Commit | Line | Data |
---|---|---|
b8907339 PR |
1 | /* |
2 | drbd_state.c | |
3 | ||
4 | This file is part of DRBD by Philipp Reisner and Lars Ellenberg. | |
5 | ||
6 | Copyright (C) 2001-2008, LINBIT Information Technologies GmbH. | |
7 | Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>. | |
8 | Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>. | |
9 | ||
10 | Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev | |
11 | from Logicworks, Inc. for making SDP replication support possible. | |
12 | ||
13 | drbd is free software; you can redistribute it and/or modify | |
14 | it under the terms of the GNU General Public License as published by | |
15 | the Free Software Foundation; either version 2, or (at your option) | |
16 | any later version. | |
17 | ||
18 | drbd is distributed in the hope that it will be useful, | |
19 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
21 | GNU General Public License for more details. | |
22 | ||
23 | You should have received a copy of the GNU General Public License | |
24 | along with drbd; see the file COPYING. If not, write to | |
25 | the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. | |
26 | */ | |
27 | ||
28 | #include <linux/drbd_limits.h> | |
29 | #include "drbd_int.h" | |
30 | #include "drbd_req.h" | |
31 | ||
cdfda633 | 32 | /* in drbd_main.c */ |
71fc7eed | 33 | extern void tl_abort_disk_io(struct drbd_conf *mdev); |
cdfda633 | 34 | |
b8907339 PR |
35 | struct after_state_chg_work { |
36 | struct drbd_work w; | |
37 | union drbd_state os; | |
38 | union drbd_state ns; | |
39 | enum chg_state_flags flags; | |
40 | struct completion *done; | |
41 | }; | |
42 | ||
d942ae44 PR |
43 | enum sanitize_state_warnings { |
44 | NO_WARNING, | |
45 | ABORTED_ONLINE_VERIFY, | |
46 | ABORTED_RESYNC, | |
47 | CONNECTION_LOST_NEGOTIATING, | |
48 | IMPLICITLY_UPGRADED_DISK, | |
49 | IMPLICITLY_UPGRADED_PDSK, | |
50 | }; | |
51 | ||
99920dc5 | 52 | static int w_after_state_ch(struct drbd_work *w, int unused); |
b8907339 PR |
53 | static void after_state_ch(struct drbd_conf *mdev, union drbd_state os, |
54 | union drbd_state ns, enum chg_state_flags flags); | |
a75f34ad | 55 | static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state); |
a1096a6e | 56 | static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state, struct drbd_tconn *); |
3509502d | 57 | static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns); |
4308a0a3 | 58 | static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns, |
d942ae44 | 59 | enum sanitize_state_warnings *warn); |
b8907339 | 60 | |
2aebfabb PR |
61 | static inline bool is_susp(union drbd_state s) |
62 | { | |
63 | return s.susp || s.susp_nod || s.susp_fen; | |
64 | } | |
65 | ||
d0456c72 | 66 | bool conn_all_vols_unconf(struct drbd_tconn *tconn) |
0e29d163 PR |
67 | { |
68 | struct drbd_conf *mdev; | |
695d08fa | 69 | bool rv = true; |
e90285e0 | 70 | int vnr; |
0e29d163 | 71 | |
695d08fa | 72 | rcu_read_lock(); |
e90285e0 | 73 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
d0456c72 LE |
74 | if (mdev->state.disk != D_DISKLESS || |
75 | mdev->state.conn != C_STANDALONE || | |
695d08fa PR |
76 | mdev->state.role != R_SECONDARY) { |
77 | rv = false; | |
78 | break; | |
79 | } | |
0e29d163 | 80 | } |
695d08fa PR |
81 | rcu_read_unlock(); |
82 | ||
83 | return rv; | |
0e29d163 PR |
84 | } |
85 | ||
cb703454 PR |
86 | /* Unfortunately the states where not correctly ordered, when |
87 | they where defined. therefore can not use max_t() here. */ | |
88 | static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2) | |
89 | { | |
90 | if (role1 == R_PRIMARY || role2 == R_PRIMARY) | |
91 | return R_PRIMARY; | |
92 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
93 | return R_SECONDARY; | |
94 | return R_UNKNOWN; | |
95 | } | |
96 | static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2) | |
97 | { | |
98 | if (role1 == R_UNKNOWN || role2 == R_UNKNOWN) | |
99 | return R_UNKNOWN; | |
100 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
101 | return R_SECONDARY; | |
102 | return R_PRIMARY; | |
103 | } | |
104 | ||
105 | enum drbd_role conn_highest_role(struct drbd_tconn *tconn) | |
106 | { | |
107 | enum drbd_role role = R_UNKNOWN; | |
108 | struct drbd_conf *mdev; | |
109 | int vnr; | |
110 | ||
695d08fa | 111 | rcu_read_lock(); |
cb703454 PR |
112 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
113 | role = max_role(role, mdev->state.role); | |
695d08fa | 114 | rcu_read_unlock(); |
cb703454 PR |
115 | |
116 | return role; | |
117 | } | |
118 | ||
119 | enum drbd_role conn_highest_peer(struct drbd_tconn *tconn) | |
120 | { | |
121 | enum drbd_role peer = R_UNKNOWN; | |
122 | struct drbd_conf *mdev; | |
123 | int vnr; | |
124 | ||
695d08fa | 125 | rcu_read_lock(); |
cb703454 PR |
126 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
127 | peer = max_role(peer, mdev->state.peer); | |
695d08fa | 128 | rcu_read_unlock(); |
cb703454 PR |
129 | |
130 | return peer; | |
131 | } | |
132 | ||
133 | enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn) | |
134 | { | |
135 | enum drbd_disk_state ds = D_DISKLESS; | |
136 | struct drbd_conf *mdev; | |
137 | int vnr; | |
138 | ||
695d08fa | 139 | rcu_read_lock(); |
cb703454 PR |
140 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
141 | ds = max_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 142 | rcu_read_unlock(); |
cb703454 PR |
143 | |
144 | return ds; | |
145 | } | |
146 | ||
4669265a PR |
147 | enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn) |
148 | { | |
149 | enum drbd_disk_state ds = D_MASK; | |
150 | struct drbd_conf *mdev; | |
151 | int vnr; | |
152 | ||
695d08fa | 153 | rcu_read_lock(); |
4669265a PR |
154 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
155 | ds = min_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 156 | rcu_read_unlock(); |
4669265a PR |
157 | |
158 | return ds; | |
159 | } | |
160 | ||
cb703454 PR |
161 | enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn) |
162 | { | |
163 | enum drbd_disk_state ds = D_DISKLESS; | |
164 | struct drbd_conf *mdev; | |
165 | int vnr; | |
166 | ||
695d08fa | 167 | rcu_read_lock(); |
cb703454 PR |
168 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
169 | ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk); | |
695d08fa | 170 | rcu_read_unlock(); |
cb703454 PR |
171 | |
172 | return ds; | |
173 | } | |
174 | ||
19f83c76 PR |
175 | enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn) |
176 | { | |
177 | enum drbd_conns conn = C_MASK; | |
178 | struct drbd_conf *mdev; | |
179 | int vnr; | |
180 | ||
695d08fa | 181 | rcu_read_lock(); |
19f83c76 PR |
182 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
183 | conn = min_t(enum drbd_conns, conn, mdev->state.conn); | |
695d08fa | 184 | rcu_read_unlock(); |
19f83c76 PR |
185 | |
186 | return conn; | |
187 | } | |
188 | ||
b8907339 PR |
189 | /** |
190 | * cl_wide_st_chg() - true if the state change is a cluster wide one | |
191 | * @mdev: DRBD device. | |
192 | * @os: old (current) state. | |
193 | * @ns: new (wanted) state. | |
194 | */ | |
195 | static int cl_wide_st_chg(struct drbd_conf *mdev, | |
196 | union drbd_state os, union drbd_state ns) | |
197 | { | |
198 | return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED && | |
199 | ((os.role != R_PRIMARY && ns.role == R_PRIMARY) || | |
200 | (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
201 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) || | |
e8744f5a | 202 | (os.disk != D_FAILED && ns.disk == D_FAILED))) || |
b8907339 | 203 | (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) || |
369bea63 PR |
204 | (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) || |
205 | (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS); | |
b8907339 PR |
206 | } |
207 | ||
56707f9e PR |
208 | static union drbd_state |
209 | apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val) | |
210 | { | |
211 | union drbd_state ns; | |
212 | ns.i = (os.i & ~mask.i) | val.i; | |
213 | return ns; | |
214 | } | |
215 | ||
b8907339 PR |
216 | enum drbd_state_rv |
217 | drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f, | |
218 | union drbd_state mask, union drbd_state val) | |
219 | { | |
220 | unsigned long flags; | |
56707f9e | 221 | union drbd_state ns; |
b8907339 PR |
222 | enum drbd_state_rv rv; |
223 | ||
224 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 225 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 226 | rv = _drbd_set_state(mdev, ns, f, NULL); |
b8907339 PR |
227 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
228 | ||
229 | return rv; | |
230 | } | |
231 | ||
232 | /** | |
233 | * drbd_force_state() - Impose a change which happens outside our control on our state | |
234 | * @mdev: DRBD device. | |
235 | * @mask: mask of state bits to change. | |
236 | * @val: value of new state bits. | |
237 | */ | |
238 | void drbd_force_state(struct drbd_conf *mdev, | |
239 | union drbd_state mask, union drbd_state val) | |
240 | { | |
241 | drbd_change_state(mdev, CS_HARD, mask, val); | |
242 | } | |
