drbd: on attach, enforce clean meta data
[deliverable/linux.git] / drivers / block / drbd / drbd_state.c
CommitLineData
b8907339
PR
1/*
2 drbd_state.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
11 from Logicworks, Inc. for making SDP replication support possible.
12
13 drbd is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2, or (at your option)
16 any later version.
17
18 drbd is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with drbd; see the file COPYING. If not, write to
25 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
26 */
27
28#include <linux/drbd_limits.h>
29#include "drbd_int.h"
30#include "drbd_req.h"
31
cdfda633
PR
32/* in drbd_main.c */
33extern void tl_apply(struct drbd_conf *mdev, enum drbd_req_event what);
34
b8907339
PR
35struct after_state_chg_work {
36 struct drbd_work w;
37 union drbd_state os;
38 union drbd_state ns;
39 enum chg_state_flags flags;
40 struct completion *done;
41};
42
d942ae44
PR
43enum sanitize_state_warnings {
44 NO_WARNING,
45 ABORTED_ONLINE_VERIFY,
46 ABORTED_RESYNC,
47 CONNECTION_LOST_NEGOTIATING,
48 IMPLICITLY_UPGRADED_DISK,
49 IMPLICITLY_UPGRADED_PDSK,
50};
51
99920dc5 52static int w_after_state_ch(struct drbd_work *w, int unused);
b8907339
PR
53static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
54 union drbd_state ns, enum chg_state_flags flags);
a75f34ad
PR
55static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
56static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state);
3509502d 57static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
4308a0a3 58static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
d942ae44 59 enum sanitize_state_warnings *warn);
b8907339 60
2aebfabb
PR
61static inline bool is_susp(union drbd_state s)
62{
63 return s.susp || s.susp_nod || s.susp_fen;
64}
65
d0456c72 66bool conn_all_vols_unconf(struct drbd_tconn *tconn)
0e29d163
PR
67{
68 struct drbd_conf *mdev;
695d08fa 69 bool rv = true;
e90285e0 70 int vnr;
0e29d163 71
695d08fa 72 rcu_read_lock();
e90285e0 73 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
d0456c72
LE
74 if (mdev->state.disk != D_DISKLESS ||
75 mdev->state.conn != C_STANDALONE ||
695d08fa
PR
76 mdev->state.role != R_SECONDARY) {
77 rv = false;
78 break;
79 }
0e29d163 80 }
695d08fa
PR
81 rcu_read_unlock();
82
83 return rv;
0e29d163
PR
84}
85
cb703454
PR
86/* Unfortunately the states where not correctly ordered, when
87 they where defined. therefore can not use max_t() here. */
88static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
89{
90 if (role1 == R_PRIMARY || role2 == R_PRIMARY)
91 return R_PRIMARY;
92 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
93 return R_SECONDARY;
94 return R_UNKNOWN;
95}
96static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
97{
98 if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
99 return R_UNKNOWN;
100 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
101 return R_SECONDARY;
102 return R_PRIMARY;
103}
104
105enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
106{
107 enum drbd_role role = R_UNKNOWN;
108 struct drbd_conf *mdev;
109 int vnr;
110
695d08fa 111 rcu_read_lock();
cb703454
PR
112 idr_for_each_entry(&tconn->volumes, mdev, vnr)
113 role = max_role(role, mdev->state.role);
695d08fa 114 rcu_read_unlock();
cb703454
PR
115
116 return role;
117}
118
119enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
120{
121 enum drbd_role peer = R_UNKNOWN;
122 struct drbd_conf *mdev;
123 int vnr;
124
695d08fa 125 rcu_read_lock();
cb703454
PR
126 idr_for_each_entry(&tconn->volumes, mdev, vnr)
127 peer = max_role(peer, mdev->state.peer);
695d08fa 128 rcu_read_unlock();
cb703454
PR
129
130 return peer;
131}
132
133enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
134{
135 enum drbd_disk_state ds = D_DISKLESS;
136 struct drbd_conf *mdev;
137 int vnr;
138
695d08fa 139 rcu_read_lock();
cb703454
PR
140 idr_for_each_entry(&tconn->volumes, mdev, vnr)
141 ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
695d08fa 142 rcu_read_unlock();
cb703454
PR
143
144 return ds;
145}
146
4669265a
PR
147enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
148{
149 enum drbd_disk_state ds = D_MASK;
150 struct drbd_conf *mdev;
151 int vnr;
152
