Commit | Line | Data |
---|---|---|
b8907339 PR |
1 | /* |
2 | drbd_state.c | |
3 | ||
4 | This file is part of DRBD by Philipp Reisner and Lars Ellenberg. | |
5 | ||
6 | Copyright (C) 2001-2008, LINBIT Information Technologies GmbH. | |
7 | Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>. | |
8 | Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>. | |
9 | ||
10 | Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev | |
11 | from Logicworks, Inc. for making SDP replication support possible. | |
12 | ||
13 | drbd is free software; you can redistribute it and/or modify | |
14 | it under the terms of the GNU General Public License as published by | |
15 | the Free Software Foundation; either version 2, or (at your option) | |
16 | any later version. | |
17 | ||
18 | drbd is distributed in the hope that it will be useful, | |
19 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
21 | GNU General Public License for more details. | |
22 | ||
23 | You should have received a copy of the GNU General Public License | |
24 | along with drbd; see the file COPYING. If not, write to | |
25 | the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. | |
26 | */ | |
27 | ||
28 | #include <linux/drbd_limits.h> | |
29 | #include "drbd_int.h" | |
30 | #include "drbd_req.h" | |
31 | ||
cdfda633 PR |
32 | /* in drbd_main.c */ |
33 | extern void tl_apply(struct drbd_conf *mdev, enum drbd_req_event what); | |
34 | ||
b8907339 PR |
35 | struct after_state_chg_work { |
36 | struct drbd_work w; | |
37 | union drbd_state os; | |
38 | union drbd_state ns; | |
39 | enum chg_state_flags flags; | |
40 | struct completion *done; | |
41 | }; | |
42 | ||
d942ae44 PR |
43 | enum sanitize_state_warnings { |
44 | NO_WARNING, | |
45 | ABORTED_ONLINE_VERIFY, | |
46 | ABORTED_RESYNC, | |
47 | CONNECTION_LOST_NEGOTIATING, | |
48 | IMPLICITLY_UPGRADED_DISK, | |
49 | IMPLICITLY_UPGRADED_PDSK, | |
50 | }; | |
51 | ||
99920dc5 | 52 | static int w_after_state_ch(struct drbd_work *w, int unused); |
b8907339 PR |
53 | static void after_state_ch(struct drbd_conf *mdev, union drbd_state os, |
54 | union drbd_state ns, enum chg_state_flags flags); | |
a75f34ad PR |
55 | static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state); |
56 | static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state); | |
3509502d | 57 | static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns); |
4308a0a3 | 58 | static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns, |
d942ae44 | 59 | enum sanitize_state_warnings *warn); |
b8907339 | 60 | |
2aebfabb PR |
61 | static inline bool is_susp(union drbd_state s) |
62 | { | |
63 | return s.susp || s.susp_nod || s.susp_fen; | |
64 | } | |
65 | ||
d0456c72 | 66 | bool conn_all_vols_unconf(struct drbd_tconn *tconn) |
0e29d163 PR |
67 | { |
68 | struct drbd_conf *mdev; | |
695d08fa | 69 | bool rv = true; |
e90285e0 | 70 | int vnr; |
0e29d163 | 71 | |
695d08fa | 72 | rcu_read_lock(); |
e90285e0 | 73 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
d0456c72 LE |
74 | if (mdev->state.disk != D_DISKLESS || |
75 | mdev->state.conn != C_STANDALONE || | |
695d08fa PR |
76 | mdev->state.role != R_SECONDARY) { |
77 | rv = false; | |
78 | break; | |
79 | } | |
0e29d163 | 80 | } |
695d08fa PR |
81 | rcu_read_unlock(); |
82 | ||
83 | return rv; | |
0e29d163 PR |
84 | } |
85 | ||
cb703454 PR |
86 | /* Unfortunately the states where not correctly ordered, when |
87 | they where defined. therefore can not use max_t() here. */ | |
88 | static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2) | |
89 | { | |
90 | if (role1 == R_PRIMARY || role2 == R_PRIMARY) | |
91 | return R_PRIMARY; | |
92 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
93 | return R_SECONDARY; | |
94 | return R_UNKNOWN; | |
95 | } | |
96 | static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2) | |
97 | { | |
98 | if (role1 == R_UNKNOWN || role2 == R_UNKNOWN) | |
99 | return R_UNKNOWN; | |
100 | if (role1 == R_SECONDARY || role2 == R_SECONDARY) | |
101 | return R_SECONDARY; | |
102 | return R_PRIMARY; | |
103 | } | |
104 | ||
105 | enum drbd_role conn_highest_role(struct drbd_tconn *tconn) | |
106 | { | |
107 | enum drbd_role role = R_UNKNOWN; | |
108 | struct drbd_conf *mdev; | |
109 | int vnr; | |
110 | ||
695d08fa | 111 | rcu_read_lock(); |
cb703454 PR |
112 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
113 | role = max_role(role, mdev->state.role); | |
695d08fa | 114 | rcu_read_unlock(); |
cb703454 PR |
115 | |
116 | return role; | |
117 | } | |
118 | ||
119 | enum drbd_role conn_highest_peer(struct drbd_tconn *tconn) | |
120 | { | |
121 | enum drbd_role peer = R_UNKNOWN; | |
122 | struct drbd_conf *mdev; | |
123 | int vnr; | |
124 | ||
695d08fa | 125 | rcu_read_lock(); |
cb703454 PR |
126 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
127 | peer = max_role(peer, mdev->state.peer); | |
695d08fa | 128 | rcu_read_unlock(); |
cb703454 PR |
129 | |
130 | return peer; | |
131 | } | |
132 | ||
133 | enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn) | |
134 | { | |
135 | enum drbd_disk_state ds = D_DISKLESS; | |
136 | struct drbd_conf *mdev; | |
137 | int vnr; | |
138 | ||
695d08fa | 139 | rcu_read_lock(); |
cb703454 PR |
140 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
141 | ds = max_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 142 | rcu_read_unlock(); |
cb703454 PR |
143 | |
144 | return ds; | |
145 | } | |
146 | ||
4669265a PR |
147 | enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn) |
148 | { | |
149 | enum drbd_disk_state ds = D_MASK; | |
150 | struct drbd_conf *mdev; | |
151 | int vnr; | |
152 | ||
695d08fa | 153 | rcu_read_lock(); |
4669265a PR |
154 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
155 | ds = min_t(enum drbd_disk_state, ds, mdev->state.disk); | |
695d08fa | 156 | rcu_read_unlock(); |
4669265a PR |
157 | |
158 | return ds; | |
159 | } | |
160 | ||
cb703454 PR |
161 | enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn) |
162 | { | |
163 | enum drbd_disk_state ds = D_DISKLESS; | |
164 | struct drbd_conf *mdev; | |
165 | int vnr; | |
166 | ||
695d08fa | 167 | rcu_read_lock(); |
cb703454 PR |
168 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
169 | ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk); | |
695d08fa | 170 | rcu_read_unlock(); |
cb703454 PR |
171 | |
172 | return ds; | |
173 | } | |
174 | ||
19f83c76 PR |
175 | enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn) |
176 | { | |
177 | enum drbd_conns conn = C_MASK; | |
178 | struct drbd_conf *mdev; | |
179 | int vnr; | |
180 | ||
695d08fa | 181 | rcu_read_lock(); |
19f83c76 PR |
182 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
183 | conn = min_t(enum drbd_conns, conn, mdev->state.conn); | |
695d08fa | 184 | rcu_read_unlock(); |
19f83c76 PR |
185 | |
186 | return conn; | |
187 | } | |
188 | ||
b8907339 PR |
189 | /** |
190 | * cl_wide_st_chg() - true if the state change is a cluster wide one | |
191 | * @mdev: DRBD device. | |
192 | * @os: old (current) state. | |
193 | * @ns: new (wanted) state. | |
194 | */ | |
195 | static int cl_wide_st_chg(struct drbd_conf *mdev, | |
196 | union drbd_state os, union drbd_state ns) | |
197 | { | |
198 | return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED && | |
199 | ((os.role != R_PRIMARY && ns.role == R_PRIMARY) || | |
200 | (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
201 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) || | |
202 | (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))) || | |
203 | (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) || | |
204 | (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S); | |
205 | } | |
206 | ||
56707f9e PR |
207 | static union drbd_state |
208 | apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val) | |
209 | { | |
210 | union drbd_state ns; | |
211 | ns.i = (os.i & ~mask.i) | val.i; | |
212 | return ns; | |
213 | } | |
214 | ||
b8907339 PR |
215 | enum drbd_state_rv |
216 | drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f, | |
217 | union drbd_state mask, union drbd_state val) | |
218 | { | |
219 | unsigned long flags; | |
56707f9e | 220 | union drbd_state ns; |
b8907339 PR |
221 | enum drbd_state_rv rv; |
222 | ||
223 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 224 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 225 | rv = _drbd_set_state(mdev, ns, f, NULL); |