243 | ||
244 | static enum drbd_state_rv | |
245 | _req_st_cond(struct drbd_conf *mdev, union drbd_state mask, | |
246 | union drbd_state val) | |
247 | { | |
248 | union drbd_state os, ns; | |
249 | unsigned long flags; | |
250 | enum drbd_state_rv rv; | |
251 | ||
252 | if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags)) | |
253 | return SS_CW_SUCCESS; | |
254 | ||
255 | if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags)) | |
256 | return SS_CW_FAILED_BY_PEER; | |
257 | ||
b8907339 | 258 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); |
78bae59b | 259 | os = drbd_read_state(mdev); |
56707f9e | 260 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d PR |
261 | rv = is_valid_transition(os, ns); |
262 | if (rv == SS_SUCCESS) | |
263 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ | |
b8907339 PR |
264 | |
265 | if (!cl_wide_st_chg(mdev, os, ns)) | |
266 | rv = SS_CW_NO_NEED; | |
3509502d | 267 | if (rv == SS_UNKNOWN_ERROR) { |
b8907339 PR |
268 | rv = is_valid_state(mdev, ns); |
269 | if (rv == SS_SUCCESS) { | |
a1096a6e | 270 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
271 | if (rv == SS_SUCCESS) |
272 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ | |
273 | } | |
274 | } | |
275 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
276 | ||
277 | return rv; | |
278 | } | |
279 | ||
280 | /** | |
281 | * drbd_req_state() - Perform an eventually cluster wide state change | |
282 | * @mdev: DRBD device. | |
283 | * @mask: mask of state bits to change. | |
284 | * @val: value of new state bits. | |
285 | * @f: flags | |
286 | * | |
287 | * Should not be called directly, use drbd_request_state() or | |
288 | * _drbd_request_state(). | |
289 | */ | |
290 | static enum drbd_state_rv | |
291 | drbd_req_state(struct drbd_conf *mdev, union drbd_state mask, | |
292 | union drbd_state val, enum chg_state_flags f) | |
293 | { | |
294 | struct completion done; | |
295 | unsigned long flags; | |
296 | union drbd_state os, ns; | |
297 | enum drbd_state_rv rv; | |
298 | ||
299 | init_completion(&done); | |
300 | ||
301 | if (f & CS_SERIALIZE) | |
8410da8f | 302 | mutex_lock(mdev->state_mutex); |
b8907339 PR |
303 | |
304 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 305 | os = drbd_read_state(mdev); |
56707f9e | 306 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d | 307 | rv = is_valid_transition(os, ns); |
3c5e5f6a LE |
308 | if (rv < SS_SUCCESS) { |
309 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
3509502d | 310 | goto abort; |
3c5e5f6a | 311 | } |
b8907339 PR |
312 | |
313 | if (cl_wide_st_chg(mdev, os, ns)) { | |
314 | rv = is_valid_state(mdev, ns); | |
315 | if (rv == SS_SUCCESS) | |
a1096a6e | 316 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
317 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
318 | ||
319 | if (rv < SS_SUCCESS) { | |
320 | if (f & CS_VERBOSE) | |
321 | print_st_err(mdev, os, ns, rv); | |
322 | goto abort; | |
323 | } | |
324 | ||
d24ae219 | 325 | if (drbd_send_state_req(mdev, mask, val)) { |
b8907339 PR |
326 | rv = SS_CW_FAILED_BY_PEER; |
327 | if (f & CS_VERBOSE) | |
328 | print_st_err(mdev, os, ns, rv); | |
329 | goto abort; | |
330 | } | |
331 | ||
332 | wait_event(mdev->state_wait, | |
333 | (rv = _req_st_cond(mdev, mask, val))); | |
334 | ||
335 | if (rv < SS_SUCCESS) { | |
b8907339 PR |
336 | if (f & CS_VERBOSE) |
337 | print_st_err(mdev, os, ns, rv); | |
338 | goto abort; | |
339 | } | |
340 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 341 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 342 | rv = _drbd_set_state(mdev, ns, f, &done); |
b8907339 PR |
343 | } else { |
344 | rv = _drbd_set_state(mdev, ns, f, &done); | |
345 | } | |
346 | ||
347 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
348 | ||
349 | if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) { | |
350 | D_ASSERT(current != mdev->tconn->worker.task); | |
351 | wait_for_completion(&done); | |
352 | } | |
353 | ||
354 | abort: | |
355 | if (f & CS_SERIALIZE) | |
8410da8f | 356 | mutex_unlock(mdev->state_mutex); |
b8907339 PR |
357 | |
358 | return rv; | |
359 | } | |
360 | ||
361 | /** | |
362 | * _drbd_request_state() - Request a state change (with flags) | |
363 | * @mdev: DRBD device. | |
364 | * @mask: mask of state bits to change. | |
365 | * @val: value of new state bits. | |
366 | * @f: flags | |
367 | * | |
368 | * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE | |
369 | * flag, or when logging of failed state change requests is not desired. | |
370 | */ | |
371 | enum drbd_state_rv | |
372 | _drbd_request_state(struct drbd_conf *mdev, union drbd_state mask, | |
373 | union drbd_state val, enum chg_state_flags f) | |
374 | { | |
375 | enum drbd_state_rv rv; | |
376 | ||
377 | wait_event(mdev->state_wait, | |
378 | (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE); | |
379 | ||
380 | return rv; | |
381 | } | |
382 | ||
383 | static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns) | |
384 | { | |
385 | dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n", | |
386 | name, | |
387 | drbd_conn_str(ns.conn), | |
388 | drbd_role_str(ns.role), | |
389 | drbd_role_str(ns.peer), | |
390 | drbd_disk_str(ns.disk), | |
391 | drbd_disk_str(ns.pdsk), | |
392 | is_susp(ns) ? 's' : 'r', | |
393 | ns.aftr_isp ? 'a' : '-', | |
394 | ns.peer_isp ? 'p' : '-', | |
395 | ns.user_isp ? 'u' : '-', | |
396 | ns.susp_fen ? 'F' : '-', | |
397 | ns.susp_nod ? 'N' : '-' | |
398 | ); | |
399 | } | |
400 | ||
401 | void print_st_err(struct drbd_conf *mdev, union drbd_state os, | |
402 | union drbd_state ns, enum drbd_state_rv err) | |
403 | { | |
404 | if (err == SS_IN_TRANSIENT_STATE) | |
405 | return; | |
406 | dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err)); | |
407 | print_st(mdev, " state", os); | |
408 | print_st(mdev, "wanted", ns); | |
409 | } | |
410 | ||
435693e8 | 411 | static long print_state_change(char *pb, union drbd_state os, union drbd_state ns, |
bbeb641c PR |
412 | enum chg_state_flags flags) |
413 | { | |
435693e8 | 414 | char *pbp; |
bbeb641c PR |
415 | pbp = pb; |
416 | *pbp = 0; | |
706cb24c | 417 | |
435693e8 | 418 | if (ns.role != os.role && flags & CS_DC_ROLE) |
bbeb641c PR |
419 | pbp += sprintf(pbp, "role( %s -> %s ) ", |
420 | drbd_role_str(os.role), | |
421 | drbd_role_str(ns.role)); | |
435693e8 | 422 | if (ns.peer != os.peer && flags & CS_DC_PEER) |
bbeb641c PR |
423 | pbp += sprintf(pbp, "peer( %s -> %s ) ", |
424 | drbd_role_str(os.peer), | |
425 | drbd_role_str(ns.peer)); | |
435693e8 | 426 | if (ns.conn != os.conn && flags & CS_DC_CONN) |
bbeb641c PR |
427 | pbp += sprintf(pbp, "conn( %s -> %s ) ", |
428 | drbd_conn_str(os.conn), | |
429 | drbd_conn_str(ns.conn)); | |
435693e8 | 430 | if (ns.disk != os.disk && flags & CS_DC_DISK) |
bbeb641c PR |
431 | pbp += sprintf(pbp, "disk( %s -> %s ) ", |
432 | drbd_disk_str(os.disk), | |
433 | drbd_disk_str(ns.disk)); | |
435693e8 | 434 | if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK) |
bbeb641c PR |
435 | pbp += sprintf(pbp, "pdsk( %s -> %s ) ", |
436 | drbd_disk_str(os.pdsk), | |
437 | drbd_disk_str(ns.pdsk)); | |
706cb24c PR |
438 | |
439 | return pbp - pb; | |
440 | } | |
441 | ||
442 | static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns, | |
443 | enum chg_state_flags flags) | |
444 | { | |
445 | char pb[300]; | |
446 | char *pbp = pb; | |
447 | ||
448 | pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK); | |
449 | ||
bbeb641c PR |
450 | if (ns.aftr_isp != os.aftr_isp) |
451 | pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ", | |
452 | os.aftr_isp, | |
453 | ns.aftr_isp); | |
454 | if (ns.peer_isp != os.peer_isp) | |
455 | pbp += sprintf(pbp, "peer_isp( %d -> %d ) ", | |
456 | os.peer_isp, | |
457 | ns.peer_isp); | |
458 | if (ns.user_isp != os.user_isp) | |
459 | pbp += sprintf(pbp, "user_isp( %d -> %d ) ", | |
460 | os.user_isp, | |
461 | ns.user_isp); | |
435693e8 | 462 | |
706cb24c | 463 | if (pbp != pb) |
bbeb641c PR |
464 | dev_info(DEV, "%s\n", pb); |
465 | } | |
b8907339 | 466 | |
435693e8 PR |
467 | static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns, |
468 | enum chg_state_flags flags) | |
469 | { | |
470 | char pb[300]; | |
706cb24c PR |
471 | char *pbp = pb; |
472 | ||
473 | pbp += print_state_change(pbp, os, ns, flags); | |
435693e8 | 474 | |
706cb24c PR |
475 | if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP) |
476 | pbp += sprintf(pbp, "susp( %d -> %d ) ", | |
477 | is_susp(os), | |
478 | is_susp(ns)); | |
479 | ||
480 | if (pbp != pb) | |
435693e8 PR |
481 | conn_info(tconn, "%s\n", pb); |
482 | } | |
483 | ||
484 | ||
b8907339 PR |
485 | /** |
486 | * is_valid_state() - Returns an SS_ error code if ns is not valid | |
487 | * @mdev: DRBD device. | |
488 | * @ns: State to consider. | |
489 | */ | |
490 | static enum drbd_state_rv | |
491 | is_valid_state(struct drbd_conf *mdev, union drbd_state ns) | |
492 | { | |
493 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
494 | ||
495 | enum drbd_fencing_p fp; | |
496 | enum drbd_state_rv rv = SS_SUCCESS; | |