695d08fa 153 rcu_read_lock();
4669265a
PR
154 idr_for_each_entry(&tconn->volumes, mdev, vnr)
155 ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
695d08fa 156 rcu_read_unlock();
4669265a
PR
157
158 return ds;
159}
160
cb703454
PR
161enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
162{
163 enum drbd_disk_state ds = D_DISKLESS;
164 struct drbd_conf *mdev;
165 int vnr;
166
695d08fa 167 rcu_read_lock();
cb703454
PR
168 idr_for_each_entry(&tconn->volumes, mdev, vnr)
169 ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
695d08fa 170 rcu_read_unlock();
cb703454
PR
171
172 return ds;
173}
174
19f83c76
PR
175enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
176{
177 enum drbd_conns conn = C_MASK;
178 struct drbd_conf *mdev;
179 int vnr;
180
695d08fa 181 rcu_read_lock();
19f83c76
PR
182 idr_for_each_entry(&tconn->volumes, mdev, vnr)
183 conn = min_t(enum drbd_conns, conn, mdev->state.conn);
695d08fa 184 rcu_read_unlock();
19f83c76
PR
185
186 return conn;
187}
188
b8907339
PR
189/**
190 * cl_wide_st_chg() - true if the state change is a cluster wide one
191 * @mdev: DRBD device.
192 * @os: old (current) state.
193 * @ns: new (wanted) state.
194 */
195static int cl_wide_st_chg(struct drbd_conf *mdev,
196 union drbd_state os, union drbd_state ns)
197{
198 return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
199 ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
200 (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
201 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
202 (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))) ||
203 (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
204 (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S);
205}
206
56707f9e
PR
207static union drbd_state
208apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
209{
210 union drbd_state ns;
211 ns.i = (os.i & ~mask.i) | val.i;
212 return ns;
213}
214
b8907339
PR
215enum drbd_state_rv
216drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
217 union drbd_state mask, union drbd_state val)
218{
219 unsigned long flags;
56707f9e 220 union drbd_state ns;
b8907339
PR
221 enum drbd_state_rv rv;
222
223 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 224 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
b8907339 225 rv = _drbd_set_state(mdev, ns, f, NULL);
b8907339
PR
226 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
227
228 return rv;
229}
230
231/**
232 * drbd_force_state() - Impose a change which happens outside our control on our state
233 * @mdev: DRBD device.
234 * @mask: mask of state bits to change.
235 * @val: value of new state bits.
236 */
237void drbd_force_state(struct drbd_conf *mdev,
238 union drbd_state mask, union drbd_state val)
239{
240 drbd_change_state(mdev, CS_HARD, mask, val);
241}
242
243static enum drbd_state_rv
244_req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
245 union drbd_state val)
246{
247 union drbd_state os, ns;
248 unsigned long flags;
249 enum drbd_state_rv rv;
250
251 if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
252 return SS_CW_SUCCESS;
253
254 if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
255 return SS_CW_FAILED_BY_PEER;
256
b8907339 257 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 258 os = drbd_read_state(mdev);
56707f9e 259 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
3509502d
PR
260 rv = is_valid_transition(os, ns);
261 if (rv == SS_SUCCESS)
262 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
b8907339
PR
263
264 if (!cl_wide_st_chg(mdev, os, ns))
265 rv = SS_CW_NO_NEED;
3509502d 266 if (rv == SS_UNKNOWN_ERROR) {
b8907339
PR
267 rv = is_valid_state(mdev, ns);
268 if (rv == SS_SUCCESS) {
a75f34ad 269 rv = is_valid_soft_transition(os, ns);
b8907339
PR
270 if (rv == SS_SUCCESS)
271 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
272 }
273 }
274 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
275
276 return rv;
277}
278
279/**
280 * drbd_req_state() - Perform an eventually cluster wide state change
281 * @mdev: DRBD device.
282 * @mask: mask of state bits to change.
283 * @val: value of new state bits.
284 * @f: flags
285 *
286 * Should not be called directly, use drbd_request_state() or
287 * _drbd_request_state().