b8907339 PR |
226 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
227 | ||
228 | return rv; | |
229 | } | |
230 | ||
231 | /** | |
232 | * drbd_force_state() - Impose a change which happens outside our control on our state | |
233 | * @mdev: DRBD device. | |
234 | * @mask: mask of state bits to change. | |
235 | * @val: value of new state bits. | |
236 | */ | |
237 | void drbd_force_state(struct drbd_conf *mdev, | |
238 | union drbd_state mask, union drbd_state val) | |
239 | { | |
240 | drbd_change_state(mdev, CS_HARD, mask, val); | |
241 | } | |
242 | ||
243 | static enum drbd_state_rv | |
244 | _req_st_cond(struct drbd_conf *mdev, union drbd_state mask, | |
245 | union drbd_state val) | |
246 | { | |
247 | union drbd_state os, ns; | |
248 | unsigned long flags; | |
249 | enum drbd_state_rv rv; | |
250 | ||
251 | if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags)) | |
252 | return SS_CW_SUCCESS; | |
253 | ||
254 | if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags)) | |
255 | return SS_CW_FAILED_BY_PEER; | |
256 | ||
b8907339 | 257 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); |
78bae59b | 258 | os = drbd_read_state(mdev); |
56707f9e | 259 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d PR |
260 | rv = is_valid_transition(os, ns); |
261 | if (rv == SS_SUCCESS) | |
262 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ | |
b8907339 PR |
263 | |
264 | if (!cl_wide_st_chg(mdev, os, ns)) | |
265 | rv = SS_CW_NO_NEED; | |
3509502d | 266 | if (rv == SS_UNKNOWN_ERROR) { |
b8907339 PR |
267 | rv = is_valid_state(mdev, ns); |
268 | if (rv == SS_SUCCESS) { | |
a75f34ad | 269 | rv = is_valid_soft_transition(os, ns); |
b8907339 PR |
270 | if (rv == SS_SUCCESS) |
271 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ | |
272 | } | |
273 | } | |
274 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
275 | ||
276 | return rv; | |
277 | } | |
278 | ||
279 | /** | |
280 | * drbd_req_state() - Perform an eventually cluster wide state change | |
281 | * @mdev: DRBD device. | |
282 | * @mask: mask of state bits to change. | |
283 | * @val: value of new state bits. | |
284 | * @f: flags | |
285 | * | |
286 | * Should not be called directly, use drbd_request_state() or | |
287 | * _drbd_request_state(). | |
288 | */ | |
289 | static enum drbd_state_rv | |
290 | drbd_req_state(struct drbd_conf *mdev, union drbd_state mask, | |
291 | union drbd_state val, enum chg_state_flags f) | |
292 | { | |
293 | struct completion done; | |
294 | unsigned long flags; | |
295 | union drbd_state os, ns; | |
296 | enum drbd_state_rv rv; | |
297 | ||
298 | init_completion(&done); | |
299 | ||
300 | if (f & CS_SERIALIZE) | |
8410da8f | 301 | mutex_lock(mdev->state_mutex); |
b8907339 PR |
302 | |
303 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 304 | os = drbd_read_state(mdev); |
56707f9e | 305 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
3509502d | 306 | rv = is_valid_transition(os, ns); |
3c5e5f6a LE |
307 | if (rv < SS_SUCCESS) { |
308 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
3509502d | 309 | goto abort; |
3c5e5f6a | 310 | } |
b8907339 PR |
311 | |
312 | if (cl_wide_st_chg(mdev, os, ns)) { | |
313 | rv = is_valid_state(mdev, ns); | |
314 | if (rv == SS_SUCCESS) | |
a75f34ad | 315 | rv = is_valid_soft_transition(os, ns); |
b8907339 PR |
316 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); |
317 | ||
318 | if (rv < SS_SUCCESS) { | |
319 | if (f & CS_VERBOSE) | |
320 | print_st_err(mdev, os, ns, rv); | |
321 | goto abort; | |
322 | } | |
323 | ||
d24ae219 | 324 | if (drbd_send_state_req(mdev, mask, val)) { |
b8907339 PR |
325 | rv = SS_CW_FAILED_BY_PEER; |
326 | if (f & CS_VERBOSE) | |
327 | print_st_err(mdev, os, ns, rv); | |
328 | goto abort; | |
329 | } | |
330 | ||
331 | wait_event(mdev->state_wait, | |
332 | (rv = _req_st_cond(mdev, mask, val))); | |
333 | ||
334 | if (rv < SS_SUCCESS) { | |
b8907339 PR |
335 | if (f & CS_VERBOSE) |
336 | print_st_err(mdev, os, ns, rv); | |
337 | goto abort; | |
338 | } | |
339 | spin_lock_irqsave(&mdev->tconn->req_lock, flags); | |
78bae59b | 340 | ns = apply_mask_val(drbd_read_state(mdev), mask, val); |
b8907339 | 341 | rv = _drbd_set_state(mdev, ns, f, &done); |
b8907339 PR |
342 | } else { |
343 | rv = _drbd_set_state(mdev, ns, f, &done); | |
344 | } | |
345 | ||
346 | spin_unlock_irqrestore(&mdev->tconn->req_lock, flags); | |
347 | ||
348 | if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) { | |
349 | D_ASSERT(current != mdev->tconn->worker.task); | |
350 | wait_for_completion(&done); | |
351 | } | |
352 | ||
353 | abort: | |
354 | if (f & CS_SERIALIZE) | |
8410da8f | 355 | mutex_unlock(mdev->state_mutex); |
b8907339 PR |
356 | |
357 | return rv; | |
358 | } | |
359 | ||
360 | /** | |
361 | * _drbd_request_state() - Request a state change (with flags) | |
362 | * @mdev: DRBD device. | |
363 | * @mask: mask of state bits to change. | |
364 | * @val: value of new state bits. | |
365 | * @f: flags | |
366 | * | |
367 | * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE | |
368 | * flag, or when logging of failed state change requests is not desired. | |
369 | */ | |
370 | enum drbd_state_rv | |
371 | _drbd_request_state(struct drbd_conf *mdev, union drbd_state mask, | |
372 | union drbd_state val, enum chg_state_flags f) | |
373 | { | |
374 | enum drbd_state_rv rv; | |
375 | ||
376 | wait_event(mdev->state_wait, | |
377 | (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE); | |
378 | ||
379 | return rv; | |
380 | } | |
381 | ||
382 | static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns) | |
383 | { | |
384 | dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n", | |
385 | name, | |
386 | drbd_conn_str(ns.conn), | |
387 | drbd_role_str(ns.role), | |
388 | drbd_role_str(ns.peer), | |
389 | drbd_disk_str(ns.disk), | |
390 | drbd_disk_str(ns.pdsk), | |
391 | is_susp(ns) ? 's' : 'r', | |
392 | ns.aftr_isp ? 'a' : '-', | |
393 | ns.peer_isp ? 'p' : '-', | |
394 | ns.user_isp ? 'u' : '-', | |
395 | ns.susp_fen ? 'F' : '-', | |
396 | ns.susp_nod ? 'N' : '-' | |
397 | ); | |
398 | } | |
399 | ||
400 | void print_st_err(struct drbd_conf *mdev, union drbd_state os, | |
401 | union drbd_state ns, enum drbd_state_rv err) | |
402 | { | |
403 | if (err == SS_IN_TRANSIENT_STATE) | |
404 | return; | |
405 | dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err)); | |
406 | print_st(mdev, " state", os); | |
407 | print_st(mdev, "wanted", ns); | |
408 | } | |
409 | ||
435693e8 | 410 | static long print_state_change(char *pb, union drbd_state os, union drbd_state ns, |
bbeb641c PR |
411 | enum chg_state_flags flags) |
412 | { | |
435693e8 | 413 | char *pbp; |
bbeb641c PR |
414 | pbp = pb; |
415 | *pbp = 0; | |
706cb24c | 416 | |
435693e8 | 417 | if (ns.role != os.role && flags & CS_DC_ROLE) |
bbeb641c PR |
418 | pbp += sprintf(pbp, "role( %s -> %s ) ", |
419 | drbd_role_str(os.role), | |
420 | drbd_role_str(ns.role)); | |
435693e8 | 421 | if (ns.peer != os.peer && flags & CS_DC_PEER) |
bbeb641c PR |
422 | pbp += sprintf(pbp, "peer( %s -> %s ) ", |
423 | drbd_role_str(os.peer), | |
424 | drbd_role_str(ns.peer)); | |
435693e8 | 425 | if (ns.conn != os.conn && flags & CS_DC_CONN) |
bbeb641c PR |
426 | pbp += sprintf(pbp, "conn( %s -> %s ) ", |
427 | drbd_conn_str(os.conn), | |
428 | drbd_conn_str(ns.conn)); | |
435693e8 | 429 | if (ns.disk != os.disk && flags & CS_DC_DISK) |
bbeb641c PR |
430 | pbp += sprintf(pbp, "disk( %s -> %s ) ", |
431 | drbd_disk_str(os.disk), | |
432 | drbd_disk_str(ns.disk)); | |
435693e8 | 433 | if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK) |
bbeb641c PR |
434 | pbp += sprintf(pbp, "pdsk( %s -> %s ) ", |
435 | drbd_disk_str(os.pdsk), | |
436 | drbd_disk_str(ns.pdsk)); | |
706cb24c PR |
437 | |
438 | return pbp - pb; | |
439 | } | |
440 | ||
441 | static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns, | |
442 | enum chg_state_flags flags) | |
443 | { | |
444 | char pb[300]; | |
445 | char *pbp = pb; | |
446 | ||
447 | pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK); | |
448 | ||
bbeb641c PR |
449 | if (ns.aftr_isp != os.aftr_isp) |
450 | pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ", | |
451 | os.aftr_isp, | |
452 | ns.aftr_isp); | |
453 | if (ns.peer_isp != os.peer_isp) | |
454 | pbp += sprintf(pbp, "peer_isp( %d -> %d ) ", | |
455 | os.peer_isp, | |
