv;
  514. }
  515. static enum drbd_state_rv
  516. is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
  517. {
  518. /* no change -> nothing to do, at least for the connection part */
  519. if (oc == nc)
  520. return SS_NOTHING_TO_DO;
  521. /* disconnect of an unconfigured connection does not make sense */
  522. if (oc == C_STANDALONE && nc == C_DISCONNECTING)
  523. return SS_ALREADY_STANDALONE;
  524. /* from C_STANDALONE, we start with C_UNCONNECTED */
  525. if (oc == C_STANDALONE && nc != C_UNCONNECTED)
  526. return SS_NEED_CONNECTION;
  527. /* When establishing a connection we need to go through WF_REPORT_PARAMS!
  528. Necessary to do the right thing upon invalidate-remote on a disconnected resource */
  529. if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED)
  530. return SS_NEED_CONNECTION;
  531. /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
  532. if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
  533. return SS_IN_TRANSIENT_STATE;
  534. /* After C_DISCONNECTING only C_STANDALONE may follow */
  535. if (oc == C_DISCONNECTING && nc != C_STANDALONE)
  536. return SS_IN_TRANSIENT_STATE;
  537. return SS_SUCCESS;
  538. }
  539. /**
  540. * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
  541. * This limits hard state transitions. Hard state transitions are facts there are
  542. * imposed on DRBD by the environment. E.g. disk broke or network broke down.
  543. * But those hard state transitions are still not allowed to do everything.
  544. * @ns: new state.
  545. * @os: old state.
  546. */
  547. static enum drbd_state_rv
  548. is_valid_transition(union drbd_state os, union drbd_state ns)
  549. {
  550. enum drbd_state_rv rv;
  551. rv = is_valid_conn_transition(os.conn, ns.conn);
  552. /* we cannot fail (again) if we already detached */
  553. if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
  554. rv = SS_IS_DISKLESS;
  555. return rv;
  556. }
  557. static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
  558. {
  559. static const char *msg_table[] = {
  560. [NO_WARNING] = "",
  561. [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
  562. [ABORTED_RESYNC] = "Resync aborted.",
  563. [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
  564. [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
  565. [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
  566. };
  567. if (warn != NO_WARNING)
  568. dev_warn(DEV, "%s\n", msg_table[warn]);
  569. }
  570. /**
  571. * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
  572. * @mdev: DRBD device.
  573. * @os: old state.
  574. * @ns: new state.
  575. * @warn_sync_abort:
  576. *
  577. * When we loose connection, we have to set the state of the peers disk (pdsk)
  578. * to D_UNKNOWN. This rule and many more along those lines are in this function.
  579. */
  580. static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
  581. enum sanitize_state_warnings *warn)
  582. {
  583. enum drbd_fencing_p fp;
  584. enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
  585. if (warn)
  586. *warn = NO_WARNING;
  587. fp = FP_DONT_CARE;
  588. if (get_ldev(mdev)) {
  589. rcu_read_lock();
  590. fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
  591. rcu_read_unlock();
  592. put_ldev(mdev);
  593. }
  594. /* Implications from connection to peer and peer_isp */
  595. if (ns.conn < C_CONNECTED) {
  596. ns.peer_isp = 0;
  597. ns.peer = R_UNKNOWN;
  598. if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
  599. ns.pdsk = D_UNKNOWN;
  600. }
  601. /* Clear the aftr_isp when becoming unconfigured */
  602. if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
  603. ns.aftr_isp = 0;
  604. /* An implication of the disk states onto the connection state */
  605. /* Abort resync if a disk fails/detaches */
  606. if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
  607. if (warn)
  608. *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
  609. ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
  610. ns.conn = C_CONNECTED;
  611. }
  612. /* Connection breaks down before we finished "Negotiating" */
  613. if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
  614. get_ldev_if_state(mdev, D_NEGOTIATING)) {
  615. if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
  616. ns.disk = mdev->new_state_tmp.disk;
  617. ns.pdsk = mdev->new_state_tmp.pdsk;
  618. } else {
  619. if (warn)
  620. *warn = CONNECTION_LOST_NEGOTIATING;
  621. ns.disk = D_DISKLESS;
  622. ns.pdsk = D_UNKNOWN;
  623. }