288 */
289static enum drbd_state_rv
290drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
291 union drbd_state val, enum chg_state_flags f)
292{
293 struct completion done;
294 unsigned long flags;
295 union drbd_state os, ns;
296 enum drbd_state_rv rv;
297
298 init_completion(&done);
299
300 if (f & CS_SERIALIZE)
8410da8f 301 mutex_lock(mdev->state_mutex);
b8907339
PR
302
303 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 304 os = drbd_read_state(mdev);
56707f9e 305 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
3509502d 306 rv = is_valid_transition(os, ns);
3c5e5f6a
LE
307 if (rv < SS_SUCCESS) {
308 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
3509502d 309 goto abort;
3c5e5f6a 310 }
b8907339
PR
311
312 if (cl_wide_st_chg(mdev, os, ns)) {
313 rv = is_valid_state(mdev, ns);
314 if (rv == SS_SUCCESS)
a75f34ad 315 rv = is_valid_soft_transition(os, ns);
b8907339
PR
316 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
317
318 if (rv < SS_SUCCESS) {
319 if (f & CS_VERBOSE)
320 print_st_err(mdev, os, ns, rv);
321 goto abort;
322 }
323
d24ae219 324 if (drbd_send_state_req(mdev, mask, val)) {
b8907339
PR
325 rv = SS_CW_FAILED_BY_PEER;
326 if (f & CS_VERBOSE)
327 print_st_err(mdev, os, ns, rv);
328 goto abort;
329 }
330
331 wait_event(mdev->state_wait,
332 (rv = _req_st_cond(mdev, mask, val)));
333
334 if (rv < SS_SUCCESS) {
b8907339
PR
335 if (f & CS_VERBOSE)
336 print_st_err(mdev, os, ns, rv);
337 goto abort;
338 }
339 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
78bae59b 340 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
b8907339 341 rv = _drbd_set_state(mdev, ns, f, &done);
b8907339
PR
342 } else {
343 rv = _drbd_set_state(mdev, ns, f, &done);
344 }
345
346 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
347
348 if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
349 D_ASSERT(current != mdev->tconn->worker.task);
350 wait_for_completion(&done);
351 }
352
353abort:
354 if (f & CS_SERIALIZE)
8410da8f 355 mutex_unlock(mdev->state_mutex);
b8907339
PR
356
357 return rv;
358}
359
360/**
361 * _drbd_request_state() - Request a state change (with flags)
362 * @mdev: DRBD device.
363 * @mask: mask of state bits to change.
364 * @val: value of new state bits.
365 * @f: flags
366 *
367 * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
368 * flag, or when logging of failed state change requests is not desired.
369 */
370enum drbd_state_rv
371_drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
372 union drbd_state val, enum chg_state_flags f)
373{
374 enum drbd_state_rv rv;
375
376 wait_event(mdev->state_wait,
377 (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
378
379 return rv;
380}
381
382static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
383{
384 dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
385 name,
386 drbd_conn_str(ns.conn),
387 drbd_role_str(ns.role),
388 drbd_role_str(ns.peer),
389 drbd_disk_str(ns.disk),
390 drbd_disk_str(ns.pdsk),
391 is_susp(ns) ? 's' : 'r',
392 ns.aftr_isp ? 'a' : '-',
393 ns.peer_isp ? 'p' : '-',
394 ns.user_isp ? 'u' : '-',
395 ns.susp_fen ? 'F' : '-',
396 ns.susp_nod ? 'N' : '-'
397 );
398}
399
400void print_st_err(struct drbd_conf *mdev, union drbd_state os,
401 union drbd_state ns, enum drbd_state_rv err)
402{
403 if (err == SS_IN_TRANSIENT_STATE)
404 return;
405 dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
406 print_st(mdev, " state", os);
407 print_st(mdev, "wanted", ns);
408}
409
435693e8 410static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
bbeb641c
PR
411 enum chg_state_flags flags)
412{
435693e8 413 char *pbp;
bbeb641c
PR
414 pbp = pb;
415 *pbp = 0;
706cb24c 416
435693e8 417 if (ns.role != os.role && flags & CS_DC_ROLE)
bbeb641c
PR
418 pbp += sprintf(pbp, "role( %s -> %s ) ",
419 drbd_role_str(os.role),
420 drbd_role_str(ns.role));
435693e8 421 if (ns.peer != os.peer && flags & CS_DC_PEER)
bbeb641c
PR
422 pbp += sprintf(pbp, "peer( %s -> %s ) ",
423 drbd_role_str(os.peer),
424 drbd_role_str(ns.peer));
435693e8 425 if (ns.conn != os.conn && flags & CS_DC_CONN)
bbeb641c
PR
426 pbp += sprintf(pbp, "conn( %s -> %s ) ",
427 drbd_conn_str(os.conn),