44ed167d | 497 | struct net_conf *nc; |
b8907339 | 498 | |
daeda1cc | 499 | rcu_read_lock(); |
b8907339 PR |
500 | fp = FP_DONT_CARE; |
501 | if (get_ldev(mdev)) { | |
daeda1cc | 502 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; |
b8907339 PR |
503 | put_ldev(mdev); |
504 | } | |
505 | ||
44ed167d PR |
506 | nc = rcu_dereference(mdev->tconn->net_conf); |
507 | if (nc) { | |
508 | if (!nc->two_primaries && ns.role == R_PRIMARY) { | |
047e95e2 PR |
509 | if (ns.peer == R_PRIMARY) |
510 | rv = SS_TWO_PRIMARIES; | |
cb703454 | 511 | else if (conn_highest_peer(mdev->tconn) == R_PRIMARY) |
047e95e2 | 512 | rv = SS_O_VOL_PEER_PRI; |
44ed167d | 513 | } |
b8907339 PR |
514 | } |
515 | ||
516 | if (rv <= 0) | |
517 | /* already found a reason to abort */; | |
518 | else if (ns.role == R_SECONDARY && mdev->open_cnt) | |
519 | rv = SS_DEVICE_IN_USE; | |
520 | ||
521 | else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE) | |
522 | rv = SS_NO_UP_TO_DATE_DISK; | |
523 | ||
524 | else if (fp >= FP_RESOURCE && | |
525 | ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN) | |
526 | rv = SS_PRIMARY_NOP; | |
527 | ||
528 | else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT) | |
529 | rv = SS_NO_UP_TO_DATE_DISK; | |
530 | ||
531 | else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT) | |
532 | rv = SS_NO_LOCAL_DISK; | |
533 | ||
534 | else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT) | |
535 | rv = SS_NO_REMOTE_DISK; | |
536 | ||
537 | else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE) | |
538 | rv = SS_NO_UP_TO_DATE_DISK; | |
539 | ||
540 | else if ((ns.conn == C_CONNECTED || | |
541 | ns.conn == C_WF_BITMAP_S || | |
542 | ns.conn == C_SYNC_SOURCE || | |
543 | ns.conn == C_PAUSED_SYNC_S) && | |
544 | ns.disk == D_OUTDATED) | |
545 | rv = SS_CONNECTED_OUTDATES; | |
546 | ||
547 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
44ed167d | 548 | (nc->verify_alg[0] == 0)) |
b8907339 PR |
549 | rv = SS_NO_VERIFY_ALG; |
550 | ||
551 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
552 | mdev->tconn->agreed_pro_version < 88) | |
553 | rv = SS_NOT_SUPPORTED; | |
554 | ||
555 | else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN) | |
556 | rv = SS_CONNECTED_OUTDATES; | |
557 | ||
44ed167d PR |
558 | rcu_read_unlock(); |
559 | ||
b8907339 PR |
560 | return rv; |
561 | } | |
562 | ||
563 | /** | |
a75f34ad | 564 | * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible |
3509502d PR |
565 | * This function limits state transitions that may be declined by DRBD. I.e. |
566 | * user requests (aka soft transitions). | |
b8907339 PR |
567 | * @mdev: DRBD device. |
568 | * @ns: new state. | |
569 | * @os: old state. | |
570 | */ | |
571 | static enum drbd_state_rv | |
a1096a6e | 572 | is_valid_soft_transition(union drbd_state os, union drbd_state ns, struct drbd_tconn *tconn) |
b8907339 PR |
573 | { |
574 | enum drbd_state_rv rv = SS_SUCCESS; | |
575 | ||
576 | if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) && | |
577 | os.conn > C_CONNECTED) | |
578 | rv = SS_RESYNC_RUNNING; | |
579 | ||
580 | if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE) | |
581 | rv = SS_ALREADY_STANDALONE; | |
582 | ||
583 | if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS) | |
584 | rv = SS_IS_DISKLESS; | |
585 | ||
586 | if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED) | |
587 | rv = SS_NO_NET_CONFIG; | |
588 | ||
589 | if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING) | |
590 | rv = SS_LOWER_THAN_OUTDATED; | |
591 | ||
592 | if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED) | |
593 | rv = SS_IN_TRANSIENT_STATE; | |
594 | ||
2325eb66 PR |
595 | /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS) |
596 | rv = SS_IN_TRANSIENT_STATE; */ | |
b8907339 | 597 | |
a1096a6e PR |
598 | /* While establishing a connection only allow cstate to change. |
599 | Delay/refuse role changes, detach attach etc... */ | |
600 | if (test_bit(STATE_SENT, &tconn->flags) && | |
601 | !(os.conn == C_WF_REPORT_PARAMS || | |
602 | (ns.conn == C_WF_REPORT_PARAMS && os.conn == C_WF_CONNECTION))) | |
603 | rv = SS_IN_TRANSIENT_STATE; | |
604 | ||
b8907339 PR |
605 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED) |
606 | rv = SS_NEED_CONNECTION; | |
607 | ||
608 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
609 | ns.conn != os.conn && os.conn > C_CONNECTED) | |
610 | rv = SS_RESYNC_RUNNING; | |
611 | ||
612 | if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) && | |
613 | os.conn < C_CONNECTED) | |
614 | rv = SS_NEED_CONNECTION; | |
615 | ||
616 | if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE) | |
617 | && os.conn < C_WF_REPORT_PARAMS) | |
618 | rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */ | |
619 | ||
620 | return rv; | |
621 | } | |
622 | ||
3509502d | 623 | static enum drbd_state_rv |
fda74117 | 624 | is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc) |
3509502d | 625 | { |
d9cc6e23 LE |
626 | /* no change -> nothing to do, at least for the connection part */ |
627 | if (oc == nc) | |
628 | return SS_NOTHING_TO_DO; | |
3509502d | 629 | |
d9cc6e23 LE |
630 | /* disconnect of an unconfigured connection does not make sense */ |
631 | if (oc == C_STANDALONE && nc == C_DISCONNECTING) | |
632 | return SS_ALREADY_STANDALONE; | |
633 | ||
634 | /* from C_STANDALONE, we start with C_UNCONNECTED */ | |
635 | if (oc == C_STANDALONE && nc != C_UNCONNECTED) | |
636 | return SS_NEED_CONNECTION; | |
3509502d | 637 | |
25b0d6c8 PR |
638 | /* When establishing a connection we need to go through WF_REPORT_PARAMS! |
639 | Necessary to do the right thing upon invalidate-remote on a disconnected resource */ | |
640 | if (oc < C_WF_REPORT_PARAMS && nc >= C_CONNECTED) | |
641 | return SS_NEED_CONNECTION; | |
642 | ||
3509502d | 643 | /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */ |
fda74117 | 644 | if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING) |
d9cc6e23 | 645 | return SS_IN_TRANSIENT_STATE; |
3509502d PR |
646 | |
647 | /* After C_DISCONNECTING only C_STANDALONE may follow */ | |
fda74117 | 648 | if (oc == C_DISCONNECTING && nc != C_STANDALONE) |
d9cc6e23 | 649 | return SS_IN_TRANSIENT_STATE; |
3509502d | 650 | |
d9cc6e23 | 651 | return SS_SUCCESS; |
fda74117 PR |
652 | } |
653 | ||
654 | ||
655 | /** | |
656 | * is_valid_transition() - Returns an SS_ error code if the state transition is not possible | |
657 | * This limits hard state transitions. Hard state transitions are facts there are | |
658 | * imposed on DRBD by the environment. E.g. disk broke or network broke down. | |
659 | * But those hard state transitions are still not allowed to do everything. | |
660 | * @ns: new state. | |
661 | * @os: old state. | |
662 | */ | |
663 | static enum drbd_state_rv | |
664 | is_valid_transition(union drbd_state os, union drbd_state ns) | |
665 | { | |
666 | enum drbd_state_rv rv; | |
667 | ||
668 | rv = is_valid_conn_transition(os.conn, ns.conn); | |
669 | ||
3509502d PR |
670 | /* we cannot fail (again) if we already detached */ |
671 | if (ns.disk == D_FAILED && os.disk == D_DISKLESS) | |
672 | rv = SS_IS_DISKLESS; | |
673 | ||
674 | return rv; | |
675 | } | |
676 | ||
d942ae44 PR |
677 | static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn) |
678 | { | |
679 | static const char *msg_table[] = { | |
680 | [NO_WARNING] = "", | |
681 | [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.", | |
682 | [ABORTED_RESYNC] = "Resync aborted.", | |
683 | [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!", | |
684 | [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk", | |
685 | [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk", | |
686 | }; | |
687 | ||
688 | if (warn != NO_WARNING) | |
689 | dev_warn(DEV, "%s\n", msg_table[warn]); | |
690 | } | |
691 | ||
b8907339 PR |
692 | /** |
693 | * sanitize_state() - Resolves implicitly necessary additional changes to a state transition | |
694 | * @mdev: DRBD device. | |
695 | * @os: old state. | |
696 | * @ns: new state. | |
697 | * @warn_sync_abort: | |
698 | * | |
699 | * When we loose connection, we have to set the state of the peers disk (pdsk) | |
700 | * to D_UNKNOWN. This rule and many more along those lines are in this function. | |
701 | */ | |
4308a0a3 | 702 | static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns, |
d942ae44 | 703 | enum sanitize_state_warnings *warn) |
b8907339 PR |
704 | { |
705 | enum drbd_fencing_p fp; | |
706 | enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max; | |
707 | ||
d942ae44 PR |
708 | if (warn) |
709 | *warn = NO_WARNING; | |
710 | ||
b8907339 PR |
711 | fp = FP_DONT_CARE; |
712 | if (get_ldev(mdev)) { | |
daeda1cc PR |
713 | rcu_read_lock(); |
714 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; | |
715 | rcu_read_unlock(); | |
b8907339 PR |
716 | put_ldev(mdev); |
717 | } | |
718 | ||
3509502d | 719 | /* Implications from connection to peer and peer_isp */ |
b8907339 PR |
720 | if (ns.conn < C_CONNECTED) { |
721 | ns.peer_isp = 0; | |
722 | ns.peer = R_UNKNOWN; | |