  624. put_ldev(mdev);
  625. }
  626. /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
  627. if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
  628. if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
  629. ns.disk = D_UP_TO_DATE;
  630. if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
  631. ns.pdsk = D_UP_TO_DATE;
  632. }
  633. /* Implications of the connection stat on the disk states */
  634. disk_min = D_DISKLESS;
  635. disk_max = D_UP_TO_DATE;
  636. pdsk_min = D_INCONSISTENT;
  637. pdsk_max = D_UNKNOWN;
  638. switch ((enum drbd_conns)ns.conn) {
  639. case C_WF_BITMAP_T:
  640. case C_PAUSED_SYNC_T:
  641. case C_STARTING_SYNC_T:
  642. case C_WF_SYNC_UUID:
  643. case C_BEHIND:
  644. disk_min = D_INCONSISTENT;
  645. disk_max = D_OUTDATED;
  646. pdsk_min = D_UP_TO_DATE;
  647. pdsk_max = D_UP_TO_DATE;
  648. break;
  649. case C_VERIFY_S:
  650. case C_VERIFY_T:
  651. disk_min = D_UP_TO_DATE;
  652. disk_max = D_UP_TO_DATE;
  653. pdsk_min = D_UP_TO_DATE;
  654. pdsk_max = D_UP_TO_DATE;
  655. break;
  656. case C_CONNECTED:
  657. disk_min = D_DISKLESS;
  658. disk_max = D_UP_TO_DATE;
  659. pdsk_min = D_DISKLESS;
  660. pdsk_max = D_UP_TO_DATE;
  661. break;
  662. case C_WF_BITMAP_S:
  663. case C_PAUSED_SYNC_S:
  664. case C_STARTING_SYNC_S:
  665. case C_AHEAD:
  666. disk_min = D_UP_TO_DATE;
  667. disk_max = D_UP_TO_DATE;
  668. pdsk_min = D_INCONSISTENT;
  669. pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
  670. break;
  671. case C_SYNC_TARGET:
  672. disk_min = D_INCONSISTENT;
  673. disk_max = D_INCONSISTENT;
  674. pdsk_min = D_UP_TO_DATE;
  675. pdsk_max = D_UP_TO_DATE;
  676. break;
  677. case C_SYNC_SOURCE:
  678. disk_min = D_UP_TO_DATE;
  679. disk_max = D_UP_TO_DATE;
  680. pdsk_min = D_INCONSISTENT;
  681. pdsk_max = D_INCONSISTENT;
  682. break;
  683. case C_STANDALONE:
  684. case C_DISCONNECTING:
  685. case C_UNCONNECTED:
  686. case C_TIMEOUT:
  687. case C_BROKEN_PIPE:
  688. case C_NETWORK_FAILURE:
  689. case C_PROTOCOL_ERROR:
  690. case C_TEAR_DOWN:
  691. case C_WF_CONNECTION:
  692. case C_WF_REPORT_PARAMS:
  693. case C_MASK:
  694. break;
  695. }
  696. if (ns.disk > disk_max)
  697. ns.disk = disk_max;
  698. if (ns.disk < disk_min) {
  699. if (warn)
  700. *warn = IMPLICITLY_UPGRADED_DISK;
  701. ns.disk = disk_min;
  702. }
  703. if (ns.pdsk > pdsk_max)
  704. ns.pdsk = pdsk_max;
  705. if (ns.pdsk < pdsk_min) {
  706. if (warn)
  707. *warn = IMPLICITLY_UPGRADED_PDSK;
  708. ns.pdsk = pdsk_min;
  709. }
  710. if (fp == FP_STONITH &&
  711. (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
  712. ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
  713. if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
  714. (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
  715. ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
  716. if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
  717. if (ns.conn == C_SYNC_SOURCE)
  718. ns.conn = C_PAUSED_SYNC_S;
  719. if (ns.conn == C_SYNC_TARGET)
  720. ns.conn = C_PAUSED_SYNC_T;
  721. } else {
  722. if (ns.conn == C_PAUSED_SYNC_S)
  723. ns.conn = C_SYNC_SOURCE;
  724. if (ns.conn == C_PAUSED_SYNC_T)
  725. ns.conn = C_SYNC_TARGET;
  726. }
  727. return ns;
  728. }
  729. void drbd_resume_al(struct drbd_conf *mdev)
  730. {
  731. if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
  732. dev_info(DEV, "Resumed AL updates\n");
  733. }
  734. /* helper for __drbd_set_state */
  735. static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
  736. {
  737. if (mdev->tconn->agreed_pro_version < 90)
  738. mdev->ov_start_sector = 0;
  739. mdev->rs_total = drbd_bm_bits(mdev);
  740. mdev->ov_position = 0;
  741. if (cs == C_VERIFY_T) {
  742. /* starting online verify from an arbitrary position
  743. * does not fit well into the existing protocol.
  744. * on C_VERIFY_T, we initialize ov_left and friends
  745. * implicitly in receive_DataRequest once the
  746. * first P_OV_REQUEST is received */
  747. mdev->ov_start_sector = ~(sector_t)0;
  748. } else {
  749. unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
  750. if (bit >= mdev->rs_total) {
  751. mdev->ov_start_sector =
  752. BM_BIT_TO_SECT(mdev->rs_total - 1);
  753. mdev->rs_total = 1;
  754. } else
  755. mdev->rs_total -= bit;
  756. mdev->ov_position = mdev->ov_start_sector;
  757. }
  758. mdev->ov_left = mdev->rs_total;
  759. }
  760. /**
  761. * __drbd_set_state() - Set a new DRBD state
  762. * @mdev: DRBD device.
  763. * @ns: new state.