428 drbd_conn_str(ns.conn));
435693e8 429 if (ns.disk != os.disk && flags & CS_DC_DISK)
bbeb641c
PR
430 pbp += sprintf(pbp, "disk( %s -> %s ) ",
431 drbd_disk_str(os.disk),
432 drbd_disk_str(ns.disk));
435693e8 433 if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
bbeb641c
PR
434 pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
435 drbd_disk_str(os.pdsk),
436 drbd_disk_str(ns.pdsk));
706cb24c
PR
437
438 return pbp - pb;
439}
440
441static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
442 enum chg_state_flags flags)
443{
444 char pb[300];
445 char *pbp = pb;
446
447 pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
448
bbeb641c
PR
449 if (ns.aftr_isp != os.aftr_isp)
450 pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
451 os.aftr_isp,
452 ns.aftr_isp);
453 if (ns.peer_isp != os.peer_isp)
454 pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
455 os.peer_isp,
456 ns.peer_isp);
457 if (ns.user_isp != os.user_isp)
458 pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
459 os.user_isp,
460 ns.user_isp);
435693e8 461
706cb24c 462 if (pbp != pb)
bbeb641c
PR
463 dev_info(DEV, "%s\n", pb);
464}
b8907339 465
435693e8
PR
466static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
467 enum chg_state_flags flags)
468{
469 char pb[300];
706cb24c
PR
470 char *pbp = pb;
471
472 pbp += print_state_change(pbp, os, ns, flags);
435693e8 473
706cb24c
PR
474 if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
475 pbp += sprintf(pbp, "susp( %d -> %d ) ",
476 is_susp(os),
477 is_susp(ns));
478
479 if (pbp != pb)
435693e8
PR
480 conn_info(tconn, "%s\n", pb);
481}
482
483
b8907339
PR
484/**
485 * is_valid_state() - Returns an SS_ error code if ns is not valid
486 * @mdev: DRBD device.
487 * @ns: State to consider.
488 */
489static enum drbd_state_rv
490is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
491{
492 /* See drbd_state_sw_errors in drbd_strings.c */
493
494 enum drbd_fencing_p fp;
495 enum drbd_state_rv rv = SS_SUCCESS;
44ed167d 496 struct net_conf *nc;
b8907339 497
daeda1cc 498 rcu_read_lock();
b8907339
PR
499 fp = FP_DONT_CARE;
500 if (get_ldev(mdev)) {
daeda1cc 501 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
b8907339
PR
502 put_ldev(mdev);
503 }
504
44ed167d
PR
505 nc = rcu_dereference(mdev->tconn->net_conf);
506 if (nc) {
507 if (!nc->two_primaries && ns.role == R_PRIMARY) {
047e95e2
PR
508 if (ns.peer == R_PRIMARY)
509 rv = SS_TWO_PRIMARIES;
cb703454 510 else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
047e95e2 511 rv = SS_O_VOL_PEER_PRI;
44ed167d 512 }
b8907339
PR
513 }
514
515 if (rv <= 0)
516 /* already found a reason to abort */;
517 else if (ns.role == R_SECONDARY && mdev->open_cnt)
518 rv = SS_DEVICE_IN_USE;
519
520 else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
521 rv = SS_NO_UP_TO_DATE_DISK;
522
523 else if (fp >= FP_RESOURCE &&
524 ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
525 rv = SS_PRIMARY_NOP;
526
527 else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
528 rv = SS_NO_UP_TO_DATE_DISK;
529
530 else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
531 rv = SS_NO_LOCAL_DISK;
532
533 else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
534 rv = SS_NO_REMOTE_DISK;
535
536 else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
537 rv = SS_NO_UP_TO_DATE_DISK;
538
539 else if ((ns.conn == C_CONNECTED ||
540 ns.conn == C_WF_BITMAP_S ||
541 ns.conn == C_SYNC_SOURCE ||
542 ns.conn == C_PAUSED_SYNC_S) &&
543 ns.disk == D_OUTDATED)
544 rv = SS_CONNECTED_OUTDATES;
545
546 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
44ed167d 547 (nc->verify_alg[0] == 0))
b8907339
PR
548 rv = SS_NO_VERIFY_ALG;
549
550 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
551 mdev->tconn->agreed_pro_version < 88)
552 rv = SS_NOT_SUPPORTED;
553
554 else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
555 rv = SS_CONNECTED_OUTDATES;
556
44ed167d
PR
557 rcu_read_unlock();
558
b8907339
PR
559 return rv;
560}
561
562/**
a75f34ad 563 * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
3509502d
PR
564 * This function limits state transitions that may be declined by DRBD. I.e.