456 | ns.peer_isp); | |
457 | if (ns.user_isp != os.user_isp) | |
458 | pbp += sprintf(pbp, "user_isp( %d -> %d ) ", | |
459 | os.user_isp, | |
460 | ns.user_isp); | |
435693e8 | 461 | |
706cb24c | 462 | if (pbp != pb) |
bbeb641c PR |
463 | dev_info(DEV, "%s\n", pb); |
464 | } | |
b8907339 | 465 | |
435693e8 PR |
466 | static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns, |
467 | enum chg_state_flags flags) | |
468 | { | |
469 | char pb[300]; | |
706cb24c PR |
470 | char *pbp = pb; |
471 | ||
472 | pbp += print_state_change(pbp, os, ns, flags); | |
435693e8 | 473 | |
706cb24c PR |
474 | if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP) |
475 | pbp += sprintf(pbp, "susp( %d -> %d ) ", | |
476 | is_susp(os), | |
477 | is_susp(ns)); | |
478 | ||
479 | if (pbp != pb) | |
435693e8 PR |
480 | conn_info(tconn, "%s\n", pb); |
481 | } | |
482 | ||
483 | ||
b8907339 PR |
484 | /** |
485 | * is_valid_state() - Returns an SS_ error code if ns is not valid | |
486 | * @mdev: DRBD device. | |
487 | * @ns: State to consider. | |
488 | */ | |
489 | static enum drbd_state_rv | |
490 | is_valid_state(struct drbd_conf *mdev, union drbd_state ns) | |
491 | { | |
492 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
493 | ||
494 | enum drbd_fencing_p fp; | |
495 | enum drbd_state_rv rv = SS_SUCCESS; | |
44ed167d | 496 | struct net_conf *nc; |
b8907339 | 497 | |
daeda1cc | 498 | rcu_read_lock(); |
b8907339 PR |
499 | fp = FP_DONT_CARE; |
500 | if (get_ldev(mdev)) { | |
daeda1cc | 501 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; |
b8907339 PR |
502 | put_ldev(mdev); |
503 | } | |
504 | ||
44ed167d PR |
505 | nc = rcu_dereference(mdev->tconn->net_conf); |
506 | if (nc) { | |
507 | if (!nc->two_primaries && ns.role == R_PRIMARY) { | |
047e95e2 PR |
508 | if (ns.peer == R_PRIMARY) |
509 | rv = SS_TWO_PRIMARIES; | |
cb703454 | 510 | else if (conn_highest_peer(mdev->tconn) == R_PRIMARY) |
047e95e2 | 511 | rv = SS_O_VOL_PEER_PRI; |
44ed167d | 512 | } |
b8907339 PR |
513 | } |
514 | ||
515 | if (rv <= 0) | |
516 | /* already found a reason to abort */; | |
517 | else if (ns.role == R_SECONDARY && mdev->open_cnt) | |
518 | rv = SS_DEVICE_IN_USE; | |
519 | ||
520 | else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE) | |
521 | rv = SS_NO_UP_TO_DATE_DISK; | |
522 | ||
523 | else if (fp >= FP_RESOURCE && | |
524 | ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN) | |
525 | rv = SS_PRIMARY_NOP; | |
526 | ||
527 | else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT) | |
528 | rv = SS_NO_UP_TO_DATE_DISK; | |
529 | ||
530 | else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT) | |
531 | rv = SS_NO_LOCAL_DISK; | |
532 | ||
533 | else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT) | |
534 | rv = SS_NO_REMOTE_DISK; | |
535 | ||
536 | else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE) | |
537 | rv = SS_NO_UP_TO_DATE_DISK; | |
538 | ||
539 | else if ((ns.conn == C_CONNECTED || | |
540 | ns.conn == C_WF_BITMAP_S || | |
541 | ns.conn == C_SYNC_SOURCE || | |
542 | ns.conn == C_PAUSED_SYNC_S) && | |
543 | ns.disk == D_OUTDATED) | |
544 | rv = SS_CONNECTED_OUTDATES; | |
545 | ||
546 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
44ed167d | 547 | (nc->verify_alg[0] == 0)) |
b8907339 PR |
548 | rv = SS_NO_VERIFY_ALG; |
549 | ||
550 | else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
551 | mdev->tconn->agreed_pro_version < 88) | |
552 | rv = SS_NOT_SUPPORTED; | |
553 | ||
554 | else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN) | |
555 | rv = SS_CONNECTED_OUTDATES; | |
556 | ||
44ed167d PR |
557 | rcu_read_unlock(); |
558 | ||
b8907339 PR |
559 | return rv; |
560 | } | |
561 | ||
562 | /** | |
a75f34ad | 563 | * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible |
3509502d PR |
564 | * This function limits state transitions that may be declined by DRBD. I.e. |
565 | * user requests (aka soft transitions). | |
b8907339 PR |
566 | * @mdev: DRBD device. |
567 | * @ns: new state. | |
568 | * @os: old state. | |
569 | */ | |
570 | static enum drbd_state_rv | |
a75f34ad | 571 | is_valid_soft_transition(union drbd_state os, union drbd_state ns) |
b8907339 PR |
572 | { |
573 | enum drbd_state_rv rv = SS_SUCCESS; | |
574 | ||
575 | if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) && | |
576 | os.conn > C_CONNECTED) | |
577 | rv = SS_RESYNC_RUNNING; | |
578 | ||
579 | if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE) | |
580 | rv = SS_ALREADY_STANDALONE; | |
581 | ||
582 | if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS) | |
583 | rv = SS_IS_DISKLESS; | |
584 | ||
585 | if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED) | |
586 | rv = SS_NO_NET_CONFIG; | |
587 | ||
588 | if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING) | |
589 | rv = SS_LOWER_THAN_OUTDATED; | |
590 | ||
591 | if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED) | |
592 | rv = SS_IN_TRANSIENT_STATE; | |
593 | ||
2325eb66 PR |
594 | /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS) |
595 | rv = SS_IN_TRANSIENT_STATE; */ | |
b8907339 PR |
596 | |
597 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED) | |
598 | rv = SS_NEED_CONNECTION; | |
599 | ||
600 | if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && | |
601 | ns.conn != os.conn && os.conn > C_CONNECTED) | |
602 | rv = SS_RESYNC_RUNNING; | |
603 | ||
604 | if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) && | |
605 | os.conn < C_CONNECTED) | |
606 | rv = SS_NEED_CONNECTION; | |
607 | ||
608 | if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE) | |
609 | && os.conn < C_WF_REPORT_PARAMS) | |
610 | rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */ | |
611 | ||
612 | return rv; | |
613 | } | |
614 | ||
3509502d | 615 | static enum drbd_state_rv |
fda74117 | 616 | is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc) |
3509502d | 617 | { |
d9cc6e23 LE |
618 | /* no change -> nothing to do, at least for the connection part */ |
619 | if (oc == nc) | |
620 | return SS_NOTHING_TO_DO; | |
3509502d | 621 | |
d9cc6e23 LE |
622 | /* disconnect of an unconfigured connection does not make sense */ |
623 | if (oc == C_STANDALONE && nc == C_DISCONNECTING) | |
624 | return SS_ALREADY_STANDALONE; | |
625 | ||
626 | /* from C_STANDALONE, we start with C_UNCONNECTED */ | |
627 | if (oc == C_STANDALONE && nc != C_UNCONNECTED) | |
628 | return SS_NEED_CONNECTION; | |
3509502d PR |
629 | |
630 | /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */ | |
fda74117 | 631 | if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING) |
d9cc6e23 | 632 | return SS_IN_TRANSIENT_STATE; |
3509502d PR |
633 | |
634 | /* After C_DISCONNECTING only C_STANDALONE may follow */ | |
fda74117 | 635 | if (oc == C_DISCONNECTING && nc != C_STANDALONE) |
d9cc6e23 | 636 | return SS_IN_TRANSIENT_STATE; |
3509502d | 637 | |
d9cc6e23 | 638 | return SS_SUCCESS; |
fda74117 PR |
639 | } |
640 | ||
641 | ||
642 | /** | |
643 | * is_valid_transition() - Returns an SS_ error code if the state transition is not possible | |
644 | * This limits hard state transitions. Hard state transitions are facts there are | |
645 | * imposed on DRBD by the environment. E.g. disk broke or network broke down. | |
646 | * But those hard state transitions are still not allowed to do everything. | |
647 | * @ns: new state. | |
648 | * @os: old state. | |
649 | */ | |
650 | static enum drbd_state_rv | |
651 | is_valid_transition(union drbd_state os, union drbd_state ns) | |
652 | { | |
653 | enum drbd_state_rv rv; | |
654 | ||
655 | rv = is_valid_conn_transition(os.conn, ns.conn); | |
656 | ||
3509502d PR |
657 | /* we cannot fail (again) if we already detached */ |
658 | if (ns.disk == D_FAILED && os.disk == D_DISKLESS) | |
659 | rv = SS_IS_DISKLESS; | |
660 | ||
661 | return rv; | |
662 | } | |
663 | ||
d942ae44 PR |
664 | static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn) |
665 | { | |
666 | static const char *msg_table[] = { | |
667 | [NO_WARNING] = "", | |
668 | [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.", | |
669 | [ABORTED_RESYNC] = "Resync aborted.", | |
670 | [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!", | |
671 | [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk", | |
672 | [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk", | |
673 | }; | |
674 | ||
675 | if (warn != NO_WARNING) | |
676 | dev_warn(DEV, "%s\n", msg_table[warn]); | |