  764. * @flags: Flags
  765. * @done: Optional completion, that will get completed after the after_state_ch() finished
  766. *
  767. * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
  768. */
  769. enum drbd_state_rv
  770. __drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
  771. enum chg_state_flags flags, struct completion *done)
  772. {
  773. union drbd_state os;
  774. enum drbd_state_rv rv = SS_SUCCESS;
  775. enum sanitize_state_warnings ssw;
  776. struct after_state_chg_work *ascw;
  777. os = drbd_read_state(mdev);
  778. ns = sanitize_state(mdev, ns, &ssw);
  779. if (ns.i == os.i)
  780. return SS_NOTHING_TO_DO;
  781. rv = is_valid_transition(os, ns);
  782. if (rv < SS_SUCCESS)
  783. return rv;
  784. if (!(flags & CS_HARD)) {
  785. /* pre-state-change checks ; only look at ns */
  786. /* See drbd_state_sw_errors in drbd_strings.c */
  787. rv = is_valid_state(mdev, ns);
  788. if (rv < SS_SUCCESS) {
  789. /* If the old state was illegal as well, then let
  790. this happen...*/
  791. if (is_valid_state(mdev, os) == rv)
  792. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  793. } else
  794. rv = is_valid_soft_transition(os, ns, mdev->tconn);
  795. }
  796. if (rv < SS_SUCCESS) {
  797. if (flags & CS_VERBOSE)
  798. print_st_err(mdev, os, ns, rv);
  799. return rv;
  800. }
  801. print_sanitize_warnings(mdev, ssw);
  802. drbd_pr_state_change(mdev, os, ns, flags);
  803. /* Display changes to the susp* flags that where caused by the call to
  804. sanitize_state(). Only display it here if we where not called from
  805. _conn_request_state() */
  806. if (!(flags & CS_DC_SUSP))
  807. conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
  808. /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
  809. * on the ldev here, to be sure the transition -> D_DISKLESS resp.
  810. * drbd_ldev_destroy() won't happen before our corresponding
  811. * after_state_ch works run, where we put_ldev again. */
  812. if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
  813. (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
  814. atomic_inc(&mdev->local_cnt);
  815. mdev->state.i = ns.i;
  816. mdev->tconn->susp = ns.susp;
  817. mdev->tconn->susp_nod = ns.susp_nod;
  818. mdev->tconn->susp_fen = ns.susp_fen;
  819. if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
  820. drbd_print_uuids(mdev, "attached to UUIDs");
  821. wake_up(&mdev->misc_wait);
  822. wake_up(&mdev->state_wait);
  823. wake_up(&mdev->tconn->ping_wait);
  824. /* Aborted verify run, or we reached the stop sector.
  825. * Log the last position, unless end-of-device. */
  826. if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
  827. ns.conn <= C_CONNECTED) {
  828. mdev->ov_start_sector =
  829. BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
  830. if (mdev->ov_left)
  831. dev_info(DEV, "Online Verify reached sector %llu\n",
  832. (unsigned long long)mdev->ov_start_sector);
  833. }
  834. if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
  835. (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
  836. dev_info(DEV, "Syncer continues.\n");
  837. mdev->rs_paused += (long)jiffies
  838. -(long)mdev->rs_mark_time[mdev->rs_last_mark];
  839. if (ns.conn == C_SYNC_TARGET)
  840. mod_timer(&mdev->resync_timer, jiffies);
  841. }
  842. if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
  843. (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
  844. dev_info(DEV, "Resync suspended\n");
  845. mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
  846. }
  847. if (os.conn == C_CONNECTED &&
  848. (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
  849. unsigned long now = jiffies;
  850. int i;
  851. set_ov_position(mdev, ns.conn);
  852. mdev->rs_start = now;
  853. mdev->rs_last_events = 0;
  854. mdev->rs_last_sect_ev = 0;
  855. mdev->ov_last_oos_size = 0;
  856. mdev->ov_last_oos_start = 0;
  857. for (i = 0; i < DRBD_SYNC_MARKS; i++) {
  858. mdev->rs_mark_left[i] = mdev->ov_left;
  859. mdev->rs_mark_time[i] = now;
  860. }
  861. drbd_rs_controller_reset(mdev);
  862. if (ns.conn == C_VERIFY_S) {
  863. dev_info(DEV, "Starting Online Verify from sector %llu\n",
  864. (unsigned long long)mdev->ov_position);
  865. mod_timer(&mdev->resync_timer, jiffies);
  866. }
  867. }
  868. if (get_ldev(mdev)) {
  869. u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
  870. MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
  871. MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
  872. mdf &= ~MDF_AL_CLEAN;
  873. if (test_bit(CRASHED_PRIMARY, &mdev->flags))
  874. mdf |= MDF_CRASHED_PRIMARY;
  875. if (mdev->state.role == R_PRIMARY ||
  876. (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
  877. mdf |= MDF_PRIMARY_IND;
  878. if (mdev->state.conn > C_WF_REPORT_PARAMS)
  879. mdf |= MDF_CONNECTED_IND;
  880. if (mdev->state.disk > D_INCONSISTENT)
  881. mdf |= MDF_CONSISTENT;
  882. if (mdev->state.disk > D_OUTDATED)
  883. mdf |= MDF_WAS_UP_TO_DATE;
  884. if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
  885. mdf |= MDF_PEER_OUT_DATED;
  886. if (mdf != mdev->ldev->md.flags) {
  887. mdev->ldev->md.flags = mdf;
  888. drbd_md_mark_dirty(mdev);
  889. }
  890. if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
  891. drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
  892. put_ldev(mdev);
  893. }
  894. /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