565 * user requests (aka soft transitions).
b8907339
PR
566 * @mdev: DRBD device.
567 * @ns: new state.
568 * @os: old state.
569 */
570static enum drbd_state_rv
a75f34ad 571is_valid_soft_transition(union drbd_state os, union drbd_state ns)
b8907339
PR
572{
573 enum drbd_state_rv rv = SS_SUCCESS;
574
575 if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
576 os.conn > C_CONNECTED)
577 rv = SS_RESYNC_RUNNING;
578
579 if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
580 rv = SS_ALREADY_STANDALONE;
581
582 if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
583 rv = SS_IS_DISKLESS;
584
585 if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
586 rv = SS_NO_NET_CONFIG;
587
588 if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
589 rv = SS_LOWER_THAN_OUTDATED;
590
591 if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
592 rv = SS_IN_TRANSIENT_STATE;
593
2325eb66
PR
594 /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
595 rv = SS_IN_TRANSIENT_STATE; */
b8907339
PR
596
597 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
598 rv = SS_NEED_CONNECTION;
599
600 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
601 ns.conn != os.conn && os.conn > C_CONNECTED)
602 rv = SS_RESYNC_RUNNING;
603
604 if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
605 os.conn < C_CONNECTED)
606 rv = SS_NEED_CONNECTION;
607
608 if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
609 && os.conn < C_WF_REPORT_PARAMS)
610 rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
611
612 return rv;
613}
614
3509502d 615static enum drbd_state_rv
fda74117 616is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
3509502d 617{
d9cc6e23
LE
618 /* no change -> nothing to do, at least for the connection part */
619 if (oc == nc)
620 return SS_NOTHING_TO_DO;
3509502d 621
d9cc6e23
LE
622 /* disconnect of an unconfigured connection does not make sense */
623 if (oc == C_STANDALONE && nc == C_DISCONNECTING)
624 return SS_ALREADY_STANDALONE;
625
626 /* from C_STANDALONE, we start with C_UNCONNECTED */
627 if (oc == C_STANDALONE && nc != C_UNCONNECTED)
628 return SS_NEED_CONNECTION;
3509502d
PR
629
630 /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
fda74117 631 if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
d9cc6e23 632 return SS_IN_TRANSIENT_STATE;
3509502d
PR
633
634 /* After C_DISCONNECTING only C_STANDALONE may follow */
fda74117 635 if (oc == C_DISCONNECTING && nc != C_STANDALONE)
d9cc6e23 636 return SS_IN_TRANSIENT_STATE;
3509502d 637
d9cc6e23 638 return SS_SUCCESS;
fda74117
PR
639}
640
641
642/**
643 * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
644 * This limits hard state transitions. Hard state transitions are facts there are
645 * imposed on DRBD by the environment. E.g. disk broke or network broke down.
646 * But those hard state transitions are still not allowed to do everything.
647 * @ns: new state.
648 * @os: old state.