677 | } | |
678 | ||
b8907339 PR |
679 | /** |
680 | * sanitize_state() - Resolves implicitly necessary additional changes to a state transition | |
681 | * @mdev: DRBD device. | |
682 | * @os: old state. | |
683 | * @ns: new state. | |
684 | * @warn_sync_abort: | |
685 | * | |
686 | * When we loose connection, we have to set the state of the peers disk (pdsk) | |
687 | * to D_UNKNOWN. This rule and many more along those lines are in this function. | |
688 | */ | |
4308a0a3 | 689 | static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns, |
d942ae44 | 690 | enum sanitize_state_warnings *warn) |
b8907339 PR |
691 | { |
692 | enum drbd_fencing_p fp; | |
693 | enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max; | |
694 | ||
d942ae44 PR |
695 | if (warn) |
696 | *warn = NO_WARNING; | |
697 | ||
b8907339 PR |
698 | fp = FP_DONT_CARE; |
699 | if (get_ldev(mdev)) { | |
daeda1cc PR |
700 | rcu_read_lock(); |
701 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; | |
702 | rcu_read_unlock(); | |
b8907339 PR |
703 | put_ldev(mdev); |
704 | } | |
705 | ||
3509502d | 706 | /* Implications from connection to peer and peer_isp */ |
b8907339 PR |
707 | if (ns.conn < C_CONNECTED) { |
708 | ns.peer_isp = 0; | |
709 | ns.peer = R_UNKNOWN; | |
710 | if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT) | |
711 | ns.pdsk = D_UNKNOWN; | |
712 | } | |
713 | ||
714 | /* Clear the aftr_isp when becoming unconfigured */ | |
715 | if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY) | |
716 | ns.aftr_isp = 0; | |
717 | ||
4308a0a3 | 718 | /* An implication of the disk states onto the connection state */ |
b8907339 | 719 | /* Abort resync if a disk fails/detaches */ |
4308a0a3 | 720 | if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) { |
d942ae44 PR |
721 | if (warn) |
722 | *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ? | |
723 | ABORTED_ONLINE_VERIFY : ABORTED_RESYNC; | |
b8907339 PR |
724 | ns.conn = C_CONNECTED; |
725 | } | |
726 | ||
727 | /* Connection breaks down before we finished "Negotiating" */ | |
728 | if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING && | |
729 | get_ldev_if_state(mdev, D_NEGOTIATING)) { | |
730 | if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) { | |
731 | ns.disk = mdev->new_state_tmp.disk; | |
732 | ns.pdsk = mdev->new_state_tmp.pdsk; | |
733 | } else { | |
d942ae44 PR |
734 | if (warn) |
735 | *warn = CONNECTION_LOST_NEGOTIATING; | |
b8907339 PR |
736 | ns.disk = D_DISKLESS; |
737 | ns.pdsk = D_UNKNOWN; | |
738 | } | |
739 | put_ldev(mdev); | |
740 | } | |
741 | ||
742 | /* D_CONSISTENT and D_OUTDATED vanish when we get connected */ | |
743 | if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) { | |
744 | if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED) | |
745 | ns.disk = D_UP_TO_DATE; | |
746 | if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED) | |
747 | ns.pdsk = D_UP_TO_DATE; | |
748 | } | |
749 | ||
750 | /* Implications of the connection stat on the disk states */ | |
751 | disk_min = D_DISKLESS; | |
752 | disk_max = D_UP_TO_DATE; | |
753 | pdsk_min = D_INCONSISTENT; | |
754 | pdsk_max = D_UNKNOWN; | |
755 | switch ((enum drbd_conns)ns.conn) { | |
756 | case C_WF_BITMAP_T: | |
757 | case C_PAUSED_SYNC_T: | |
758 | case C_STARTING_SYNC_T: | |
759 | case C_WF_SYNC_UUID: | |
760 | case C_BEHIND: | |
761 | disk_min = D_INCONSISTENT; | |
762 | disk_max = D_OUTDATED; | |
763 | pdsk_min = D_UP_TO_DATE; | |
764 | pdsk_max = D_UP_TO_DATE; | |
765 | break; | |
766 | case C_VERIFY_S: | |
767 | case C_VERIFY_T: | |
768 | disk_min = D_UP_TO_DATE; | |
769 | disk_max = D_UP_TO_DATE; | |
770 | pdsk_min = D_UP_TO_DATE; | |
771 | pdsk_max = D_UP_TO_DATE; | |
772 | break; | |
773 | case C_CONNECTED: | |
774 | disk_min = D_DISKLESS; | |
775 | disk_max = D_UP_TO_DATE; | |
776 | pdsk_min = D_DISKLESS; | |
777 | pdsk_max = D_UP_TO_DATE; | |
778 | break; | |
779 | case C_WF_BITMAP_S: | |
780 | case C_PAUSED_SYNC_S: | |
781 | case C_STARTING_SYNC_S: | |
782 | case C_AHEAD: | |
783 | disk_min = D_UP_TO_DATE; | |
784 | disk_max = D_UP_TO_DATE; | |
785 | pdsk_min = D_INCONSISTENT; | |
786 | pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/ | |
787 | break; | |
788 | case C_SYNC_TARGET: | |
789 | disk_min = D_INCONSISTENT; | |
790 | disk_max = D_INCONSISTENT; | |
791 | pdsk_min = D_UP_TO_DATE; | |
792 | pdsk_max = D_UP_TO_DATE; | |
793 | break; | |
794 | case C_SYNC_SOURCE: | |
795 | disk_min = D_UP_TO_DATE; | |
796 | disk_max = D_UP_TO_DATE; | |
797 | pdsk_min = D_INCONSISTENT; | |
798 | pdsk_max = D_INCONSISTENT; | |
799 | break; | |
800 | case C_STANDALONE: | |
801 | case C_DISCONNECTING: | |
802 | case C_UNCONNECTED: | |
803 | case C_TIMEOUT: | |
804 | case C_BROKEN_PIPE: | |
805 | case C_NETWORK_FAILURE: | |
806 | case C_PROTOCOL_ERROR: | |
807 | case C_TEAR_DOWN: | |
808 | case C_WF_CONNECTION: | |
809 | case C_WF_REPORT_PARAMS: | |
810 | case C_MASK: | |
811 | break; | |
812 | } | |
813 | if (ns.disk > disk_max) | |
814 | ns.disk = disk_max; | |
815 | ||
816 | if (ns.disk < disk_min) { | |
d942ae44 PR |
817 | if (warn) |
818 | *warn = IMPLICITLY_UPGRADED_DISK; | |
b8907339 PR |
819 | ns.disk = disk_min; |
820 | } | |
821 | if (ns.pdsk > pdsk_max) | |
822 | ns.pdsk = pdsk_max; | |
823 | ||
824 | if (ns.pdsk < pdsk_min) { | |
d942ae44 PR |
825 | if (warn) |
826 | *warn = IMPLICITLY_UPGRADED_PDSK; | |
b8907339 PR |
827 | ns.pdsk = pdsk_min; |
828 | } | |
829 | ||
830 | if (fp == FP_STONITH && | |
4308a0a3 | 831 | (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED)) |
b8907339 PR |
832 | ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */ |
833 | ||
f399002e | 834 | if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO && |
4308a0a3 | 835 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) |
b8907339 PR |
836 | ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */ |
837 | ||
838 | if (ns.aftr_isp || ns.peer_isp || ns.user_isp) { | |
839 | if (ns.conn == C_SYNC_SOURCE) | |
840 | ns.conn = C_PAUSED_SYNC_S; | |
841 | if (ns.conn == C_SYNC_TARGET) | |
842 | ns.conn = C_PAUSED_SYNC_T; | |
843 | } else { | |
844 | if (ns.conn == C_PAUSED_SYNC_S) | |
845 | ns.conn = C_SYNC_SOURCE; | |
846 | if (ns.conn == C_PAUSED_SYNC_T) | |
847 | ns.conn = C_SYNC_TARGET; | |
848 | } | |
849 | ||
850 | return ns; | |
851 | } | |
852 | ||
853 | void drbd_resume_al(struct drbd_conf *mdev) | |
854 | { | |
855 | if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags)) | |
856 | dev_info(DEV, "Resumed AL updates\n"); | |
857 | } | |
858 | ||
859 | /* helper for __drbd_set_state */ | |
860 | static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs) | |
861 | { | |
862 | if (mdev->tconn->agreed_pro_version < 90) | |
863 | mdev->ov_start_sector = 0; | |
864 | mdev->rs_total = drbd_bm_bits(mdev); | |
865 | mdev->ov_position = 0; | |
866 | if (cs == C_VERIFY_T) { | |
867 | /* starting online verify from an arbitrary position | |
868 | * does not fit well into the existing protocol. | |
869 | * on C_VERIFY_T, we initialize ov_left and friends | |
870 | * implicitly in receive_DataRequest once the | |
871 | * first P_OV_REQUEST is received */ | |
872 | mdev->ov_start_sector = ~(sector_t)0; | |
873 | } else { | |
874 | unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector); | |
875 | if (bit >= mdev->rs_total) { | |
876 | mdev->ov_start_sector = | |
877 | BM_BIT_TO_SECT(mdev->rs_total - 1); | |
878 | mdev->rs_total = 1; | |
879 | } else | |
880 | mdev->rs_total -= bit; | |
881 | mdev->ov_position = mdev->ov_start_sector; | |
882 | } | |
883 | mdev->ov_left = mdev->rs_total; | |
884 | } | |
885 | ||
886 | /** | |
887 | * __drbd_set_state() - Set a new DRBD state | |
888 | * @mdev: DRBD device. | |
889 | * @ns: new state. | |
890 | * @flags: Flags | |
891 | * @done: Optional completion, that will get completed after the after_state_ch() finished | |
892 | * | |
893 | * Caller needs to hold req_lock, and global_state_lock. Do not call directly. | |
894 | */ | |
895 | enum drbd_state_rv | |
896 | __drbd_set_state(struct drbd_conf *mdev, union drbd_state ns, | |
897 | enum chg_state_flags flags, struct completion *done) | |
898 | { | |
899 | union drbd_state os; | |
900 | enum drbd_state_rv rv = SS_SUCCESS; | |
d942ae44 | 901 | enum sanitize_state_warnings ssw; |
b8907339 PR |
902 | struct after_state_chg_work *ascw; |
903 | ||