  895. if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
  896. os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
  897. set_bit(CONSIDER_RESYNC, &mdev->flags);
  898. /* Receiver should clean up itself */
  899. if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
  900. drbd_thread_stop_nowait(&mdev->tconn->receiver);
  901. /* Now the receiver finished cleaning up itself, it should die */
  902. if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
  903. drbd_thread_stop_nowait(&mdev->tconn->receiver);
  904. /* Upon network failure, we need to restart the receiver. */
  905. if (os.conn > C_WF_CONNECTION &&
  906. ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
  907. drbd_thread_restart_nowait(&mdev->tconn->receiver);
  908. /* Resume AL writing if we get a connection */
  909. if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED)
  910. drbd_resume_al(mdev);
  911. /* remember last attach time so request_timer_fn() won't
  912. * kill newly established sessions while we are still trying to thaw
  913. * previously frozen IO */
  914. if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
  915. ns.disk > D_NEGOTIATING)
  916. mdev->last_reattach_jif = jiffies;
  917. ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
  918. if (ascw) {
  919. ascw->os = os;
  920. ascw->ns = ns;
  921. ascw->flags = flags;
  922. ascw->w.cb = w_after_state_ch;
  923. ascw->w.mdev = mdev;
  924. ascw->done = done;
  925. drbd_queue_work(&mdev->tconn->sender_work, &ascw->w);
  926. } else {
  927. dev_err(DEV, "Could not kmalloc an ascw\n");
  928. }
  929. return rv;
  930. }
  931. static int w_after_state_ch(struct drbd_work *w, int unused)
  932. {
  933. struct after_state_chg_work *ascw =
  934. container_of(w, struct after_state_chg_work, w);
  935. struct drbd_conf *mdev = w->mdev;
  936. after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
  937. if (ascw->flags & CS_WAIT_COMPLETE) {
  938. D_ASSERT(ascw->done != NULL);
  939. complete(ascw->done);
  940. }
  941. kfree(ascw);
  942. return 0;
  943. }
  944. static void abw_start_sync(struct drbd_conf *mdev, int rv)
  945. {
  946. if (rv) {
  947. dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
  948. _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
  949. return;
  950. }
  951. switch (mdev->state.conn) {
  952. case C_STARTING_SYNC_T:
  953. _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
  954. break;
  955. case C_STARTING_SYNC_S:
  956. drbd_start_resync(mdev, C_SYNC_SOURCE);
  957. break;
  958. }
  959. }
  960. int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
  961. int (*io_fn)(struct drbd_conf *),
  962. char *why, enum bm_flag flags)
  963. {
  964. int rv;
  965. D_ASSERT(current == mdev->tconn->worker.task);
  966. /* open coded non-blocking drbd_suspend_io(mdev); */
  967. set_bit(SUSPEND_IO, &mdev->flags);
  968. drbd_bm_lock(mdev, why, flags);
  969. rv = io_fn(mdev);
  970. drbd_bm_unlock(mdev);
  971. drbd_resume_io(mdev);
  972. return rv;
  973. }
  974. /**
  975. * after_state_ch() - Perform after state change actions that may sleep
  976. * @mdev: DRBD device.
  977. * @os: old state.
  978. * @ns: new state.
  979. * @flags: Flags
  980. */
  981. static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
  982. union drbd_state ns, enum chg_state_flags flags)
  983. {
  984. struct sib_info sib;
  985. sib.sib_reason = SIB_STATE_CHANGE;
  986. sib.os = os;
  987. sib.ns = ns;
  988. if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
  989. clear_bit(CRASHED_PRIMARY, &mdev->flags);
  990. if (mdev->p_uuid)
  991. mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
  992. }
  993. /* Inform userspace about the change... */
  994. drbd_bcast_event(mdev, &sib);
  995. if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
  996. (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
  997. drbd_khelper(mdev, "pri-on-incon-degr");
  998. /* Here we have the actions that are performed after a
  999. state change. This function might sleep */
  1000. if (ns.susp_nod) {
  1001. enum drbd_req_event what = NOTHING;
  1002. if (os.conn < C_CONNECTED && conn_lowest_conn(mdev->tconn) >= C_CONNECTED)
  1003. what = RESEND;
  1004. if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
  1005. conn_lowest_disk(mdev->tconn) > D_NEGOTIATING)
  1006. what = RESTART_FROZEN_DISK_IO;
  1007. if (what != NOTHING) {
  1008. spin_lock_irq(&mdev->tconn->req_lock);
  1009. _tl_restart(mdev->tconn, what);
  1010. _drbd_set_state(_NS(mdev, susp_nod, 0), CS_VERBOSE, NULL);
  1011. spin_unlock_irq(&mdev->tconn->req_lock);
  1012. }
  1013. }
  1014. /* Became sync source. With protocol >= 96, we still need to send out
  1015. * the sync uuid now. Need to do that before any drbd_send_state, or
  1016. * the other side may go "paused sync" before receiving the sync uuids,
  1017. * which is unexpected. */
  1018. if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
  1019. (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
  1020. mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
  1021. drbd_gen_and_send_sync_uuid(mdev);
  1022. put_ldev(mdev);
  1023. }
  1024. /* Do not change the order of the if above and the two below... */
  1025. if (os.pdsk == D_DISKLESS &&
  1026. ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */
  1027. /* we probably will start a resync soon.