649 */
650static enum drbd_state_rv
651is_valid_transition(union drbd_state os, union drbd_state ns)
652{
653 enum drbd_state_rv rv;
654
655 rv = is_valid_conn_transition(os.conn, ns.conn);
656
3509502d
PR
657 /* we cannot fail (again) if we already detached */
658 if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
659 rv = SS_IS_DISKLESS;
660
661 return rv;
662}
663
d942ae44
PR
664static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
665{
666 static const char *msg_table[] = {
667 [NO_WARNING] = "",
668 [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
669 [ABORTED_RESYNC] = "Resync aborted.",
670 [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
671 [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
672 [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
673 };
674
675 if (warn != NO_WARNING)
676 dev_warn(DEV, "%s\n", msg_table[warn]);
677}
678
b8907339
PR
679/**
680 * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
681 * @mdev: DRBD device.
682 * @os: old state.
683 * @ns: new state.
684 * @warn_sync_abort:
685 *
686 * When we loose connection, we have to set the state of the peers disk (pdsk)
687 * to D_UNKNOWN. This rule and many more along those lines are in this function.
688 */
4308a0a3 689static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
d942ae44 690 enum sanitize_state_warnings *warn)
b8907339
PR
691{
692 enum drbd_fencing_p fp;
693 enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
694
d942ae44
PR
695 if (warn)
696 *warn = NO_WARNING;
697
b8907339
PR
698 fp = FP_DONT_CARE;
699 if (get_ldev(mdev)) {
daeda1cc
PR
700 rcu_read_lock();
701 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
702 rcu_read_unlock();
b8907339
PR
703 put_ldev(mdev);
704 }
705
3509502d 706 /* Implications from connection to peer and peer_isp */
b8907339
PR
707 if (ns.conn < C_CONNECTED) {
708 ns.peer_isp = 0;
709 ns.peer = R_UNKNOWN;
710 if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
711 ns.pdsk = D_UNKNOWN;
712 }
713
714 /* Clear the aftr_isp when becoming unconfigured */
715 if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
716 ns.aftr_isp = 0;
717
4308a0a3 718 /* An implication of the disk states onto the connection state */
b8907339 719 /* Abort resync if a disk fails/detaches */
4308a0a3 720 if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
d942ae44
PR
721 if (warn)
722 *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
723 ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
b8907339
PR
724 ns.conn = C_CONNECTED;
725 }
726
727 /* Connection breaks down before we finished "Negotiating" */
728 if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
729 get_ldev_if_state(mdev, D_NEGOTIATING)) {
730 if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
731 ns.disk = mdev->new_state_tmp.disk;
732 ns.pdsk = mdev->new_state_tmp.pdsk;
733 } else {
d942ae44
PR
734 if (warn)
735 *warn = CONNECTION_LOST_NEGOTIATING;
b8907339
PR
736 ns.disk = D_DISKLESS;
737 ns.pdsk = D_UNKNOWN;
738 }
739 put_ldev(mdev);
740 }
741
742 /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
743 if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
744 if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
745 ns.disk = D_UP_TO_DATE;
746 if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
747 ns.pdsk = D_UP_TO_DATE;
748 }
749
750 /* Implications of the connection stat on the disk states */
751 disk_min = D_DISKLESS;
752 disk_max = D_UP_TO_DATE;
753 pdsk_min = D_INCONSISTENT;
754 pdsk_max = D_UNKNOWN;
755 switch ((enum drbd_conns)ns.conn) {
756 case C_WF_BITMAP_T:
757 case C_PAUSED_SYNC_T:
758 case C_STARTING_SYNC_T:
759 case C_WF_SYNC_UUID:
760 case C_BEHIND:
761 disk_min = D_INCONSISTENT;
762 disk_max = D_OUTDATED;
763 pdsk_min = D_UP_TO_DATE;
764 pdsk_max = D_UP_TO_DATE;
765 break;
766 case C_VERIFY_S:
767 case C_VERIFY_T:
768 disk_min = D_UP_TO_DATE;