78bae59b | 904 | os = drbd_read_state(mdev); |
b8907339 | 905 | |
d942ae44 | 906 | ns = sanitize_state(mdev, ns, &ssw); |
b8907339 PR |
907 | if (ns.i == os.i) |
908 | return SS_NOTHING_TO_DO; | |
909 | ||
3509502d PR |
910 | rv = is_valid_transition(os, ns); |
911 | if (rv < SS_SUCCESS) | |
912 | return rv; | |
913 | ||
b8907339 PR |
914 | if (!(flags & CS_HARD)) { |
915 | /* pre-state-change checks ; only look at ns */ | |
916 | /* See drbd_state_sw_errors in drbd_strings.c */ | |
917 | ||
918 | rv = is_valid_state(mdev, ns); | |
919 | if (rv < SS_SUCCESS) { | |
920 | /* If the old state was illegal as well, then let | |
921 | this happen...*/ | |
922 | ||
923 | if (is_valid_state(mdev, os) == rv) | |
a75f34ad | 924 | rv = is_valid_soft_transition(os, ns); |
b8907339 | 925 | } else |
a75f34ad | 926 | rv = is_valid_soft_transition(os, ns); |
b8907339 PR |
927 | } |
928 | ||
929 | if (rv < SS_SUCCESS) { | |
930 | if (flags & CS_VERBOSE) | |
931 | print_st_err(mdev, os, ns, rv); | |
932 | return rv; | |
933 | } | |
934 | ||
d942ae44 | 935 | print_sanitize_warnings(mdev, ssw); |
b8907339 | 936 | |
435693e8 | 937 | drbd_pr_state_change(mdev, os, ns, flags); |
b8907339 | 938 | |
706cb24c PR |
939 | /* Display changes to the susp* flags that where caused by the call to |
940 | sanitize_state(). Only display it here if we where not called from | |
941 | _conn_request_state() */ | |
942 | if (!(flags & CS_DC_SUSP)) | |
943 | conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP); | |
944 | ||
b8907339 PR |
945 | /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference |
946 | * on the ldev here, to be sure the transition -> D_DISKLESS resp. | |
947 | * drbd_ldev_destroy() won't happen before our corresponding | |
948 | * after_state_ch works run, where we put_ldev again. */ | |
949 | if ((os.disk != D_FAILED && ns.disk == D_FAILED) || | |
950 | (os.disk != D_DISKLESS && ns.disk == D_DISKLESS)) | |
951 | atomic_inc(&mdev->local_cnt); | |
952 | ||
da9fbc27 | 953 | mdev->state.i = ns.i; |
8e0af25f PR |
954 | mdev->tconn->susp = ns.susp; |
955 | mdev->tconn->susp_nod = ns.susp_nod; | |
956 | mdev->tconn->susp_fen = ns.susp_fen; | |
b8907339 PR |
957 | |
958 | if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING) | |
959 | drbd_print_uuids(mdev, "attached to UUIDs"); | |
960 | ||
961 | wake_up(&mdev->misc_wait); | |
962 | wake_up(&mdev->state_wait); | |
2a67d8b9 | 963 | wake_up(&mdev->tconn->ping_wait); |
b8907339 PR |
964 | |
965 | /* aborted verify run. log the last position */ | |
966 | if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) && | |
967 | ns.conn < C_CONNECTED) { | |
968 | mdev->ov_start_sector = | |
969 | BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left); | |
970 | dev_info(DEV, "Online Verify reached sector %llu\n", | |
971 | (unsigned long long)mdev->ov_start_sector); | |
972 | } | |
973 | ||
974 | if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) && | |
975 | (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) { | |
976 | dev_info(DEV, "Syncer continues.\n"); | |
977 | mdev->rs_paused += (long)jiffies | |
978 | -(long)mdev->rs_mark_time[mdev->rs_last_mark]; | |
979 | if (ns.conn == C_SYNC_TARGET) | |
980 | mod_timer(&mdev->resync_timer, jiffies); | |
981 | } | |
982 | ||
983 | if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) && | |
984 | (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) { | |
985 | dev_info(DEV, "Resync suspended\n"); | |
986 | mdev->rs_mark_time[mdev->rs_last_mark] = jiffies; | |
987 | } | |
988 | ||
989 | if (os.conn == C_CONNECTED && | |
990 | (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) { | |
991 | unsigned long now = jiffies; | |
992 | int i; | |
993 | ||
994 | set_ov_position(mdev, ns.conn); | |
995 | mdev->rs_start = now; | |
996 | mdev->rs_last_events = 0; | |
997 | mdev->rs_last_sect_ev = 0; | |
998 | mdev->ov_last_oos_size = 0; | |
999 | mdev->ov_last_oos_start = 0; | |
1000 | ||
1001 | for (i = 0; i < DRBD_SYNC_MARKS; i++) { | |
1002 | mdev->rs_mark_left[i] = mdev->ov_left; | |
1003 | mdev->rs_mark_time[i] = now; | |
1004 | } | |
1005 | ||
1006 | drbd_rs_controller_reset(mdev); | |
1007 | ||
1008 | if (ns.conn == C_VERIFY_S) { | |
1009 | dev_info(DEV, "Starting Online Verify from sector %llu\n", | |
1010 | (unsigned long long)mdev->ov_position); | |
1011 | mod_timer(&mdev->resync_timer, jiffies); | |
1012 | } | |
1013 | } | |
1014 | ||
1015 | if (get_ldev(mdev)) { | |
1016 | u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND| | |
1017 | MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE| | |
1018 | MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY); | |
1019 | ||
d5d7ebd4 | 1020 | mdf &= ~MDF_AL_CLEAN; |
b8907339 PR |
1021 | if (test_bit(CRASHED_PRIMARY, &mdev->flags)) |
1022 | mdf |= MDF_CRASHED_PRIMARY; | |
1023 | if (mdev->state.role == R_PRIMARY || | |
1024 | (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY)) | |
1025 | mdf |= MDF_PRIMARY_IND; | |
1026 | if (mdev->state.conn > C_WF_REPORT_PARAMS) | |
1027 | mdf |= MDF_CONNECTED_IND; | |
1028 | if (mdev->state.disk > D_INCONSISTENT) | |
1029 | mdf |= MDF_CONSISTENT; | |
1030 | if (mdev->state.disk > D_OUTDATED) | |
1031 | mdf |= MDF_WAS_UP_TO_DATE; | |
1032 | if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT) | |
1033 | mdf |= MDF_PEER_OUT_DATED; | |
1034 | if (mdf != mdev->ldev->md.flags) { | |
1035 | mdev->ldev->md.flags = mdf; | |
1036 | drbd_md_mark_dirty(mdev); | |
1037 | } | |
1038 | if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT) | |
1039 | drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]); | |
1040 | put_ldev(mdev); | |
1041 | } | |
1042 | ||
1043 | /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */ | |
1044 | if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT && | |
1045 | os.peer == R_SECONDARY && ns.peer == R_PRIMARY) | |
1046 | set_bit(CONSIDER_RESYNC, &mdev->flags); | |
1047 | ||
1048 | /* Receiver should clean up itself */ | |
1049 | if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING) | |
1050 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1051 | ||
1052 | /* Now the receiver finished cleaning up itself, it should die */ | |
1053 | if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE) | |
1054 | drbd_thread_stop_nowait(&mdev->tconn->receiver); | |
1055 | ||
1056 | /* Upon network failure, we need to restart the receiver. */ | |
1057 | if (os.conn > C_TEAR_DOWN && | |
1058 | ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT) | |
1059 | drbd_thread_restart_nowait(&mdev->tconn->receiver); | |
1060 | ||
1061 | /* Resume AL writing if we get a connection */ | |
1062 | if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED) | |
1063 | drbd_resume_al(mdev); | |
1064 | ||
1065 | ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC); | |
1066 | if (ascw) { | |
1067 | ascw->os = os; | |
1068 | ascw->ns = ns; | |
1069 | ascw->flags = flags; | |
1070 | ascw->w.cb = w_after_state_ch; | |
a21e9298 | 1071 | ascw->w.mdev = mdev; |
b8907339 PR |
1072 | ascw->done = done; |
1073 | drbd_queue_work(&mdev->tconn->data.work, &ascw->w); | |
1074 | } else { | |
bbeb641c | 1075 | dev_err(DEV, "Could not kmalloc an ascw\n"); |
b8907339 PR |
1076 | } |
1077 | ||
1078 | return rv; | |
1079 | } | |
1080 | ||
99920dc5 | 1081 | static int w_after_state_ch(struct drbd_work *w, int unused) |
b8907339 PR |
1082 | { |
1083 | struct after_state_chg_work *ascw = | |
1084 | container_of(w, struct after_state_chg_work, w); | |
00d56944 | 1085 | struct drbd_conf *mdev = w->mdev; |
b8907339 PR |
1086 | |
1087 | after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags); | |
1088 | if (ascw->flags & CS_WAIT_COMPLETE) { | |
1089 | D_ASSERT(ascw->done != NULL); | |
1090 | complete(ascw->done); | |
1091 | } | |
1092 | kfree(ascw); | |
1093 | ||
99920dc5 | 1094 | return 0; |
b8907339 PR |
1095 | } |
1096 | ||
1097 | static void abw_start_sync(struct drbd_conf *mdev, int rv) | |
1098 | { | |
1099 | if (rv) { | |
1100 | dev_err(DEV, "Writing the bitmap failed not starting resync.\n"); | |
1101 | _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE); | |
1102 | return; | |
1103 | } | |
1104 | ||
1105 | switch (mdev->state.conn) { | |
1106 | case C_STARTING_SYNC_T: | |
1107 | _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE); | |
1108 | break; | |
1109 | case C_STARTING_SYNC_S: | |
1110 | drbd_start_resync(mdev, C_SYNC_SOURCE); | |