  1028. * make sure those things are properly reset. */
  1029. mdev->rs_total = 0;
  1030. mdev->rs_failed = 0;
  1031. atomic_set(&mdev->rs_pending_cnt, 0);
  1032. drbd_rs_cancel_all(mdev);
  1033. drbd_send_uuids(mdev);
  1034. drbd_send_state(mdev, ns);
  1035. }
  1036. /* No point in queuing send_bitmap if we don't have a connection
  1037. * anymore, so check also the _current_ state, not only the new state
  1038. * at the time this work was queued. */
  1039. if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
  1040. mdev->state.conn == C_WF_BITMAP_S)
  1041. drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
  1042. "send_bitmap (WFBitMapS)",
  1043. BM_LOCKED_TEST_ALLOWED);
  1044. /* Lost contact to peer's copy of the data */
  1045. if ((os.pdsk >= D_INCONSISTENT &&
  1046. os.pdsk != D_UNKNOWN &&
  1047. os.pdsk != D_OUTDATED)
  1048. && (ns.pdsk < D_INCONSISTENT ||
  1049. ns.pdsk == D_UNKNOWN ||
  1050. ns.pdsk == D_OUTDATED)) {
  1051. if (get_ldev(mdev)) {
  1052. if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
  1053. mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
  1054. if (drbd_suspended(mdev)) {
  1055. set_bit(NEW_CUR_UUID, &mdev->flags);
  1056. } else {
  1057. drbd_uuid_new_current(mdev);
  1058. drbd_send_uuids(mdev);
  1059. }
  1060. }
  1061. put_ldev(mdev);
  1062. }
  1063. }
  1064. if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
  1065. if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY &&
  1066. mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
  1067. drbd_uuid_new_current(mdev);
  1068. drbd_send_uuids(mdev);
  1069. }
  1070. /* D_DISKLESS Peer becomes secondary */
  1071. if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
  1072. /* We may still be Primary ourselves.
  1073. * No harm done if the bitmap still changes,
  1074. * redirtied pages will follow later. */
  1075. drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
  1076. "demote diskless peer", BM_LOCKED_SET_ALLOWED);
  1077. put_ldev(mdev);
  1078. }
  1079. /* Write out all changed bits on demote.
  1080. * Though, no need to da that just yet
  1081. * if there is a resync going on still */
  1082. if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
  1083. mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
  1084. /* No changes to the bitmap expected this time, so assert that,
  1085. * even though no harm was done if it did change. */
  1086. drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
  1087. "demote", BM_LOCKED_TEST_ALLOWED);
  1088. put_ldev(mdev);
  1089. }
  1090. /* Last part of the attaching process ... */
  1091. if (ns.conn >= C_CONNECTED &&
  1092. os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
  1093. drbd_send_sizes(mdev, 0, 0); /* to start sync... */
  1094. drbd_send_uuids(mdev);
  1095. drbd_send_state(mdev, ns);
  1096. }
  1097. /* We want to pause/continue resync, tell peer. */
  1098. if (ns.conn >= C_CONNECTED &&
  1099. ((os.aftr_isp != ns.aftr_isp) ||
  1100. (os.user_isp != ns.user_isp)))
  1101. drbd_send_state(mdev, ns);
  1102. /* In case one of the isp bits got set, suspend other devices. */
  1103. if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
  1104. (ns.aftr_isp || ns.peer_isp || ns.user_isp))
  1105. suspend_other_sg(mdev);
  1106. /* Make sure the peer gets informed about eventual state
  1107. changes (ISP bits) while we were in WFReportParams. */
  1108. if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
  1109. drbd_send_state(mdev, ns);
  1110. if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
  1111. drbd_send_state(mdev, ns);
  1112. /* We are in the progress to start a full sync... */
  1113. if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
  1114. (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
  1115. /* no other bitmap changes expected during this phase */
  1116. drbd_queue_bitmap_io(mdev,
  1117. &drbd_bmio_set_n_write, &abw_start_sync,
  1118. "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
  1119. /* We are invalidating our self... */
  1120. if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED &&
  1121. os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT)
  1122. /* other bitmap operation expected during this phase */
  1123. drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL,
  1124. "set_n_write from invalidate", BM_LOCKED_MASK);
  1125. /* first half of local IO error, failure to attach,
  1126. * or administrative detach */
  1127. if (os.disk != D_FAILED && ns.disk == D_FAILED) {
  1128. enum drbd_io_error_p eh = EP_PASS_ON;
  1129. int was_io_error = 0;
  1130. /* corresponding get_ldev was in __drbd_set_state, to serialize
  1131. * our cleanup here with the transition to D_DISKLESS.
  1132. * But is is still not save to dreference ldev here, since
  1133. * we might come from an failed Attach before ldev was set. */
  1134. if (mdev->ldev) {
  1135. rcu_read_lock();
  1136. eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
  1137. rcu_read_unlock();
  1138. was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
  1139. if (was_io_error && eh == EP_CALL_HELPER)
  1140. drbd_khelper(mdev, "local-io-error");
  1141. /* Immediately allow completion of all application IO,
  1142. * that waits for completion from the local disk,
  1143. * if this was a force-detach due to disk_timeout
  1144. * or administrator request (drbdsetup detach --force).
  1145. * Do NOT abort otherwise.
  1146. * Aborting local requests may cause serious problems,
  1147. * if requests are completed to upper layers already,
  1148. * and then later the already submitted local bio completes.
  1149. * This can cause DMA into former bio pages that meanwhile
  1150. * have been re-used for other things.
  1151. * So aborting local requests may cause crashes,
  1152. * or even worse, silent data corruption.