723 | if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT) | |
724 | ns.pdsk = D_UNKNOWN; | |
725 | } | |
726 | ||
727 | /* Clear the aftr_isp when becoming unconfigured */ | |
728 | if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY) | |
729 | ns.aftr_isp = 0; | |
730 | ||
4308a0a3 | 731 | /* An implication of the disk states onto the connection state */ |
b8907339 | 732 | /* Abort resync if a disk fails/detaches */ |
4308a0a3 | 733 | if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) { |
d942ae44 PR |
734 | if (warn) |
735 | *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ? | |
736 | ABORTED_ONLINE_VERIFY : ABORTED_RESYNC; | |
b8907339 PR |
737 | ns.conn = C_CONNECTED; |
738 | } | |
739 | ||
740 | /* Connection breaks down before we finished "Negotiating" */ | |
741 | if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING && | |
742 | get_ldev_if_state(mdev, D_NEGOTIATING)) { | |
743 | if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) { | |
744 | ns.disk = mdev->new_state_tmp.disk; | |
745 | ns.pdsk = mdev->new_state_tmp.pdsk; | |
746 | } else { | |
d942ae44 PR |
747 | if (warn) |
748 | *warn = CONNECTION_LOST_NEGOTIATING; | |
b8907339 PR |
749 | ns.disk = D_DISKLESS; |
750 | ns.pdsk = D_UNKNOWN; | |
751 | } | |
752 | put_ldev(mdev); | |
753 | } | |
754 | ||
755 | /* D_CONSISTENT and D_OUTDATED vanish when we get connected */ | |
756 | if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) { | |
757 | if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED) | |
758 | ns.disk = D_UP_TO_DATE; | |
759 | if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED) | |
760 | ns.pdsk = D_UP_TO_DATE; | |
761 | } | |
762 | ||
763 | /* Implications of the connection stat on the disk states */ | |
764 | disk_min = D_DISKLESS; | |
765 | disk_max = D_UP_TO_DATE; | |
766 | pdsk_min = D_INCONSISTENT; | |
767 | pdsk_max = D_UNKNOWN; | |
768 | switch ((enum drbd_conns)ns.conn) { | |
769 | case C_WF_BITMAP_T: | |
770 | case C_PAUSED_SYNC_T: | |
771 | case C_STARTING_SYNC_T: | |
772 | case C_WF_SYNC_UUID: | |
773 | case C_BEHIND: | |
774 | disk_min = D_INCONSISTENT; | |
775 | disk_max = D_OUTDATED; | |
776 | pdsk_min = D_UP_TO_DATE; | |
777 | pdsk_max = D_UP_TO_DATE; | |
778 | break; | |
779 | case C_VERIFY_S: | |
780 | case C_VERIFY_T: | |
781 | disk_min = D_UP_TO_DATE; | |
782 | disk_max = D_UP_TO_DATE; | |
783 | pdsk_min = D_UP_TO_DATE; | |
784 | pdsk_max = D_UP_TO_DATE; | |
785 | break; | |
786 | case C_CONNECTED: | |
787 | disk_min = D_DISKLESS; | |
788 | disk_max = D_UP_TO_DATE; | |
789 | pdsk_min = D_DISKLESS; | |
790 | pdsk_max = D_UP_TO_DATE; | |
791 | break; | |
792 | case C_WF_BITMAP_S: | |
793 | case C_PAUSED_SYNC_S: | |
794 | case C_STARTING_SYNC_S: | |
795 | case C_AHEAD: | |
796 | disk_min = D_UP_TO_DATE; | |
797 | disk_max = D_UP_TO_DATE; | |
798 | pdsk_min = D_INCONSISTENT; | |
799 | pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/ | |
800 | break; | |
801 | case C_SYNC_TARGET: | |
802 | disk_min = D_INCONSISTENT; | |
803 | disk_max = D_INCONSISTENT; | |
804 | pdsk_min = D_UP_TO_DATE; | |
805 | pdsk_max = D_UP_TO_DATE; | |
806 | break; | |
807 | case C_SYNC_SOURCE: | |
808 | disk_min = D_UP_TO_DATE; | |
809 | disk_max = D_UP_TO_DATE; | |
810 | pdsk_min = D_INCONSISTENT; | |
811 | pdsk_max = D_INCONSISTENT; | |
812 | break; | |
813 | case C_STANDALONE: | |
814 | case C_DISCONNECTING: | |
815 | case C_UNCONNECTED: | |
816 | case C_TIMEOUT: | |
817 | case C_BROKEN_PIPE: | |
818 | case C_NETWORK_FAILURE: | |
819 | case C_PROTOCOL_ERROR: | |
820 | case C_TEAR_DOWN: | |
821 | case C_WF_CONNECTION: | |
822 | case C_WF_REPORT_PARAMS: | |
823 | case C_MASK: | |
824 | break; | |
825 | } | |
826 | if (ns.disk > disk_max) | |
827 | ns.disk = disk_max; | |
828 | ||
829 | if (ns.disk < disk_min) { | |
d942ae44 PR |
830 | if (warn) |
831 | *warn = IMPLICITLY_UPGRADED_DISK; | |
b8907339 PR |
832 | ns.disk = disk_min; |
833 | } | |
834 | if (ns.pdsk > pdsk_max) | |
835 | ns.pdsk = pdsk_max; | |
836 | ||
837 | if (ns.pdsk < pdsk_min) { | |
d942ae44 PR |
838 | if (warn) |
839 | *warn = IMPLICITLY_UPGRADED_PDSK; | |
b8907339 PR |
840 | ns.pdsk = pdsk_min; |
841 | } | |
842 | ||
843 | if (fp == FP_STONITH && | |
4308a0a3 | 844 | (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED)) |
b8907339 PR |
845 | ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */ |
846 | ||
f399002e | 847 | if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO && |
4308a0a3 | 848 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) |
b8907339 PR |
849 | ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */ |
850 | ||
851 | if (ns.aftr_isp || ns.peer_isp || ns.user_isp) { | |
852 | if (ns.conn == C_SYNC_SOURCE) | |
853 | ns.conn = C_PAUSED_SYNC_S; | |
854 | if (ns.conn == C_SYNC_TARGET) | |
855 | ns.conn = C_PAUSED_SYNC_T; | |
856 | } else { | |
857 | if (ns.conn == C_PAUSED_SYNC_S) | |
858 | ns.conn = C_SYNC_SOURCE; | |
859 | if (ns.conn == C_PAUSED_SYNC_T) | |
860 | ns.conn = C_SYNC_TARGET; | |
861 | } | |
862 | ||
863 | return ns; | |
864 | } | |
865 | ||
866 | void drbd_resume_al(struct drbd_conf *mdev) | |
867 | { | |
868 | if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags)) | |
869 | dev_info(DEV, "Resumed AL updates\n"); | |
870 | } | |
871 | ||
872 | /* helper for __drbd_set_state */ | |
873 | static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs) | |
874 | { | |
875 | if (mdev->tconn->agreed_pro_version < 90) | |
876 | mdev->ov_start_sector = 0; | |
877 | mdev->rs_total = drbd_bm_bits(mdev); | |
878 | mdev->ov_position = 0; | |
879 | if (cs == C_VERIFY_T) { | |
880 | /* starting online verify from an arbitrary position | |
881 | * does not fit well into the existing protocol. | |
882 | * on C_VERIFY_T, we initialize ov_left and friends | |
883 | * implicitly in receive_DataRequest once the | |
884 | * first P_OV_REQUEST is received */ | |
885 | mdev->ov_start_sector = ~(sector_t)0; | |
886 | } else { | |
887 | unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector); | |
888 | if (bit >= mdev->rs_total) { | |
889 | mdev->ov_start_sector = | |
890 | BM_BIT_TO_SECT(mdev->rs_total - 1); | |
891 | mdev->rs_total = 1; | |
892 | } else | |
893 | mdev->rs_total -= bit; | |
894 | mdev->ov_position = mdev->ov_start_sector; | |
895 | } | |
896 | mdev->ov_left = mdev->rs_total; | |
897 | } | |
898 | ||
899 | /** | |
900 | * __drbd_set_state() - Set a new DRBD state | |
901 | * @mdev: DRBD device. | |
902 | * @ns: new state. | |
903 | * @flags: Flags | |
904 | * @done: Optional completion, that will get completed after the after_state_ch() finished | |
905 | * | |
906 | * Caller needs to hold req_lock, and global_state_lock. Do not call directly. | |
907 | */ | |
908 | enum drbd_state_rv | |
909 | __drbd_set_state(struct drbd_conf *mdev, union drbd_state ns, | |
910 | enum chg_state_flags flags, struct completion *done) | |
911 | { | |
912 | union drbd_state os; | |
913 | enum drbd_state_rv rv = SS_SUCCESS; | |
d942ae44 | 914 | enum sanitize_state_warnings ssw; |
b8907339 PR |
915 | struct after_state_chg_work *ascw; |
916 | ||
78bae59b | 917 | os = drbd_read_state(mdev); |
b8907339 | 918 | |
d942ae44 | 919 | ns = sanitize_state(mdev, ns, &ssw); |
b8907339 PR |
920 | if (ns.i == os.i) |
921 | return SS_NOTHING_TO_DO; | |
922 | ||
3509502d PR |
923 | rv = is_valid_transition(os, ns); |
924 | if (rv < SS_SUCCESS) | |
925 | return rv; | |
926 | ||
b8907339 PR |
927 | if (!(flags & CS_HARD)) { |
928 | /* pre-state-change checks ; only look at ns */ | |
929 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
930 | ||
931 | rv = is_valid_state(mdev, ns); | |
932 | if (rv < SS_SUCCESS) { | |
933 | /* If the old state was illegal as well, then let | |
934 | this happen...*/ | |
935 | ||
936 | if (is_valid_state(mdev, os) == rv) | |
a1096a6e | 937 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 | 938 | } else |
a1096a6e | 939 | rv = is_valid_soft_transition(os, ns, mdev->tconn); |
b8907339 PR |
940 | } |
941 | ||
942 | if (rv < SS_SUCCESS) { | |
943 | if (flags & CS_VERBOSE) | |
944 | print_st_err(mdev, os, ns, rv); | |
945 | return rv; | |
946 | } | |
947 | ||
d942ae44 | 948 | print_sanitize_warnings(mdev, ssw); |
b8907339 | 949 | |
435693e8 | 950 | drbd_pr_state_change(mdev, os, ns, flags); |
b8907339 | 951 | |
706cb24c PR |
952 | /* Display changes to the susp* flags that where caused by the call to |
953 | sanitize_state(). Only display it here if we where not called from | |
954 | _conn_request_state() */ | |
955 | if (!(flags & CS_DC_SUSP)) | |
956 | conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP); | |
957 | ||
b8907339 PR |
958 | /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference |
959 | * on the ldev here, to be sure the transition -> D_DISKLESS resp. | |
960 | * drbd_ldev_destroy() won't happen before our corresponding | |
961 | * after_state_ch works run, where we put_ldev again. */ | |
962 | if ((os.disk != D_FAILED && ns.disk == D_FAILED) || | |
963 | (os.disk != D_DISKLESS && ns.disk == D_DISKLESS)) | |
964 | atomic_inc(&mdev->local_cnt); | |
965 | ||
da9fbc27 | 966 | mdev->state.i = ns.i; |