1111 | break; | |
1112 | } | |
1113 | } | |
1114 | ||
1115 | int drbd_bitmap_io_from_worker(struct drbd_conf *mdev, | |
1116 | int (*io_fn)(struct drbd_conf *), | |
1117 | char *why, enum bm_flag flags) | |
1118 | { | |
1119 | int rv; | |
1120 | ||
1121 | D_ASSERT(current == mdev->tconn->worker.task); | |
1122 | ||
1123 | /* open coded non-blocking drbd_suspend_io(mdev); */ | |
1124 | set_bit(SUSPEND_IO, &mdev->flags); | |
1125 | ||
1126 | drbd_bm_lock(mdev, why, flags); | |
1127 | rv = io_fn(mdev); | |
1128 | drbd_bm_unlock(mdev); | |
1129 | ||
1130 | drbd_resume_io(mdev); | |
1131 | ||
1132 | return rv; | |
1133 | } | |
1134 | ||
1135 | /** | |
1136 | * after_state_ch() - Perform after state change actions that may sleep | |
1137 | * @mdev: DRBD device. | |
1138 | * @os: old state. | |
1139 | * @ns: new state. | |
1140 | * @flags: Flags | |
1141 | */ | |
1142 | static void after_state_ch(struct drbd_conf *mdev, union drbd_state os, | |
1143 | union drbd_state ns, enum chg_state_flags flags) | |
1144 | { | |
1145 | enum drbd_fencing_p fp; | |
3b98c0c2 LE |
1146 | struct sib_info sib; |
1147 | ||
1148 | sib.sib_reason = SIB_STATE_CHANGE; | |
1149 | sib.os = os; | |
1150 | sib.ns = ns; | |
b8907339 PR |
1151 | |
1152 | if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) { | |
1153 | clear_bit(CRASHED_PRIMARY, &mdev->flags); | |
1154 | if (mdev->p_uuid) | |
1155 | mdev->p_uuid[UI_FLAGS] &= ~((u64)2); | |
1156 | } | |
1157 | ||
1158 | fp = FP_DONT_CARE; | |
1159 | if (get_ldev(mdev)) { | |
daeda1cc PR |
1160 | rcu_read_lock(); |
1161 | fp = rcu_dereference(mdev->ldev->disk_conf)->fencing; | |
1162 | rcu_read_unlock(); | |
b8907339 PR |
1163 | put_ldev(mdev); |
1164 | } | |
1165 | ||
1166 | /* Inform userspace about the change... */ | |
3b98c0c2 | 1167 | drbd_bcast_event(mdev, &sib); |
b8907339 PR |
1168 | |
1169 | if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) && | |
1170 | (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)) | |
1171 | drbd_khelper(mdev, "pri-on-incon-degr"); | |
1172 | ||
1173 | /* Here we have the actions that are performed after a | |
1174 | state change. This function might sleep */ | |
1175 | ||
b8907339 | 1176 | if (ns.susp_nod) { |
a6d00c8e PR |
1177 | enum drbd_req_event what = NOTHING; |
1178 | ||
1179 | if (os.conn < C_CONNECTED && conn_lowest_conn(mdev->tconn) >= C_CONNECTED) | |
b8907339 PR |
1180 | what = RESEND; |
1181 | ||
a6d00c8e | 1182 | if (os.disk == D_ATTACHING && conn_lowest_disk(mdev->tconn) > D_ATTACHING) |
b8907339 PR |
1183 | what = RESTART_FROZEN_DISK_IO; |
1184 | ||
a6d00c8e | 1185 | if (what != NOTHING) { |
b8907339 | 1186 | spin_lock_irq(&mdev->tconn->req_lock); |
a6d00c8e PR |
1187 | _tl_restart(mdev->tconn, what); |
1188 | _drbd_set_state(_NS(mdev, susp_nod, 0), CS_VERBOSE, NULL); | |
b8907339 PR |
1189 | spin_unlock_irq(&mdev->tconn->req_lock); |
1190 | } | |
b8907339 PR |
1191 | } |
1192 | ||
1193 | /* Became sync source. With protocol >= 96, we still need to send out | |
1194 | * the sync uuid now. Need to do that before any drbd_send_state, or | |
1195 | * the other side may go "paused sync" before receiving the sync uuids, | |
1196 | * which is unexpected. */ | |
1197 | if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) && | |
1198 | (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) && | |
1199 | mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) { | |
1200 | drbd_gen_and_send_sync_uuid(mdev); | |
1201 | put_ldev(mdev); | |
1202 | } | |
1203 | ||
1204 | /* Do not change the order of the if above and the two below... */ | |
1205 | if (os.pdsk == D_DISKLESS && ns.pdsk > D_DISKLESS) { /* attach on the peer */ | |
1206 | drbd_send_uuids(mdev); | |
1207 | drbd_send_state(mdev); | |
1208 | } | |
1209 | /* No point in queuing send_bitmap if we don't have a connection | |
1210 | * anymore, so check also the _current_ state, not only the new state | |
1211 | * at the time this work was queued. */ | |
1212 | if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S && | |
1213 | mdev->state.conn == C_WF_BITMAP_S) | |
1214 | drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL, | |
1215 | "send_bitmap (WFBitMapS)", | |
1216 | BM_LOCKED_TEST_ALLOWED); | |
1217 | ||
1218 | /* Lost contact to peer's copy of the data */ | |
1219 | if ((os.pdsk >= D_INCONSISTENT && | |
1220 | os.pdsk != D_UNKNOWN && | |
1221 | os.pdsk != D_OUTDATED) | |
1222 | && (ns.pdsk < D_INCONSISTENT || | |
1223 | ns.pdsk == D_UNKNOWN || | |
1224 | ns.pdsk == D_OUTDATED)) { | |
1225 | if (get_ldev(mdev)) { | |
1226 | if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) && | |
1227 | mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) { | |
2aebfabb | 1228 | if (drbd_suspended(mdev)) { |
b8907339 PR |
1229 | set_bit(NEW_CUR_UUID, &mdev->flags); |
1230 | } else { | |
1231 | drbd_uuid_new_current(mdev); | |
1232 | drbd_send_uuids(mdev); | |
1233 | } | |
1234 | } | |
1235 | put_ldev(mdev); | |
1236 | } | |
1237 | } | |
1238 | ||
1239 | if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) { | |
1240 | if (ns.peer == R_PRIMARY && mdev->ldev->md.uuid[UI_BITMAP] == 0) { | |
1241 | drbd_uuid_new_current(mdev); | |
1242 | drbd_send_uuids(mdev); | |
1243 | } | |
1244 | ||
1245 | /* D_DISKLESS Peer becomes secondary */ | |
1246 | if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY) | |
1247 | /* We may still be Primary ourselves. | |
1248 | * No harm done if the bitmap still changes, | |
1249 | * redirtied pages will follow later. */ | |
1250 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1251 | "demote diskless peer", BM_LOCKED_SET_ALLOWED); | |
1252 | put_ldev(mdev); | |
1253 | } | |
1254 | ||
1255 | /* Write out all changed bits on demote. | |
1256 | * Though, no need to da that just yet | |
1257 | * if there is a resync going on still */ | |
1258 | if (os.role == R_PRIMARY && ns.role == R_SECONDARY && | |
1259 | mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) { | |
1260 | /* No changes to the bitmap expected this time, so assert that, | |
1261 | * even though no harm was done if it did change. */ | |
1262 | drbd_bitmap_io_from_worker(mdev, &drbd_bm_write, | |
1263 | "demote", BM_LOCKED_TEST_ALLOWED); | |
1264 | put_ldev(mdev); | |
1265 | } | |
1266 | ||
1267 | /* Last part of the attaching process ... */ | |
1268 | if (ns.conn >= C_CONNECTED && | |
1269 | os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) { | |
1270 | drbd_send_sizes(mdev, 0, 0); /* to start sync... */ | |
1271 | drbd_send_uuids(mdev); | |
1272 | drbd_send_state(mdev); | |
1273 | } | |
1274 | ||
1275 | /* We want to pause/continue resync, tell peer. */ | |
1276 | if (ns.conn >= C_CONNECTED && | |
1277 | ((os.aftr_isp != ns.aftr_isp) || | |
1278 | (os.user_isp != ns.user_isp))) | |
1279 | drbd_send_state(mdev); | |
1280 | ||
1281 | /* In case one of the isp bits got set, suspend other devices. */ | |
1282 | if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) && | |
1283 | (ns.aftr_isp || ns.peer_isp || ns.user_isp)) | |
1284 | suspend_other_sg(mdev); | |
1285 | ||
1286 | /* Make sure the peer gets informed about eventual state | |
1287 | changes (ISP bits) while we were in WFReportParams. */ | |
1288 | if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED) | |
1289 | drbd_send_state(mdev); | |
1290 | ||
1291 | if (os.conn != C_AHEAD && ns.conn == C_AHEAD) | |
1292 | drbd_send_state(mdev); | |
1293 | ||
1294 | /* We are in the progress to start a full sync... */ | |
1295 | if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) || | |
1296 | (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S)) | |
1297 | /* no other bitmap changes expected during this phase */ | |
1298 | drbd_queue_bitmap_io(mdev, | |
1299 | &drbd_bmio_set_n_write, &abw_start_sync, | |
1300 | "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED); | |
1301 | ||
1302 | /* We are invalidating our self... */ | |
1303 | if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED && | |
1304 | os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT) | |
1305 | /* other bitmap operation expected during this phase */ | |
1306 | drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL, | |
1307 | "set_n_write from invalidate", BM_LOCKED_MASK); | |
1308 | ||
1309 | /* first half of local IO error, failure to attach, | |
1310 | * or administrative detach */ | |
1311 | if (os.disk != D_FAILED && ns.disk == D_FAILED) { | |