  1153. */
  1154. if (test_and_clear_bit(FORCE_DETACH, &mdev->flags))
  1155. tl_abort_disk_io(mdev);
  1156. /* current state still has to be D_FAILED,
  1157. * there is only one way out: to D_DISKLESS,
  1158. * and that may only happen after our put_ldev below. */
  1159. if (mdev->state.disk != D_FAILED)
  1160. dev_err(DEV,
  1161. "ASSERT FAILED: disk is %s during detach\n",
  1162. drbd_disk_str(mdev->state.disk));
  1163. if (ns.conn >= C_CONNECTED)
  1164. drbd_send_state(mdev, ns);
  1165. drbd_rs_cancel_all(mdev);
  1166. /* In case we want to get something to stable storage still,
  1167. * this may be the last chance.
  1168. * Following put_ldev may transition to D_DISKLESS. */
  1169. drbd_md_sync(mdev);
  1170. }
  1171. put_ldev(mdev);
  1172. }
  1173. /* second half of local IO error, failure to attach,
  1174. * or administrative detach,
  1175. * after local_cnt references have reached zero again */
  1176. if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
  1177. /* We must still be diskless,
  1178. * re-attach has to be serialized with this! */
  1179. if (mdev->state.disk != D_DISKLESS)
  1180. dev_err(DEV,
  1181. "ASSERT FAILED: disk is %s while going diskless\n",
  1182. drbd_disk_str(mdev->state.disk));
  1183. if (ns.conn >= C_CONNECTED)
  1184. drbd_send_state(mdev, ns);
  1185. /* corresponding get_ldev in __drbd_set_state
  1186. * this may finally trigger drbd_ldev_destroy. */
  1187. put_ldev(mdev);
  1188. }
  1189. /* Notify peer that I had a local IO error, and did not detached.. */
  1190. if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED)
  1191. drbd_send_state(mdev, ns);
  1192. /* Disks got bigger while they were detached */
  1193. if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
  1194. test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
  1195. if (ns.conn == C_CONNECTED)
  1196. resync_after_online_grow(mdev);
  1197. }
  1198. /* A resync finished or aborted, wake paused devices... */
  1199. if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
  1200. (os.peer_isp && !ns.peer_isp) ||
  1201. (os.user_isp && !ns.user_isp))
  1202. resume_next_sg(mdev);
  1203. /* sync target done with resync. Explicitly notify peer, even though
  1204. * it should (at least for non-empty resyncs) already know itself. */
  1205. if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
  1206. drbd_send_state(mdev, ns);
  1207. /* Verify finished, or reached stop sector. Peer did not know about
  1208. * the stop sector, and we may even have changed the stop sector during
  1209. * verify to interrupt/stop early. Send the new state. */
  1210. if (os.conn == C_VERIFY_S && ns.conn == C_CONNECTED
  1211. && verify_can_do_stop_sector(mdev))
  1212. drbd_send_state(mdev, ns);
  1213. /* Wake up role changes, that were delayed because of connection establishing */
  1214. if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS) {
  1215. if (test_and_clear_bit(STATE_SENT, &mdev->tconn->flags))
  1216. wake_up(&mdev->state_wait);
  1217. }
  1218. /* This triggers bitmap writeout of potentially still unwritten pages
  1219. * if the resync finished cleanly, or aborted because of peer disk
  1220. * failure, or because of connection loss.
  1221. * For resync aborted because of local disk failure, we cannot do
  1222. * any bitmap writeout anymore.
  1223. * No harm done if some bits change during this phase.
  1224. */
  1225. if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
  1226. drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL,
  1227. "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED);
  1228. put_ldev(mdev);
  1229. }
  1230. if (ns.disk == D_DISKLESS &&
  1231. ns.conn == C_STANDALONE &&
  1232. ns.role == R_SECONDARY) {
  1233. if (os.aftr_isp != ns.aftr_isp)
  1234. resume_next_sg(mdev);
  1235. }
  1236. drbd_md_sync(mdev);
  1237. }
  1238. struct after_conn_state_chg_work {
  1239. struct drbd_work w;
  1240. enum drbd_conns oc;
  1241. union drbd_state ns_min;
  1242. union drbd_state ns_max; /* new, max state, over all mdevs */
  1243. enum chg_state_flags flags;
  1244. };
  1245. static int w_after_conn_state_ch(struct drbd_work *w, int unused)
  1246. {
  1247. struct after_conn_state_chg_work *acscw =
  1248. container_of(w, struct after_conn_state_chg_work, w);
  1249. struct drbd_tconn *tconn = w->tconn;
  1250. enum drbd_conns oc = acscw->oc;
  1251. union drbd_state ns_max = acscw->ns_max;
  1252. union drbd_state ns_min = acscw->ns_min;
  1253. struct drbd_conf *mdev;
  1254. int vnr;
  1255. kfree(acscw);
  1256. /* Upon network configuration, we need to start the receiver */
  1257. if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
  1258. drbd_thread_start(&tconn->receiver);
  1259. if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
  1260. struct net_conf *old_conf;
  1261. mutex_lock(&tconn->conf_update);
  1262. old_conf = tconn->net_conf;