8e0af25f PR |
967 | mdev->tconn->susp = ns.susp; |
968 | mdev->tconn->susp_nod = ns.susp_nod; | |
969 | mdev->tconn->susp_fen = ns.susp_fen; | |
b8907339 PR |
970 | |
971 | if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING) | |
972 | drbd_print_uuids(mdev, "attached to UUIDs"); | |
973 | ||
974 | wake_up(&mdev->misc_wait); | |
975 | wake_up(&mdev->state_wait); | |
2a67d8b9 | 976 | wake_up(&mdev->tconn->ping_wait); |
b8907339 | 977 | |
58ffa580 LE |
978 | /* Aborted verify run, or we reached the stop sector. |
979 | * Log the last position, unless end-of-device. */ | |
b8907339 | 980 | if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) && |
58ffa580 | 981 | ns.conn <= C_CONNECTED) { |
b8907339 PR |
982 | mdev->ov_start_sector = |
983 | BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left); | |
58ffa580 LE |
984 | if (mdev->ov_left) |
985 | dev_info(DEV, "Online Verify reached sector %llu\n", | |
986 | (unsigned long long)mdev->ov_start_sector); | |
b8907339 PR |
987 | } |
988 | ||
989 | if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) && | |
990 | (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) { | |
991 | dev_info(DEV, "Syncer continues.\n"); | |
992 | mdev->rs_paused += (long)jiffies | |
993 | -(long)mdev->rs_mark_time[mdev->rs_last_mark]; | |
994 | if (ns.conn == C_SYNC_TARGET) | |
995 | mod_timer(&mdev->resync_timer, jiffies); | |
996 | } | |
997 | ||
998 | if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) && | |
999 | (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) { | |
1000 | dev_info(DEV, "Resync suspended\n"); | |
1001 | mdev->rs_mark_time[mdev->rs_last_mark] = jiffies; | |
1002 | } | |
1003 | ||
1004 | if (os.conn == C_CONNECTED && | |
1005 | (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) { | |
1006 | unsigned long now = jiffies; | |
1007 | int i; | |
1008 | ||
1009 | set_ov_position(mdev, ns.conn); | |
1010 | mdev->rs_start = now; | |
1011 | mdev->rs_last_events = 0; | |
1012 | mdev->rs_last_sect_ev = 0; | |
1013 | mdev->ov_last_oos_size = 0; | |
1014 | mdev->ov_last_oos_start = 0; | |
1015 | ||
1016 | for (i = 0; i < DRBD_SYNC_MARKS; i++) { | |
1017 | mdev->rs_mark_left[i] = mdev->ov_left; | |
1018 | mdev->rs_mark_time[i] = now; | |
1019 | } | |
1020 | ||
1021 | drbd_rs_controller_reset(mdev); | |
1022 | ||
1023 | if (ns.conn == C_VERIFY_S) { | |
1024 | dev_info(DEV, "Starting Online Verify from sector %llu\n", | |
1025 | (unsigned long long)mdev->ov_position); | |
1026 | mod_timer(&mdev->resync_timer, jiffies); | |
1027 | } | |
1028 | } | |
1029 | ||
1030 | if (get_ldev(mdev)) { | |
1031 | u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND| | |
1032 | MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE| | |
1033 | MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY); | |
1034 | ||
d5d7ebd4 | 1035 | mdf &= ~MDF_AL_CLEAN; |
b8907339 PR |
1036 | if (test_bit(CRASHED_PRIMARY, &mdev->flags)) |
1037 | mdf |= MDF_CRASHED_PRIMARY; | |
1038 | if (mdev->state.role == R_PRIMARY || | |
1039 | (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY)) | |
1040 | mdf |= MDF_PRIMARY_IND; | |
1041 | if (mdev->state.conn > C_WF_REPORT_PARAMS) | |
1042 | mdf |= MDF_CONNECTED_IND; | |
1043 | if (mdev->state.disk > D_INCONSISTENT) | |
1044 | mdf |= MDF_CONSISTENT; | |
1045 | if (mdev->state.disk > D_OUTDATED) | |
1046 | mdf |= MDF_WAS_UP_TO_DATE; | |
1047 | if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT) | |
1048 | mdf |= MDF_PEER_OUT_DATED; | |
1049 | if (mdf != mdev->ldev->md.flags) { | |
1050 | mdev->ldev->md.flags = mdf; | |
1051 | drbd_md_mark_dirty(mdev); | |
1052 | } | |
1053 | if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT) | |
1054 | drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]); | |
1055 | put_ldev(mdev); | |
1056 | } | |
1057 | ||
1058 | /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */ | |
1059 | if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT && | |
1060 | os.peer == R_SECONDARY && ns.peer == R_PRIMARY) | |
1061 | set_bit(CONSIDER_RESYNC, &mdev->flags); | |
1062 | ||
1063 | /* Receiver should clean up itself */ | |
1064 | if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING) | |
1065 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1066 | ||
1067 | /* Now the receiver finished cleaning up itself, it should die */ | |
1068 | if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE) | |
1069 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1070 | ||
1071 | /* Upon network failure, we need to restart the receiver. */ | |
823bd832 | 1072 | if (os.conn > C_WF_CONNECTION && |
b8907339 PR |
1073 | ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT) |
1074 | drbd_thread_restart_nowait(&mdev->tconn->receiver); | |
1075 | ||
1076 | /* Resume AL writing if we get a connection */ | |
1077 | if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED) | |
1078 | drbd_resume_al(mdev); | |
1079 | ||
07be15b1 LE |
1080 | /* remember last attach time so request_timer_fn() won't |
1081 | * kill newly established sessions while we are still trying to thaw | |
1082 | * previously frozen IO */ | |
1083 | if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) && | |
1084 | ns.disk > D_NEGOTIATING) | |
1085 | mdev->last_reattach_jif = jiffies; | |
1086 | ||
b8907339 PR |
1087 | ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC); |
1088 | if (ascw) { | |
1089 | ascw->os = os; | |
1090 | ascw->ns = ns; | |
1091 | ascw->flags = flags; | |
1092 | ascw->w.cb = w_after_state_ch; | |
a21e9298 | 1093 | ascw->w.mdev = mdev; |
b8907339 | 1094 | ascw->done = done; |
d5b27b01 | 1095 | drbd_queue_work(&mdev->tconn->sender_work, &ascw->w); |
b8907339 | 1096 | } else { |
bbeb641c | 1097 | dev_err(DEV, "Could not kmalloc an ascw\n"); |
b8907339 PR |
1098 | } |
1099 | ||
1100 | return rv; | |
1101 | } | |
1102 | ||
99920dc5 | 1103 | static int w_after_state_ch(struct drbd_work *w, int unused) |
b8907339 PR |
1104 | { |
1105 | struct after_state_chg_work *ascw = | |
1106 | container_of(w, struct after_state_chg_work, w); | |
00d56944 | 1107 | struct drbd_conf *mdev = w->mdev; |
b8907339 PR |
1108 | |
1109 | after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags); | |
1110 | if (ascw->flags & CS_WAIT_COMPLETE) { | |
1111 | D_ASSERT(ascw->done != NULL); | |
1112 | complete(ascw->done); | |
1113 | } | |
1114 | kfree(ascw); | |
1115 | ||
99920dc5 | 1116 | return 0; |
b8907339 PR |
1117 | } |
1118 | ||
1119 | static void abw_start_sync(struct drbd_conf *mdev, int rv) | |
1120 | { | |
1121 | if (rv) { | |
1122 | dev_err(DEV, "Writing the bitmap failed not starting resync.\n"); | |
1123 | _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE); | |
1124 | return; | |
1125 | } | |
1126 | ||
1127 | switch (mdev->state.conn) { | |
1128 | case C_STARTING_SYNC_T: | |
1129 | _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE); | |
1130 | break; | |
1131 | case C_STARTING_SYNC_S: | |
1132 | drbd_start_resync(mdev, C_SYNC_SOURCE); | |
1133 | break; | |
1134 | } | |
1135 | } | |
1136 | ||
1137 | int drbd_bitmap_io_from_worker(struct drbd_conf *mdev, | |
1138 | int (*io_fn)(struct drbd_conf *), | |
1139 | char *why, enum bm_flag flags) | |
1140 | { | |
1141 | int rv; | |
1142 | ||
1143 | D_ASSERT(current == mdev->tconn->worker.task); | |
1144 | ||
1145 | /* open coded non-blocking drbd_suspend_io(mdev); */ | |
1146 | set_bit(SUSPEND_IO, &mdev->flags); | |
1147 | ||
1148 | drbd_bm_lock(mdev, why, flags); | |
1149 | rv = io_fn(mdev); | |
1150 | drbd_bm_unlock(mdev); | |
1151 | ||
1152 | drbd_resume_io(mdev); | |
1153 | ||
1154 | return rv; | |
1155 | } | |
1156 | ||
1157 | /** | |
1158 | * after_state_ch() - Perform after state change actions that may sleep | |
1159 | * @mdev: DRBD device. | |
1160 | * @os: old state. | |
1161 | * @ns: new state. | |
1162 | * @flags: Flags | |
1163 | */ | |
1164 | static void after_state_ch(struct drbd_conf *mdev, union drbd_state os, | |
1165 | union drbd_state ns, enum chg_state_flags flags) | |
1166 | { | |
3b98c0c2 LE |
1167 | struct sib_info sib; |
1168 | ||
1169 | sib.sib_reason = SIB_STATE_CHANGE; | |
1170 | sib.os = os; | |
1171 | sib.ns = ns; | |
b8907339 PR |
1172 | |
1173 | if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) { | |
1174 | clear_bit(CRASHED_PRIMARY, &mdev->flags); | |
1175 | if (mdev->p_uuid) | |
1176 | mdev->p_uuid[UI_FLAGS] &= ~((u64)2); | |
1177 | } | |
1178 | ||
b8907339 | 1179 | /* Inform userspace about the change... */ |
3b98c0c2 | 1180 | drbd_bcast_event(mdev, &sib); |
b8907339 PR |
1181 | |
1182 | if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) && | |
1183 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) | |
1184 | drbd_khelper(mdev, "pri-on-incon-degr"); | |
1185 | ||
1186 | /* Here we have the actions that are performed after a | |
1187 | state change. This function might sleep */ | |
1188 | ||
b8907339 | 1189 | if (ns.susp_nod) { |
892fdd1a | 1190 | struct drbd_tconn *tconn = mdev->tconn; |
a6d00c8e PR |
1191 | enum drbd_req_event what = NOTHING; |
1192 | ||
892fdd1a PR |
1193 | spin_lock_irq(&tconn->req_lock); |