1312 | enum drbd_io_error_p eh; | |
1313 | int was_io_error; | |
1314 | /* corresponding get_ldev was in __drbd_set_state, to serialize | |
1315 | * our cleanup here with the transition to D_DISKLESS, | |
1316 | * so it is safe to dreference ldev here. */ | |
daeda1cc PR |
1317 | rcu_read_lock(); |
1318 | eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error; | |
1319 | rcu_read_unlock(); | |
b8907339 PR |
1320 | was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags); |
1321 | ||
cdfda633 PR |
1322 | /* Immediately allow completion of all application IO, that waits |
1323 | for completion from the local disk. */ | |
1324 | tl_apply(mdev, ABORT_DISK_IO); | |
1325 | ||
b8907339 PR |
1326 | /* current state still has to be D_FAILED, |
1327 | * there is only one way out: to D_DISKLESS, | |
1328 | * and that may only happen after our put_ldev below. */ | |
1329 | if (mdev->state.disk != D_FAILED) | |
1330 | dev_err(DEV, | |
1331 | "ASSERT FAILED: disk is %s during detach\n", | |
1332 | drbd_disk_str(mdev->state.disk)); | |
1333 | ||
927036f9 | 1334 | if (!drbd_send_state(mdev)) |
4dbdae3e | 1335 | dev_info(DEV, "Notified peer that I am detaching my disk\n"); |
b8907339 PR |
1336 | |
1337 | drbd_rs_cancel_all(mdev); | |
1338 | ||
1339 | /* In case we want to get something to stable storage still, | |
1340 | * this may be the last chance. | |
1341 | * Following put_ldev may transition to D_DISKLESS. */ | |
1342 | drbd_md_sync(mdev); | |
1343 | put_ldev(mdev); | |
1344 | ||
1345 | if (was_io_error && eh == EP_CALL_HELPER) | |
1346 | drbd_khelper(mdev, "local-io-error"); | |
1347 | } | |
1348 | ||
1349 | /* second half of local IO error, failure to attach, | |
1350 | * or administrative detach, | |
1351 | * after local_cnt references have reached zero again */ | |
1352 | if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) { | |
1353 | /* We must still be diskless, | |
1354 | * re-attach has to be serialized with this! */ | |
1355 | if (mdev->state.disk != D_DISKLESS) | |
1356 | dev_err(DEV, | |
1357 | "ASSERT FAILED: disk is %s while going diskless\n", | |
1358 | drbd_disk_str(mdev->state.disk)); | |
1359 | ||
1360 | mdev->rs_total = 0; | |
1361 | mdev->rs_failed = 0; | |
1362 | atomic_set(&mdev->rs_pending_cnt, 0); | |
1363 | ||
927036f9 | 1364 | if (!drbd_send_state(mdev)) |
4dbdae3e | 1365 | dev_info(DEV, "Notified peer that I'm now diskless.\n"); |
b8907339 PR |
1366 | /* corresponding get_ldev in __drbd_set_state |
1367 | * this may finally trigger drbd_ldev_destroy. */ | |
1368 | put_ldev(mdev); | |
1369 | } | |
1370 | ||
1371 | /* Notify peer that I had a local IO error, and did not detached.. */ | |
1372 | if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT) | |
1373 | drbd_send_state(mdev); | |
1374 | ||
1375 | /* Disks got bigger while they were detached */ | |
1376 | if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING && | |
1377 | test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) { | |
1378 | if (ns.conn == C_CONNECTED) | |
1379 | resync_after_online_grow(mdev); | |
1380 | } | |
1381 | ||
1382 | /* A resync finished or aborted, wake paused devices... */ | |
1383 | if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) || | |
1384 | (os.peer_isp && !ns.peer_isp) || | |
1385 | (os.user_isp && !ns.user_isp)) | |
1386 | resume_next_sg(mdev); | |
1387 | ||
1388 | /* sync target done with resync. Explicitly notify peer, even though | |
1389 | * it should (at least for non-empty resyncs) already know itself. */ | |
1390 | if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED) | |
1391 | drbd_send_state(mdev); | |
1392 | ||
1393 | /* This triggers bitmap writeout of potentially still unwritten pages | |
1394 | * if the resync finished cleanly, or aborted because of peer disk | |
1395 | * failure, or because of connection loss. | |
1396 | * For resync aborted because of local disk failure, we cannot do | |
1397 | * any bitmap writeout anymore. | |
1398 | * No harm done if some bits change during this phase. | |
1399 | */ | |
1400 | if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) { | |
1401 | drbd_queue_bitmap_io(mdev, &drbd_bm_write, NULL, | |
1402 | "write from resync_finished", BM_LOCKED_SET_ALLOWED); | |
1403 | put_ldev(mdev); | |
1404 | } | |
1405 | ||
1406 | if (ns.disk == D_DISKLESS && | |
1407 | ns.conn == C_STANDALONE && | |
1408 | ns.role == R_SECONDARY) { | |
1409 | if (os.aftr_isp != ns.aftr_isp) | |
1410 | resume_next_sg(mdev); | |
1411 | } | |
1412 | ||
b8907339 PR |
1413 | drbd_md_sync(mdev); |
1414 | } | |
1415 | ||
bbeb641c PR |
1416 | struct after_conn_state_chg_work { |
1417 | struct drbd_work w; | |
1418 | enum drbd_conns oc; | |
8c7e16c3 | 1419 | union drbd_state ns_min; |
5f082f98 | 1420 | union drbd_state ns_max; /* new, max state, over all mdevs */ |
bbeb641c PR |
1421 | enum chg_state_flags flags; |
1422 | }; | |
1423 | ||
99920dc5 | 1424 | static int w_after_conn_state_ch(struct drbd_work *w, int unused) |
bbeb641c PR |
1425 | { |
1426 | struct after_conn_state_chg_work *acscw = | |
1427 | container_of(w, struct after_conn_state_chg_work, w); | |
1428 | struct drbd_tconn *tconn = w->tconn; | |
1429 | enum drbd_conns oc = acscw->oc; | |
5f082f98 | 1430 | union drbd_state ns_max = acscw->ns_max; |
a6d00c8e PR |
1431 | union drbd_state ns_min = acscw->ns_min; |
1432 | struct drbd_conf *mdev; | |
1433 | int vnr; | |
bbeb641c PR |
1434 | |
1435 | kfree(acscw); | |
1436 | ||
b8907339 | 1437 | /* Upon network configuration, we need to start the receiver */ |
5f082f98 | 1438 | if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED) |
b8907339 PR |
1439 | drbd_thread_start(&tconn->receiver); |
1440 | ||
f3dfa40a LE |
1441 | if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) { |
1442 | struct net_conf *old_conf; | |
1443 | ||
a0095508 | 1444 | mutex_lock(&tconn->conf_update); |
f3dfa40a | 1445 | old_conf = tconn->net_conf; |
089c075d AG |
1446 | tconn->my_addr_len = 0; |
1447 | tconn->peer_addr_len = 0; | |
f3dfa40a LE |
1448 | rcu_assign_pointer(tconn->net_conf, NULL); |
1449 | conn_free_crypto(tconn); | |
a0095508 | 1450 | mutex_unlock(&tconn->conf_update); |
f3dfa40a LE |
1451 | |
1452 | synchronize_rcu(); | |
1453 | kfree(old_conf); | |
1454 | } | |
1455 | ||
a6d00c8e PR |
1456 | if (ns_max.susp_fen) { |
1457 | /* case1: The outdate peer handler is successful: */ | |
1458 | if (ns_max.pdsk <= D_OUTDATED) { | |
1459 | tl_clear(tconn); | |
695d08fa | 1460 | rcu_read_lock(); |
a6d00c8e PR |
1461 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1462 | if (test_bit(NEW_CUR_UUID, &mdev->flags)) { | |
1463 | drbd_uuid_new_current(mdev); | |
1464 | clear_bit(NEW_CUR_UUID, &mdev->flags); | |
1465 | } | |
1466 | } | |
695d08fa | 1467 | rcu_read_unlock(); |
a6d00c8e PR |
1468 | conn_request_state(tconn, |
1469 | (union drbd_state) { { .susp_fen = 1 } }, | |
1470 | (union drbd_state) { { .susp_fen = 0 } }, | |
1471 | CS_VERBOSE); | |
1472 | } | |
1473 | /* case2: The connection was established again: */ | |
1474 | if (ns_min.conn >= C_CONNECTED) { | |
695d08fa | 1475 | rcu_read_lock(); |
a6d00c8e PR |
1476 | idr_for_each_entry(&tconn->volumes, mdev, vnr) |
1477 | clear_bit(NEW_CUR_UUID, &mdev->flags); | |
695d08fa | 1478 | rcu_read_unlock(); |
a6d00c8e PR |
1479 | spin_lock_irq(&tconn->req_lock); |
1480 | _tl_restart(tconn, RESEND); | |
1481 | _conn_request_state(tconn, | |
1482 | (union drbd_state) { { .susp_fen = 1 } }, | |
1483 | (union drbd_state) { { .susp_fen = 0 } }, | |
1484 | CS_VERBOSE); | |
1485 | spin_unlock_irq(&tconn->req_lock); | |
1486 | } | |
1487 | } | |
9dc9fbb3 | 1488 | kref_put(&tconn->kref, &conn_destroy); |
99920dc5 | 1489 | return 0; |
bbeb641c PR |
1490 | } |
1491 | ||
435693e8 | 1492 | void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf) |
88ef594e | 1493 | { |
435693e8 | 1494 | enum chg_state_flags flags = ~0; |
da9fbc27 | 1495 | union drbd_dev_state os, cs = {}; /* old_state, common_state */ |
88ef594e | 1496 | struct drbd_conf *mdev; |
435693e8 | 1497 | int vnr, first_vol = 1; |
88ef594e | 1498 | |
695d08fa | 1499 | rcu_read_lock(); |
88ef594e PR |
1500 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
1501 | os = mdev->state; | |
1502 | ||
435693e8 PR |
1503 | if (first_vol) { |
1504 | cs = os; | |
1505 | first_vol = 0; | |
1506 | continue; | |
1507 | } | |
1508 | ||
1509 | if (cs.role != os.role) | |
1510 | flags &= ~CS_DC_ROLE; | |