  1263. tconn->my_addr_len = 0;
  1264. tconn->peer_addr_len = 0;
  1265. rcu_assign_pointer(tconn->net_conf, NULL);
  1266. conn_free_crypto(tconn);
  1267. mutex_unlock(&tconn->conf_update);
  1268. synchronize_rcu();
  1269. kfree(old_conf);
  1270. }
  1271. if (ns_max.susp_fen) {
  1272. /* case1: The outdate peer handler is successful: */
  1273. if (ns_max.pdsk <= D_OUTDATED) {
  1274. rcu_read_lock();
  1275. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1276. if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
  1277. drbd_uuid_new_current(mdev);
  1278. clear_bit(NEW_CUR_UUID, &mdev->flags);
  1279. }
  1280. }
  1281. rcu_read_unlock();
  1282. spin_lock_irq(&tconn->req_lock);
  1283. _tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING);
  1284. _conn_request_state(tconn,
  1285. (union drbd_state) { { .susp_fen = 1 } },
  1286. (union drbd_state) { { .susp_fen = 0 } },
  1287. CS_VERBOSE);
  1288. spin_unlock_irq(&tconn->req_lock);
  1289. }
  1290. /* case2: The connection was established again: */
  1291. if (ns_min.conn >= C_CONNECTED) {
  1292. rcu_read_lock();
  1293. idr_for_each_entry(&tconn->volumes, mdev, vnr)
  1294. clear_bit(NEW_CUR_UUID, &mdev->flags);
  1295. rcu_read_unlock();
  1296. spin_lock_irq(&tconn->req_lock);
  1297. _tl_restart(tconn, RESEND);
  1298. _conn_request_state(tconn,
  1299. (union drbd_state) { { .susp_fen = 1 } },
  1300. (union drbd_state) { { .susp_fen = 0 } },
  1301. CS_VERBOSE);
  1302. spin_unlock_irq(&tconn->req_lock);
  1303. }
  1304. }
  1305. kref_put(&tconn->kref, &conn_destroy);
  1306. return 0;
  1307. }
  1308. void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
  1309. {
  1310. enum chg_state_flags flags = ~0;
  1311. struct drbd_conf *mdev;
  1312. int vnr, first_vol = 1;
  1313. union drbd_dev_state os, cs = {
  1314. { .role = R_SECONDARY,
  1315. .peer = R_UNKNOWN,
  1316. .conn = tconn->cstate,
  1317. .disk = D_DISKLESS,
  1318. .pdsk = D_UNKNOWN,
  1319. } };
  1320. rcu_read_lock();
  1321. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1322. os = mdev->state;
  1323. if (first_vol) {
  1324. cs = os;
  1325. first_vol = 0;
  1326. continue;
  1327. }
  1328. if (cs.role != os.role)
  1329. flags &= ~CS_DC_ROLE;
  1330. if (cs.peer != os.peer)
  1331. flags &= ~CS_DC_PEER;
  1332. if (cs.conn != os.conn)
  1333. flags &= ~CS_DC_CONN;
  1334. if (cs.disk != os.disk)
  1335. flags &= ~CS_DC_DISK;
  1336. if (cs.pdsk != os.pdsk)
  1337. flags &= ~CS_DC_PDSK;
  1338. }
  1339. rcu_read_unlock();
  1340. *pf |= CS_DC_MASK;
  1341. *pf &= flags;
  1342. (*pcs).i = cs.i;
  1343. }
  1344. static enum drbd_state_rv
  1345. conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1346. enum chg_state_flags flags)
  1347. {
  1348. enum drbd_state_rv rv = SS_SUCCESS;
  1349. union drbd_state ns, os;
  1350. struct drbd_conf *mdev;
  1351. int vnr;
  1352. rcu_read_lock();
  1353. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1354. os = drbd_read_state(mdev);
  1355. ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
  1356. if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
  1357. ns.disk = os.disk;
  1358. if (ns.i == os.i)
  1359. continue;
  1360. rv = is_valid_transition(os, ns);
  1361. if (rv < SS_SUCCESS)
  1362. break;
  1363. if (!(flags & CS_HARD)) {
  1364. rv = is_valid_state(mdev, ns);
  1365. if (rv < SS_SUCCESS) {
  1366. if (is_valid_state(mdev, os) == rv)
  1367. rv = is_valid_soft_transition(os, ns, tconn);
  1368. } else
  1369. rv = is_valid_soft_transition(os, ns, tconn);
  1370. }
  1371. if (rv < SS_SUCCESS)
  1372. break;
  1373. }
  1374. rcu_read_unlock();
  1375. if (rv < SS_SUCCESS && flags & CS_VERBOSE)
  1376. print_st_err(mdev, os, ns, rv);
  1377. return rv;
  1378. }
  1379. void
  1380. conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1381. union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
  1382. {
  1383. union drbd_state ns, os, ns_max = { };
  1384. union drbd_state ns_min = {
  1385. { .role = R_MASK,
  1386. .peer = R_MASK,
  1387. .conn = val.conn,
  1388. .disk = D_MASK,
  1389. .pdsk = D_MASK
  1390. } };
  1391. struct drbd_conf *mdev;
  1392. enum drbd_state_rv rv;
  1393. int vnr, number_of_volumes = 0;
  1394. if (mask.conn == C_MASK) {
  1395. /* remember last connect time so request_timer_fn() won't
  1396. * kill newly established sessions while we are still trying to thaw
  1397. * previously frozen IO */
  1398. if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS)
  1399. tconn->last_reconnect_jif = jiffies;
  1400. tconn->cstate = val.conn;
  1401. }
  1402. rcu_read_lock();
  1403. idr_for_each_entry(&tconn->volumes, mdev, vnr) {
  1404. number_of_volumes++;
  1405. os = drbd_read_state(mdev);
  1406. ns = apply_mask_val(os, mask, val);
  1407. ns = sanitize_state(mdev, ns, NULL);
  1408. if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
  1409. ns.disk = os.disk;