1194 | if (os.conn < C_CONNECTED && conn_lowest_conn(tconn) >= C_CONNECTED) | |
b8907339 PR |
1195 | what = RESEND; |
1196 | ||
3fb4746d | 1197 | if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) && |
892fdd1a | 1198 | conn_lowest_disk(tconn) > D_NEGOTIATING) |
b8907339 PR |
1199 | what = RESTART_FROZEN_DISK_IO; |
1200 | ||
892fdd1a PR |
1201 | if (tconn->susp_nod && what != NOTHING) { |
1202 | _tl_restart(tconn, what); | |
1203 | _conn_request_state(tconn, | |
1204 | (union drbd_state) { { .susp_nod = 1 } }, | |
1205 | (union drbd_state) { { .susp_nod = 0 } }, | |
1206 | CS_VERBOSE); | |
b8907339 | 1207 | } |
892fdd1a | 1208 | spin_unlock_irq(&tconn->req_lock); |
b8907339 PR |
1209 | } |
1210 | ||
88f79ec4 PR |
1211 | if (ns.susp_fen) { |
1212 | struct drbd_tconn *tconn = mdev->tconn; | |
1213 | ||
1214 | spin_lock_irq(&tconn->req_lock); | |
1215 | if (tconn->susp_fen && conn_lowest_conn(tconn) >= C_CONNECTED) { | |
1216 | /* case2: The connection was established again: */ | |
1217 | struct drbd_conf *odev; | |
1218 | int vnr; | |
1219 | ||
1220 | rcu_read_lock(); | |
1221 | idr_for_each_entry(&tconn->volumes, odev, vnr) | |
1222 | clear_bit(NEW_CUR_UUID, &odev->flags); | |
1223 | rcu_read_unlock(); | |
1224 | _tl_restart(tconn, RESEND); | |
1225 | _conn_request_state(tconn, | |
1226 | (union drbd_state) { { .susp_fen = 1 } }, | |
1227 | (union drbd_state) { { .susp_fen = 0 } }, | |
1228 | CS_VERBOSE); | |
1229 | } | |
1230 | spin_unlock_irq(&tconn->req_lock); | |
1231 | } | |
1232 | ||
b8907339 PR |
1233 | /* Became sync source. With protocol >= 96, we still need to send out |
1234 | * the sync uuid now. Need to do that before any drbd_send_state, or | |
1235 | * the other side may go "paused sync" before receiving the sync uuids, | |
1236 | * which is unexpected. */ | |
1237 | if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) && | |
1238 | (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) && | |
1239 | mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) { | |
1240 | drbd_gen_and_send_sync_uuid(mdev); | |
1241 | put_ldev(mdev); | |
1242 | } | |
1243 | ||
1244 | /* Do not change the order of the if above and the two below... */ | |
369bea63 PR |
1245 | if (os.pdsk == D_DISKLESS && |
1246 | ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */ | |
a324896b LE |
1247 | /* we probably will start a resync soon. |
1248 | * make sure those things are properly reset. */ | |
1249 | mdev->rs_total = 0; | |
1250 | mdev->rs_failed = 0; | |
1251 | atomic_set(&mdev->rs_pending_cnt, 0); | |
1252 | drbd_rs_cancel_all(mdev); | |
1253 | ||
b8907339 | 1254 | drbd_send_uuids(mdev); |
43de7c85 | 1255 | drbd_send_state(mdev, ns); |
b8907339 PR |
1256 | } |
1257 | /* No point in queuing send_bitmap if we don't have a connection | |
1258 | * anymore, so check also the _current_ state, not only the new state | |
1259 | * at the time this work was queued. */ | |
1260 | if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S && | |
1261 | mdev->state.conn == C_WF_BITMAP_S) | |
1262 | drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL, | |
1263 | "send_bitmap (WFBitMapS)", | |
1264 | BM_LOCKED_TEST_ALLOWED); | |
1265 | ||
1266 | /* Lost contact to peer's copy of the data */ | |
1267 | if ((os.pdsk >= D_INCONSISTENT && | |
1268 | os.pdsk != D_UNKNOWN && | |
1269 | os.pdsk != D_OUTDATED) | |
1270 | && (ns.pdsk < D_INCONSISTENT || | |
1271 | ns.pdsk == D_UNKNOWN || | |
1272 | ns.pdsk == D_OUTDATED)) { | |
1273 | if (get_ldev(mdev)) { | |
1274 | if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) && | |
1275 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
2aebfabb | 1276 | if (drbd_suspended(mdev)) { |
b8907339 PR |
1277 | set_bit(NEW_CUR_UUID, &mdev->flags); |
1278 | } else { | |
1279 | drbd_uuid_new_current(mdev); | |
1280 | drbd_send_uuids(mdev); | |
1281 | } | |
1282 | } | |
1283 | put_ldev(mdev); | |
1284 | } | |
1285 | } | |
1286 | ||
1287 | if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) { | |
0cfac5dd PR |
1288 | if (os.peer == R_SECONDARY && ns.peer == R_PRIMARY && |
1289 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
1290 | drbd_uuid_new_current(mdev); | |
1291 | drbd_send_uuids(mdev); | |
1292 | } | |
b8907339 PR |
1293 | /* D_DISKLESS Peer becomes secondary */ |
1294 | if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY) | |
1295 | /* We may still be Primary ourselves. | |
1296 | * No harm done if the bitmap still changes, | |
1297 | * redirtied pages will follow later. */ | |
1298 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1299 | "demote diskless peer", BM_LOCKED_SET_ALLOWED); | |
1300 | put_ldev(mdev); | |
1301 | } | |
1302 | ||
1303 | /* Write out all changed bits on demote. | |
1304 | * Though, no need to da that just yet | |
1305 | * if there is a resync going on still */ | |
1306 | if (os.role == R_PRIMARY && ns.role == R_SECONDARY && | |
1307 | mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) { | |
1308 | /* No changes to the bitmap expected this time, so assert that, | |
1309 | * even though no harm was done if it did change. */ | |
1310 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1311 | "demote", BM_LOCKED_TEST_ALLOWED); | |
1312 | put_ldev(mdev); | |
1313 | } | |
1314 | ||
1315 | /* Last part of the attaching process ... */ | |
1316 | if (ns.conn >= C_CONNECTED && | |
1317 | os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) { | |
1318 | drbd_send_sizes(mdev, 0, 0); /* to start sync... */ | |
1319 | drbd_send_uuids(mdev); | |
43de7c85 | 1320 | drbd_send_state(mdev, ns); |
b8907339 PR |
1321 | } |
1322 | ||
1323 | /* We want to pause/continue resync, tell peer. */ | |
1324 | if (ns.conn >= C_CONNECTED && | |
1325 | ((os.aftr_isp != ns.aftr_isp) || | |
1326 | (os.user_isp != ns.user_isp))) | |
43de7c85 | 1327 | drbd_send_state(mdev, ns); |
b8907339 PR |
1328 | |
1329 | /* In case one of the isp bits got set, suspend other devices. */ | |
1330 | if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) && | |
1331 | (ns.aftr_isp || ns.peer_isp || ns.user_isp)) | |
1332 | suspend_other_sg(mdev); | |
1333 | ||
1334 | /* Make sure the peer gets informed about eventual state | |
1335 | changes (ISP bits) while we were in WFReportParams. */ | |
1336 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED) | |
43de7c85 | 1337 | drbd_send_state(mdev, ns); |
b8907339 PR |
1338 | |
1339 | if (os.conn != C_AHEAD && ns.conn == C_AHEAD) | |
43de7c85 | 1340 | drbd_send_state(mdev, ns); |
b8907339 PR |
1341 | |
1342 | /* We are in the progress to start a full sync... */ | |
1343 | if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
1344 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S)) | |
1345 | /* no other bitmap changes expected during this phase */ | |
1346 | drbd_queue_bitmap_io(mdev, | |
1347 | &drbd_bmio_set_n_write, &abw_start_sync, | |
1348 | "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED); | |
1349 | ||
1350 | /* We are invalidating our self... */ | |
1351 | if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED && | |
1352 | os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT) | |
1353 | /* other bitmap operation expected during this phase */ | |
1354 | drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL, | |
1355 | "set_n_write from invalidate", BM_LOCKED_MASK); | |
1356 | ||
1357 | /* first half of local IO error, failure to attach, | |
1358 | * or administrative detach */ | |
1359 | if (os.disk != D_FAILED && ns.disk == D_FAILED) { | |
32db80f6 PR |
1360 | enum drbd_io_error_p eh = EP_PASS_ON; |
1361 | int was_io_error = 0; | |
b8907339 | 1362 | /* corresponding get_ldev was in __drbd_set_state, to serialize |
32db80f6 PR |
1363 | * our cleanup here with the transition to D_DISKLESS. |
1364 | * But is is still not save to dreference ldev here, since | |
1365 | * we might come from an failed Attach before ldev was set. */ | |
1366 | if (mdev->ldev) { | |
1367 | rcu_read_lock(); | |
1368 | eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error; | |
1369 | rcu_read_unlock(); | |
1370 | ||
1371 | was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags); | |
1372 | ||
6f1a6563 LE |
1373 | if (was_io_error && eh == EP_CALL_HELPER) |
1374 | drbd_khelper(mdev, "local-io-error"); | |
1375 | ||
0c849666 LE |
1376 | /* Immediately allow completion of all application IO, |
1377 | * that waits for completion from the local disk, | |
1378 | * if this was a force-detach due to disk_timeout | |
1379 | * or administrator request (drbdsetup detach --force). | |
1380 | * Do NOT abort otherwise. | |
1381 | * Aborting local requests may cause serious problems, | |
1382 | * if requests are completed to upper layers already, | |
1383 | * and then later the already submitted local bio completes. | |
1384 | * This can cause DMA into former bio pages that meanwhile | |
1385 | * have been re-used for other things. | |
1386 | * So aborting local requests may cause crashes, | |
1387 | * or even worse, silent data corruption. | |
1388 | */ | |
1389 | if (test_and_clear_bit(FORCE_DETACH, &mdev->flags)) | |