1511 | ||
1512 | if (cs.peer != os.peer) | |
1513 | flags &= ~CS_DC_PEER; | |
1514 | ||
1515 | if (cs.conn != os.conn) | |
1516 | flags &= ~CS_DC_CONN; | |
88ef594e | 1517 | |
435693e8 PR |
1518 | if (cs.disk != os.disk) |
1519 | flags &= ~CS_DC_DISK; | |
88ef594e | 1520 | |
435693e8 PR |
1521 | if (cs.pdsk != os.pdsk) |
1522 | flags &= ~CS_DC_PDSK; | |
1523 | } | |
695d08fa | 1524 | rcu_read_unlock(); |
435693e8 PR |
1525 | |
1526 | *pf |= CS_DC_MASK; | |
1527 | *pf &= flags; | |
da9fbc27 | 1528 | (*pcs).i = cs.i; |
88ef594e | 1529 | } |
bbeb641c | 1530 | |
bd0c824a PR |
1531 | static enum drbd_state_rv |
1532 | conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
88ef594e | 1533 | enum chg_state_flags flags) |
bbeb641c | 1534 | { |
bd0c824a | 1535 | enum drbd_state_rv rv = SS_SUCCESS; |
bbeb641c | 1536 | union drbd_state ns, os; |
bd0c824a PR |
1537 | struct drbd_conf *mdev; |
1538 | int vnr; | |
bbeb641c | 1539 | |
695d08fa | 1540 | rcu_read_lock(); |
bd0c824a | 1541 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
78bae59b | 1542 | os = drbd_read_state(mdev); |
bd0c824a PR |
1543 | ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL); |
1544 | ||
778bcf2e PR |
1545 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1546 | ns.disk = os.disk; | |
1547 | ||
bd0c824a PR |
1548 | if (ns.i == os.i) |
1549 | continue; | |
bbeb641c | 1550 | |
bd0c824a PR |
1551 | rv = is_valid_transition(os, ns); |
1552 | if (rv < SS_SUCCESS) | |
1553 | break; | |
1554 | ||
1555 | if (!(flags & CS_HARD)) { | |
1556 | rv = is_valid_state(mdev, ns); | |
1557 | if (rv < SS_SUCCESS) { | |
1558 | if (is_valid_state(mdev, os) == rv) | |
1559 | rv = is_valid_soft_transition(os, ns); | |
1560 | } else | |
1561 | rv = is_valid_soft_transition(os, ns); | |
1562 | } | |
1563 | if (rv < SS_SUCCESS) | |
1564 | break; | |
bbeb641c | 1565 | } |
695d08fa | 1566 | rcu_read_unlock(); |
bbeb641c | 1567 | |
bd0c824a PR |
1568 | if (rv < SS_SUCCESS && flags & CS_VERBOSE) |
1569 | print_st_err(mdev, os, ns, rv); | |
1570 | ||
1571 | return rv; | |
bbeb641c PR |
1572 | } |
1573 | ||
8c7e16c3 | 1574 | void |
bd0c824a | 1575 | conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, |
8c7e16c3 | 1576 | union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags) |
bbeb641c | 1577 | { |
8c7e16c3 PR |
1578 | union drbd_state ns, os, ns_max = { }; |
1579 | union drbd_state ns_min = { | |
1580 | { .role = R_MASK, | |
1581 | .peer = R_MASK, | |
1582 | .disk = D_MASK, | |
1583 | .pdsk = D_MASK | |
1584 | } }; | |
bd0c824a | 1585 | struct drbd_conf *mdev; |
bbeb641c | 1586 | enum drbd_state_rv rv; |
bd0c824a | 1587 | int vnr; |
bbeb641c | 1588 | |
bd0c824a PR |
1589 | if (mask.conn == C_MASK) |
1590 | tconn->cstate = val.conn; | |
1591 | ||
695d08fa | 1592 | rcu_read_lock(); |
bd0c824a | 1593 | idr_for_each_entry(&tconn->volumes, mdev, vnr) { |
78bae59b | 1594 | os = drbd_read_state(mdev); |
bd0c824a PR |
1595 | ns = apply_mask_val(os, mask, val); |
1596 | ns = sanitize_state(mdev, ns, NULL); | |
bbeb641c | 1597 | |
778bcf2e PR |
1598 | if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED) |
1599 | ns.disk = os.disk; | |
1600 | ||
bd0c824a PR |
1601 | rv = __drbd_set_state(mdev, ns, flags, NULL); |
1602 | if (rv < SS_SUCCESS) | |
1603 | BUG(); | |
bbeb641c | 1604 | |
8c7e16c3 PR |
1605 | ns.i = mdev->state.i; |
1606 | ns_max.role = max_role(ns.role, ns_max.role); | |
1607 | ns_max.peer = max_role(ns.peer, ns_max.peer); | |
1608 | ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn); | |
1609 | ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk); | |
1610 | ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk); | |
1611 | ||
1612 | ns_min.role = min_role(ns.role, ns_min.role); | |
1613 | ns_min.peer = min_role(ns.peer, ns_min.peer); | |
1614 | ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn); | |
1615 | ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk); | |
1616 | ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk); | |
bd0c824a | 1617 | } |
695d08fa | 1618 | rcu_read_unlock(); |
bbeb641c | 1619 | |
8c7e16c3 PR |
1620 | ns_min.susp = ns_max.susp = tconn->susp; |
1621 | ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod; | |
1622 | ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen; | |
1623 | ||
1624 | *pns_min = ns_min; | |
1625 | *pns_max = ns_max; | |
bbeb641c PR |
1626 | } |
1627 | ||
df24aa45 PR |
1628 | static enum drbd_state_rv |
1629 | _conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val) | |
1630 | { | |
df24aa45 PR |
1631 | enum drbd_state_rv rv; |
1632 | ||
1633 | if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags)) | |
1634 | return SS_CW_SUCCESS; | |
1635 | ||
1636 | if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags)) | |
1637 | return SS_CW_FAILED_BY_PEER; | |
1638 | ||
df24aa45 PR |
1639 | spin_lock_irq(&tconn->req_lock); |
1640 | rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR; | |
1641 | ||
1642 | if (rv == SS_UNKNOWN_ERROR) | |
435693e8 | 1643 | rv = conn_is_valid_transition(tconn, mask, val, 0); |
df24aa45 | 1644 | |
bd0c824a PR |
1645 | if (rv == SS_SUCCESS) |
1646 | rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */ | |
df24aa45 PR |
1647 | |
1648 | spin_unlock_irq(&tconn->req_lock); | |
1649 | ||
1650 | return rv; | |
1651 | } | |
1652 | ||
1653 | static enum drbd_state_rv | |
1654 | conn_cl_wide(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1655 | enum chg_state_flags f) | |
1656 | { | |
1657 | enum drbd_state_rv rv; | |
1658 | ||
1659 | spin_unlock_irq(&tconn->req_lock); | |
1660 | mutex_lock(&tconn->cstate_mutex); | |
1661 | ||
caee1c3a | 1662 | if (conn_send_state_req(tconn, mask, val)) { |
df24aa45 PR |
1663 | rv = SS_CW_FAILED_BY_PEER; |
1664 | /* if (f & CS_VERBOSE) | |
1665 | print_st_err(mdev, os, ns, rv); */ | |
1666 | goto abort; | |
1667 | } | |
1668 | ||
1669 | wait_event(tconn->ping_wait, (rv = _conn_rq_cond(tconn, mask, val))); | |
1670 | ||
1671 | abort: | |
1672 | mutex_unlock(&tconn->cstate_mutex); | |
1673 | spin_lock_irq(&tconn->req_lock); | |
1674 | ||
1675 | return rv; | |
1676 | } | |
1677 | ||
bbeb641c PR |
1678 | enum drbd_state_rv |
1679 | _conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1680 | enum chg_state_flags flags) | |
1681 | { | |
1682 | enum drbd_state_rv rv = SS_SUCCESS; | |
bbeb641c PR |
1683 | struct after_conn_state_chg_work *acscw; |
1684 | enum drbd_conns oc = tconn->cstate; | |
8c7e16c3 | 1685 | union drbd_state ns_max, ns_min, os; |
bbeb641c | 1686 | |
bbeb641c PR |
1687 | rv = is_valid_conn_transition(oc, val.conn); |
1688 | if (rv < SS_SUCCESS) | |
1689 | goto abort; | |
1690 | ||
88ef594e | 1691 | rv = conn_is_valid_transition(tconn, mask, val, flags); |
bbeb641c PR |
1692 | if (rv < SS_SUCCESS) |
1693 | goto abort; | |
1694 | ||
df24aa45 PR |
1695 | if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING && |
1696 | !(flags & (CS_LOCAL_ONLY | CS_HARD))) { | |
1697 | rv = conn_cl_wide(tconn, mask, val, flags); | |
1698 | if (rv < SS_SUCCESS) | |
1699 | goto abort; | |
1700 | } | |
1701 | ||
435693e8 | 1702 | conn_old_common_state(tconn, &os, &flags); |
706cb24c | 1703 | flags |= CS_DC_SUSP; |
8c7e16c3 | 1704 | conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags); |
5f082f98 | 1705 | conn_pr_state_change(tconn, os, ns_max, flags); |
bbeb641c PR |
1706 | |
1707 | acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC); | |
1708 | if (acscw) { | |
435693e8 | 1709 | acscw->oc = os.conn; |
8c7e16c3 | 1710 | acscw->ns_min = ns_min; |
5f082f98 | 1711 | acscw->ns_max = ns_max; |
bbeb641c PR |
1712 | acscw->flags = flags; |
1713 | acscw->w.cb = w_after_conn_state_ch; | |
9dc9fbb3 | 1714 | kref_get(&tconn->kref); |
bbeb641c PR |
1715 | acscw->w.tconn = tconn; |
1716 | drbd_queue_work(&tconn->data.work, &acscw->w); | |
1717 | } else { | |
1718 | conn_err(tconn, "Could not kmalloc an acscw\n"); | |
b8907339 | 1719 | } |
bbeb641c PR |
1720 | |
1721 | abort: | |
bbeb641c PR |
1722 | return rv; |
1723 | } | |
1724 | ||
1725 | enum drbd_state_rv | |
1726 | conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val, | |
1727 | enum chg_state_flags flags) | |
1728 | { | |
1729 | enum drbd_state_rv rv; | |
1730 | ||
1731 | spin_lock_irq(&tconn->req_lock); | |
1732 | rv = _conn_request_state(tconn, mask, val, flags); | |
1733 | spin_unlock_irq(&tconn->req_lock); | |
1734 | ||
1735 | return rv; | |
b8907339 | 1736 | } |