  1410. rv = __drbd_set_state(mdev, ns, flags, NULL);
  1411. if (rv < SS_SUCCESS)
  1412. BUG();
  1413. ns.i = mdev->state.i;
  1414. ns_max.role = max_role(ns.role, ns_max.role);
  1415. ns_max.peer = max_role(ns.peer, ns_max.peer);
  1416. ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
  1417. ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
  1418. ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
  1419. ns_min.role = min_role(ns.role, ns_min.role);
  1420. ns_min.peer = min_role(ns.peer, ns_min.peer);
  1421. ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
  1422. ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
  1423. ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
  1424. }
  1425. rcu_read_unlock();
  1426. if (number_of_volumes == 0) {
  1427. ns_min = ns_max = (union drbd_state) { {
  1428. .role = R_SECONDARY,
  1429. .peer = R_UNKNOWN,
  1430. .conn = val.conn,
  1431. .disk = D_DISKLESS,
  1432. .pdsk = D_UNKNOWN
  1433. } };
  1434. }
  1435. ns_min.susp = ns_max.susp = tconn->susp;
  1436. ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
  1437. ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
  1438. *pns_min = ns_min;
  1439. *pns_max = ns_max;
  1440. }
  1441. static enum drbd_state_rv
  1442. _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
  1443. {
  1444. enum drbd_state_rv rv;
  1445. if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
  1446. return SS_CW_SUCCESS;
  1447. if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
  1448. return SS_CW_FAILED_BY_PEER;
  1449. spin_lock_irq(&tconn->req_lock);
  1450. rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR;
  1451. if (rv == SS_UNKNOWN_ERROR)
  1452. rv = conn_is_valid_transition(tconn, mask, val, 0);
  1453. if (rv == SS_SUCCESS)
  1454. rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
  1455. spin_unlock_irq(&tconn->req_lock);
  1456. return rv;
  1457. }
  1458. static enum drbd_state_rv
  1459. conn_cl_wide(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1460. enum chg_state_flags f)
  1461. {
  1462. enum drbd_state_rv rv;
  1463. spin_unlock_irq(&tconn->req_lock);
  1464. mutex_lock(&tconn->cstate_mutex);
  1465. set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
  1466. if (conn_send_state_req(tconn, mask, val)) {
  1467. clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
  1468. rv = SS_CW_FAILED_BY_PEER;
  1469. /* if (f & CS_VERBOSE)
  1470. print_st_err(mdev, os, ns, rv); */
  1471. goto abort;
  1472. }
  1473. if (val.conn == C_DISCONNECTING)
  1474. set_bit(DISCONNECT_SENT, &tconn->flags);
  1475. wait_event(tconn->ping_wait, (rv = _conn_rq_cond(tconn, mask, val)));
  1476. clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags);
  1477. abort:
  1478. mutex_unlock(&tconn->cstate_mutex);
  1479. spin_lock_irq(&tconn->req_lock);
  1480. return rv;
  1481. }
  1482. enum drbd_state_rv
  1483. _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1484. enum chg_state_flags flags)
  1485. {
  1486. enum drbd_state_rv rv = SS_SUCCESS;
  1487. struct after_conn_state_chg_work *acscw;
  1488. enum drbd_conns oc = tconn->cstate;
  1489. union drbd_state ns_max, ns_min, os;
  1490. rv = is_valid_conn_transition(oc, val.conn);
  1491. if (rv < SS_SUCCESS)
  1492. goto abort;
  1493. rv = conn_is_valid_transition(tconn, mask, val, flags);
  1494. if (rv < SS_SUCCESS)
  1495. goto abort;
  1496. if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
  1497. !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
  1498. rv = conn_cl_wide(tconn, mask, val, flags);
  1499. if (rv < SS_SUCCESS)
  1500. goto abort;
  1501. }
  1502. conn_old_common_state(tconn, &os, &flags);
  1503. flags |= CS_DC_SUSP;
  1504. conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
  1505. conn_pr_state_change(tconn, os, ns_max, flags);
  1506. acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
  1507. if (acscw) {
  1508. acscw->oc = os.conn;
  1509. acscw->ns_min = ns_min;
  1510. acscw->ns_max = ns_max;
  1511. acscw->flags = flags;
  1512. acscw->w.cb = w_after_conn_state_ch;
  1513. kref_get(&tconn->kref);
  1514. acscw->w.tconn = tconn;
  1515. drbd_queue_work(&tconn->sender_work, &acscw->w);
  1516. } else {
  1517. conn_err(tconn, "Could not kmalloc an acscw\n");
  1518. }
  1519. return rv;
  1520. abort:
  1521. if (flags & CS_VERBOSE) {
  1522. conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv));
  1523. conn_err(tconn, " state = { cs:%s }\n", drbd_conn_str(oc));
  1524. conn_err(tconn, "wanted = { cs:%s }\n", drbd_conn_str(val.conn));
  1525. }
  1526. return rv;
  1527. }
  1528. enum drbd_state_rv
  1529. conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
  1530. enum chg_state_flags flags)
  1531. {
  1532. enum drbd_state_rv rv;
  1533. spin_lock_irq(&tconn->req_lock);
  1534. rv = _conn_request_state(tconn, mask, val, flags);
  1535. spin_unlock_irq(&tconn->req_lock);
  1536. return rv;
  1537. }