1390 | tl_abort_disk_io(mdev); | |
32db80f6 PR |
1391 | |
1392 | /* current state still has to be D_FAILED, | |
1393 | * there is only one way out: to D_DISKLESS, | |
1394 | * and that may only happen after our put_ldev below. */ | |
1395 | if (mdev->state.disk != D_FAILED) | |
1396 | dev_err(DEV, | |
1397 | "ASSERT FAILED: disk is %s during detach\n", | |
1398 | drbd_disk_str(mdev->state.disk)); | |
1399 | ||
1400 | if (ns.conn >= C_CONNECTED) | |
1401 | drbd_send_state(mdev, ns); | |
1402 | ||
1403 | drbd_rs_cancel_all(mdev); | |
1404 | ||
1405 | /* In case we want to get something to stable storage still, | |
1406 | * this may be the last chance. | |
1407 | * Following put_ldev may transition to D_DISKLESS. */ | |
1408 | drbd_md_sync(mdev); | |
1409 | } | |
b8907339 | 1410 | put_ldev(mdev); |
b8907339 PR |
1411 | } |
1412 | ||
1413 | /* second half of local IO error, failure to attach, | |
1414 | * or administrative detach, | |
1415 | * after local_cnt references have reached zero again */ | |
1416 | if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) { | |
1417 | /* We must still be diskless, | |
1418 | * re-attach has to be serialized with this! */ | |
1419 | if (mdev->state.disk != D_DISKLESS) | |
1420 | dev_err(DEV, | |
1421 | "ASSERT FAILED: disk is %s while going diskless\n", | |
1422 | drbd_disk_str(mdev->state.disk)); | |
1423 | ||
6ab9b1b6 PR |
1424 | if (ns.conn >= C_CONNECTED) |
1425 | drbd_send_state(mdev, ns); | |
b8907339 PR |
1426 | /* corresponding get_ldev in __drbd_set_state |
1427 | * this may finally trigger drbd_ldev_destroy. */ | |
1428 | put_ldev(mdev); | |
1429 | } | |
1430 | ||
1431 | /* Notify peer that I had a local IO error, and did not detached.. */ | |
6ab9b1b6 | 1432 | if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT && ns.conn >= C_CONNECTED) |
43de7c85 | 1433 | drbd_send_state(mdev, ns); |
b8907339 PR |
1434 | |
1435 | /* Disks got bigger while they were detached */ | |
1436 | if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING && | |
1437 | test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) { | |
1438 | if (ns.conn == C_CONNECTED) | |
1439 | resync_after_online_grow(mdev); | |
1440 | } | |
1441 | ||
1442 | /* A resync finished or aborted, wake paused devices... */ | |
1443 | if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) || | |
1444 | (os.peer_isp && !ns.peer_isp) || | |
1445 | (os.user_isp && !ns.user_isp)) | |
1446 | resume_next_sg(mdev); | |
1447 | ||
1448 | /* sync target done with resync. Explicitly notify peer, even though | |
1449 | * it should (at least for non-empty resyncs) already know itself. */ | |
1450 | if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED) | |
43de7c85 | 1451 | drbd_send_state(mdev, ns); |
b8907339 | 1452 | |
58ffa580 LE |
1453 | /* Verify finished, or reached stop sector. Peer did not know about |
1454 | * the stop sector, and we may even have changed the stop sector during | |
1455 | * verify to interrupt/stop early. Send the new state. */ | |
1456 | if (os.conn == C_VERIFY_S && ns.conn == C_CONNECTED | |
1457 | && verify_can_do_stop_sector(mdev)) | |
1458 | drbd_send_state(mdev, ns); | |
1459 | ||
a1096a6e PR |
1460 | /* Wake up role changes, that were delayed because of connection establishing */ |
1461 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn != C_WF_REPORT_PARAMS) { | |
1462 | if (test_and_clear_bit(STATE_SENT, &mdev->tconn->flags)) | |
1463 | wake_up(&mdev->state_wait); | |
1464 | } | |
1465 | ||
b8907339 PR |
1466 | /* This triggers bitmap writeout of potentially still unwritten pages |
1467 | * if the resync finished cleanly, or aborted because of peer disk | |
1468 | * failure, or because of connection loss. | |
1469 | * For resync aborted because of local disk failure, we cannot do | |
1470 | * any bitmap writeout anymore. | |
1471 | * No harm done if some bits change during this phase. | |
1472 | */ | |
1473 | if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) { | |
a220d291 LE |
1474 | drbd_queue_bitmap_io(mdev, &drbd_bm_write_copy_pages, NULL, |
1475 | "write from resync_finished", BM_LOCKED_CHANGE_ALLOWED); | |
b8907339 PR |
1476 | put_ldev(mdev); |
1477 | } | |
1478 | ||
1479 | if (ns.disk == D_DISKLESS && | |
1480 | ns.conn == C_STANDALONE && | |
1481 | ns.role == R_SECONDARY) { | |
1482 | if (os.aftr_isp != ns.aftr_isp) | |
1483 | resume_next_sg(mdev); | |
1484 | } | |
1485 | ||
b8907339 PR |
1486 | drbd_md_sync(mdev); |
1487 | } | |
1488 | ||
bbeb641c PR |
1489 | struct after_conn_state_chg_work { |
1490 | struct drbd_work w; | |
1491 | enum drbd_conns oc; | |
8c7e16c3 | 1492 | union drbd_state ns_min; |
5f082f98 | 1493 | union drbd_state ns_max; /* new, max state, over all mdevs */ |
bbeb641c PR |
1494 | enum chg_state_flags flags; |
1495 | }; | |
1496 | ||
99920dc5 | 1497 | static int w_after_conn_state_ch(struct drbd_work *w, int unused) |
bbeb641c PR |
1498 | { |
1499 | struct after_conn_state_chg_work *acscw = | |
1500 | container_of(w, struct after_conn_state_chg_work, w); | |
1501 | struct drbd_tconn *tconn = w->tconn; | |
1502 | enum drbd_conns oc = acscw->oc; | |
5f082f98 | 1503 | union drbd_state ns_max = acscw->ns_max; |
a6d00c8e PR |
1504 | struct drbd_conf *mdev; |
1505 | int vnr; | |
bbeb641c PR |
1506 | |
1507 | kfree(acscw); | |
1508 | ||
b8907339 | 1509 | /* Upon network configuration, we need to start the receiver */ |
5f082f98 | 1510 | if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED) |
b8907339 PR |
1511 | drbd_thread_start(&tconn->receiver); |
1512 | ||
f3dfa40a LE |
1513 | if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) { |
1514 | struct net_conf *old_conf; | |
1515 | ||
a0095508 | 1516 | mutex_lock(&tconn->conf_update); |
f3dfa40a | 1517 | old_conf = tconn->net_conf; |
089c075d AG |
1518 | tconn->my_addr_len = 0; |
1519 | tconn->peer_addr_len = 0; | |
f3dfa40a LE |
1520 | rcu_assign_pointer(tconn->net_conf, NULL); |
1521 | conn_free_crypto(tconn); | |
a0095508 | 1522 | mutex_unlock(&tconn->conf_update); |
f3dfa40a LE |
1523 | |
1524 | synchronize_rcu(); | |
1525 | kfree(old_conf); | |
1526 | } | |
1527 | ||
a6d00c8e PR |
1528 | if (ns_max.susp_fen) { |
1529 | /* case1: The outdate peer handler is successful: */ | |
1530 | if (ns_max.pdsk <= D_OUTDATED) { | |
695d08fa | 1531 | rcu_read_lock(); |
a6d00c8e PR |
1532 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1533 | if (test_bit(NEW_CUR_UUID, &mdev->flags)) { | |
1534 | drbd_uuid_new_current(mdev); | |
1535 | clear_bit(NEW_CUR_UUID, &mdev->flags); | |
1536 | } | |
1537 | } | |
695d08fa | 1538 | rcu_read_unlock(); |
8a0bab2a PR |
1539 | spin_lock_irq(&tconn->req_lock); |
1540 | _tl_restart(tconn, CONNECTION_LOST_WHILE_PENDING); | |
1541 | _conn_request_state(tconn, | |
1542 | (union drbd_state) { { .susp_fen = 1 } }, | |
1543 | (union drbd_state) { { .susp_fen = 0 } }, | |
1544 | CS_VERBOSE); | |
1545 | spin_unlock_irq(&tconn->req_lock); | |
a6d00c8e | 1546 | } |
a6d00c8e | 1547 | } |
9dc9fbb3 | 1548 | kref_put(&tconn->kref, &conn_destroy); |
99920dc5 | 1549 | return 0; |
bbeb641c PR |
1550 | } |
1551 | ||
435693e8 | 1552 | void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf) |
88ef594e | 1553 | { |
435693e8 | 1554 | enum chg_state_flags flags = ~0; |
88ef594e | 1555 | struct drbd_conf *mdev; |
435693e8 | 1556 | int vnr, first_vol = 1; |
e0e16653 PR |
1557 | union drbd_dev_state os, cs = { |
1558 | { .role = R_SECONDARY, | |
1559 | .peer = R_UNKNOWN, | |
1560 | .conn = tconn->cstate, | |
1561 | .disk = D_DISKLESS, | |
1562 | .pdsk = D_UNKNOWN, | |
1563 | } }; | |
88ef594e | 1564 | |
695d08fa | 1565 | rcu_read_lock(); |
88ef594e PR |
1566 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1567 | os = mdev->state; | |
1568 | ||
435693e8 PR |
1569 | if (first_vol) { |
1570 | cs = os; | |
1571 | first_vol = 0; | |
1572 | continue; | |
1573 | } | |
1574 | ||
1575 | if (cs.role != os.role) | |
1576 | flags &= ~CS_DC_ROLE; | |
1577 | ||
1578 | if (cs.peer != os.peer) | |
1579 | flags &= ~CS_DC_PEER; | |
1580 | ||
1581 | if (cs.conn != os.conn) | |
1582 | flags &= ~CS_DC_CONN; | |
88ef594e | 1583 | |
435693e8 PR |
1584 | if (cs.disk != os.disk) |
1585 | flags &= ~CS_DC_DISK; | |
88ef594e | 1586 | |
435693e8 PR |
1587 | if (cs.pdsk != os.pdsk) |
1588 | flags &= ~CS_DC_PDSK; | |
1589 | } | |
695d08fa | 1590 | rcu_read_unlock(); |
435693e8 PR |
1591 | |
1592 | *pf |= CS_DC_MASK; | |
1593 | *pf &= flags; | |
da9fbc27 | 1594 | (*pcs).i = cs.i; |
88ef594e | 1595 | } |
bbeb641c | 1596 | |
bd0c824a PR |
1597 | static enum drbd_state_rv |
1598 | conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
88ef594e | 1599 | enum chg_state_flags flags) |
bbeb641c | 1600 | { |
bd0c824a | 1601 | enum drbd_state_rv rv = SS_SUCCESS; |
bbeb641c | 1602 | union drbd_state ns, os; |
bd0c824a PR |
1603 | struct drbd_conf *mdev; |
1604 | int vnr; | |
bbeb641c | 1605 | |
695d08fa | 1606 | rcu_read_lock(); |
bd0c824a | 1607 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
78bae59b | 1608 | os = drbd_read_state(mdev); |
bd0c824a PR |
1609 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
1610 | ||
778bcf2e PR |
1611 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1612 | ns.disk = os.disk; | |
1613 | ||
bd0c824a PR |
1614 | if (ns.i == os.i) |
1615 | continue; | |
bbeb641c | 1616 | |
bd0c824a PR |
1617 | rv = is_valid_transition(os, ns); |
1618 | if (rv < SS_SUCCESS) | |
1619 | break; | |
1620 | ||
1621 | if (!(flags & CS_HARD)) { | |
1622 | rv = is_valid_state(mdev, ns); | |
1623 | if (rv < SS_SUCCESS) { | |
1624 | if (is_valid_state(mdev, os) == rv) | |
a1096a6e | 1625 | rv = is_valid_soft_transition(os, ns, tconn); |
bd0c824a | 1626 | } else |
a1096a6e | 1627 | rv = is_valid_soft_transition(os, ns, tconn); |
bd0c824a PR |
1628 | } |
1629 | if (rv < SS_SUCCESS) | |
1630 | break; | |
bbeb641c | 1631 | } |
695d08fa | 1632 | rcu_read_unlock(); |
bbeb641c | 1633 | |
bd0c824a PR |
1634 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) |
1635 | print_st_err(mdev, os, ns, rv); | |
1636 | ||
1637 | return rv; | |
bbeb641c PR |
1638 | } |
1639 | ||
8c7e16c3 | 1640 | void |
bd0c824a | 1641 | conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, |
8c7e16c3 | 1642 | union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags) |
bbeb641c | 1643 | { |
f132f554 | 1644 | union drbd_state ns, os, ns_max = { }; |
8c7e16c3 PR |
1645 | union drbd_state ns_min = { |
1646 | { .role = R_MASK, | |
1647 | .peer = R_MASK, | |
e0e16653 | 1648 | .conn = val.conn, |
8c7e16c3 PR |
1649 | .disk = D_MASK, |
1650 | .pdsk = D_MASK | |
1651 | } }; | |
bd0c824a | 1652 | struct drbd_conf *mdev; |
bbeb641c | 1653 | enum drbd_state_rv rv; |
f132f554 | 1654 | int vnr, number_of_volumes = 0; |
bbeb641c | 1655 | |
07be15b1 LE |
1656 | if (mask.conn == C_MASK) { |
1657 | /* remember last connect time so request_timer_fn() won't | |
1658 | * kill newly established sessions while we are still trying to thaw | |
1659 | * previously frozen IO */ | |
1660 | if (tconn->cstate != C_WF_REPORT_PARAMS && val.conn == C_WF_REPORT_PARAMS) | |
1661 | tconn->last_reconnect_jif = jiffies; | |
1662 | ||
bd0c824a | 1663 | tconn->cstate = val.conn; |
07be15b1 | 1664 | } |
bd0c824a | 1665 | |
695d08fa | 1666 | rcu_read_lock(); |
bd0c824a | 1667 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
f132f554 | 1668 | number_of_volumes++; |
78bae59b | 1669 | os = drbd_read_state(mdev); |
bd0c824a PR |
1670 | ns = apply_mask_val(os, mask, val); |
1671 | ns = sanitize_state(mdev, ns, NULL); | |
bbeb641c | 1672 | |
778bcf2e PR |
1673 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1674 | ns.disk = os.disk; | |
1675 | ||
bd0c824a PR |
1676 | rv = __drbd_set_state(mdev, ns, flags, NULL); |
1677 | if (rv < SS_SUCCESS) | |
1678 | BUG(); | |
bbeb641c | 1679 | |
8c7e16c3 PR |
1680 | ns.i = mdev->state.i; |
1681 | ns_max.role = max_role(ns.role, ns_max.role); | |
1682 | ns_max.peer = max_role(ns.peer, ns_max.peer); | |
1683 | ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn); | |
1684 | ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk); | |
1685 | ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk); | |
1686 | ||
1687 | ns_min.role = min_role(ns.role, ns_min.role); | |
1688 | ns_min.peer = min_role(ns.peer, ns_min.peer); | |
1689 | ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn); | |
1690 | ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk); | |
1691 | ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk); | |
bd0c824a | 1692 | } |
695d08fa | 1693 | rcu_read_unlock(); |
bbeb641c | 1694 | |
f132f554 PR |
1695 | if (number_of_volumes == 0) { |
1696 | ns_min = ns_max = (union drbd_state) { { | |
1697 | .role = R_SECONDARY, | |
1698 | .peer = R_UNKNOWN, | |
1699 | .conn = val.conn, | |
1700 | .disk = D_DISKLESS, | |
1701 | .pdsk = D_UNKNOWN | |
1702 | } }; | |
1703 | } | |
1704 | ||
8c7e16c3 PR |
1705 | ns_min.susp = ns_max.susp = tconn->susp; |
1706 | ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod; | |
1707 | ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen; | |
1708 | ||
1709 | *pns_min = ns_min; | |
1710 | *pns_max = ns_max; | |
bbeb641c PR |
1711 | } |
1712 | ||
df24aa45 PR |
1713 | static enum drbd_state_rv |
1714 | _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val) | |
1715 | { | |
df24aa45 PR |
1716 | enum drbd_state_rv rv; |
1717 | ||
1718 | if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags)) | |
1719 | return SS_CW_SUCCESS; | |
1720 | ||
1721 | if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags)) | |
1722 | return SS_CW_FAILED_BY_PEER; | |
1723 | ||
df24aa45 PR |
1724 | rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR; |
1725 | ||
1726 | if (rv == SS_UNKNOWN_ERROR) | |
435693e8 | 1727 | rv = conn_is_valid_transition(tconn, mask, val, 0); |
df24aa45 | 1728 | |
bd0c824a PR |
1729 | if (rv == SS_SUCCESS) |
1730 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ | |
df24aa45 | 1731 | |
df24aa45 PR |
1732 | return rv; |
1733 | } | |
1734 | ||
bbeb641c PR |
1735 | enum drbd_state_rv |
1736 | _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1737 | enum chg_state_flags flags) | |
1738 | { | |
1739 | enum drbd_state_rv rv = SS_SUCCESS; | |
bbeb641c PR |
1740 | struct after_conn_state_chg_work *acscw; |
1741 | enum drbd_conns oc = tconn->cstate; | |
8c7e16c3 | 1742 | union drbd_state ns_max, ns_min, os; |
c02abda2 | 1743 | bool have_mutex = false; |
bbeb641c | 1744 | |
bbeb641c PR |
1745 | rv = is_valid_conn_transition(oc, val.conn); |
1746 | if (rv < SS_SUCCESS) | |
1747 | goto abort; | |
1748 | ||
88ef594e | 1749 | rv = conn_is_valid_transition(tconn, mask, val, flags); |
bbeb641c PR |
1750 | if (rv < SS_SUCCESS) |
1751 | goto abort; | |
1752 | ||
df24aa45 PR |
1753 | if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING && |
1754 | !(flags & (CS_LOCAL_ONLY | CS_HARD))) { | |
c02abda2 LE |
1755 | |
1756 | /* This will be a cluster-wide state change. | |
1757 | * Need to give up the spinlock, grab the mutex, | |
1758 | * then send the state change request, ... */ | |
1759 | spin_unlock_irq(&tconn->req_lock); | |
1760 | mutex_lock(&tconn->cstate_mutex); | |
1761 | have_mutex = true; | |
1762 | ||
1763 | set_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
1764 | if (conn_send_state_req(tconn, mask, val)) { | |
1765 | /* sending failed. */ | |
1766 | clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
1767 | rv = SS_CW_FAILED_BY_PEER; | |
1768 | /* need to re-aquire the spin lock, though */ | |
1769 | goto abort_unlocked; | |
1770 | } | |
1771 | ||
1772 | if (val.conn == C_DISCONNECTING) | |
1773 | set_bit(DISCONNECT_SENT, &tconn->flags); | |
1774 | ||
1775 | /* ... and re-aquire the spinlock. | |
1776 | * If _conn_rq_cond() returned >= SS_SUCCESS, we must call | |
1777 | * conn_set_state() within the same spinlock. */ | |
1778 | spin_lock_irq(&tconn->req_lock); | |
1779 | wait_event_lock_irq(tconn->ping_wait, | |
1780 | (rv = _conn_rq_cond(tconn, mask, val)), | |
1781 | tconn->req_lock, | |
1782 | ); | |
1783 | clear_bit(CONN_WD_ST_CHG_REQ, &tconn->flags); | |
df24aa45 PR |
1784 | if (rv < SS_SUCCESS) |
1785 | goto abort; | |
1786 | } | |
1787 | ||
435693e8 | 1788 | conn_old_common_state(tconn, &os, &flags); |
706cb24c | 1789 | flags |= CS_DC_SUSP; |
8c7e16c3 | 1790 | conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags); |
5f082f98 | 1791 | conn_pr_state_change(tconn, os, ns_max, flags); |
bbeb641c PR |
1792 | |
1793 | acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC); | |
1794 | if (acscw) { | |
435693e8 | 1795 | acscw->oc = os.conn; |
8c7e16c3 | 1796 | acscw->ns_min = ns_min; |
5f082f98 | 1797 | acscw->ns_max = ns_max; |
bbeb641c PR |
1798 | acscw->flags = flags; |
1799 | acscw->w.cb = w_after_conn_state_ch; | |
9dc9fbb3 | 1800 | kref_get(&tconn->kref); |
bbeb641c | 1801 | acscw->w.tconn = tconn; |
d5b27b01 | 1802 | drbd_queue_work(&tconn->sender_work, &acscw->w); |
bbeb641c PR |
1803 | } else { |
1804 | conn_err(tconn, "Could not kmalloc an acscw\n"); | |
b8907339 | 1805 | } |
bbeb641c | 1806 | |
a01842eb | 1807 | abort: |
c02abda2 LE |
1808 | if (have_mutex) { |
1809 | /* mutex_unlock() "... must not be used in interrupt context.", | |
1810 | * so give up the spinlock, then re-aquire it */ | |
1811 | spin_unlock_irq(&tconn->req_lock); | |
1812 | abort_unlocked: | |
1813 | mutex_unlock(&tconn->cstate_mutex); | |
1814 | spin_lock_irq(&tconn->req_lock); | |
1815 | } | |
1816 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) { | |
a01842eb PR |
1817 | conn_err(tconn, "State change failed: %s\n", drbd_set_st_err_str(rv)); |
1818 | conn_err(tconn, " state = { cs:%s }\n", drbd_conn_str(oc)); | |
1819 | conn_err(tconn, "wanted = { cs:%s }\n", drbd_conn_str(val.conn)); | |
1820 | } | |
bbeb641c PR |
1821 | return rv; |
1822 | } | |
1823 | ||
1824 | enum drbd_state_rv | |
1825 | conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1826 | enum chg_state_flags flags) | |
1827 | { | |
1828 | enum drbd_state_rv rv; | |
1829 | ||
1830 | spin_lock_irq(&tconn->req_lock); | |
1831 | rv = _conn_request_state(tconn, mask, val, flags); | |
1832 | spin_unlock_irq(&tconn->req_lock); | |
1833 | ||
1834 | return rv; | |
b8907339 | 1835 | } |