769 disk_max = D_UP_TO_DATE;
770 pdsk_min = D_UP_TO_DATE;
771 pdsk_max = D_UP_TO_DATE;
772 break;
773 case C_CONNECTED:
774 disk_min = D_DISKLESS;
775 disk_max = D_UP_TO_DATE;
776 pdsk_min = D_DISKLESS;
777 pdsk_max = D_UP_TO_DATE;
778 break;
779 case C_WF_BITMAP_S:
780 case C_PAUSED_SYNC_S:
781 case C_STARTING_SYNC_S:
782 case C_AHEAD:
783 disk_min = D_UP_TO_DATE;
784 disk_max = D_UP_TO_DATE;
785 pdsk_min = D_INCONSISTENT;
786 pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
787 break;
788 case C_SYNC_TARGET:
789 disk_min = D_INCONSISTENT;
790 disk_max = D_INCONSISTENT;
791 pdsk_min = D_UP_TO_DATE;
792 pdsk_max = D_UP_TO_DATE;
793 break;
794 case C_SYNC_SOURCE:
795 disk_min = D_UP_TO_DATE;
796 disk_max = D_UP_TO_DATE;
797 pdsk_min = D_INCONSISTENT;
798 pdsk_max = D_INCONSISTENT;
799 break;
800 case C_STANDALONE:
801 case C_DISCONNECTING:
802 case C_UNCONNECTED:
803 case C_TIMEOUT:
804 case C_BROKEN_PIPE:
805 case C_NETWORK_FAILURE:
806 case C_PROTOCOL_ERROR:
807 case C_TEAR_DOWN:
808 case C_WF_CONNECTION:
809 case C_WF_REPORT_PARAMS:
810 case C_MASK:
811 break;
812 }
813 if (ns.disk > disk_max)
814 ns.disk = disk_max;
815
816 if (ns.disk < disk_min) {
d942ae44
PR
817 if (warn)
818 *warn = IMPLICITLY_UPGRADED_DISK;
b8907339
PR
819 ns.disk = disk_min;
820 }
821 if (ns.pdsk > pdsk_max)
822 ns.pdsk = pdsk_max;
823
824 if (ns.pdsk < pdsk_min) {
d942ae44
PR
825 if (warn)
826 *warn = IMPLICITLY_UPGRADED_PDSK;
b8907339
PR
827 ns.pdsk = pdsk_min;
828 }
829
830 if (fp == FP_STONITH &&
4308a0a3 831 (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
b8907339
PR
832 ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
833
f399002e 834 if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
4308a0a3 835 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
b8907339
PR
836 ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
837
838 if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
839 if (ns.conn == C_SYNC_SOURCE)
840 ns.conn = C_PAUSED_SYNC_S;
841 if (ns.conn == C_SYNC_TARGET)
842 ns.conn = C_PAUSED_SYNC_T;
843 } else {
844 if (ns.conn == C_PAUSED_SYNC_S)
845 ns.conn = C_SYNC_SOURCE;
846 if (ns.conn == C_PAUSED_SYNC_T)
847 ns.conn = C_SYNC_TARGET;
848 }
849
850 return ns;
851}
852
853void drbd_resume_al(struct drbd_conf *mdev)
854{
855 if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
856 dev_info(DEV, "Resumed AL updates\n");
857}
858
859/* helper for __drbd_set_state */
860static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
861{
862 if (mdev->tconn->agreed_pro_version < 90)
863 mdev->ov_start_sector = 0;
864 mdev->rs_total = drbd_bm_bits(mdev);
865 mdev->ov_position = 0;
866 if (cs == C_VERIFY_T) {
867 /* starting online verify from an arbitrary position
868 * does not fit well into the existing protocol.
869 * on C_VERIFY_T, we initialize ov_left and friends
870 * implicitly in receive_DataRequest once the
871 * first P_OV_REQUEST is received */
872 mdev->ov_start_sector = ~(sector_t)0;
873 } else {
874 unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
875 if (bit >= mdev->rs_total) {
876 mdev->ov_start_sector =
877 BM_BIT_TO_SECT(mdev->rs_total - 1);
878 mdev->rs_total = 1;
879 } else
880 mdev->rs_total -= bit;
881 mdev->ov_position = mdev->ov_start_sector;
882 }
883 mdev->ov_left = mdev->rs_total;
884}
885
886/**
887 * __drbd_set_state() - Set a new DRBD state
888 * @mdev: DRBD device.
889 * @ns: new state.
890 * @flags: Flags
891 * @done: Optional completion, that will get completed after the after_state_ch() finished
892 *
893 * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
894 */
895enum drbd_state_rv
896__drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
897 enum chg_state_flags flags, struct completion *done)
898{
899 union drbd_state os;
900 enum drbd_state_rv rv = SS_SUCCESS;
d942ae44 901 enum sanitize_state_warnings ssw;
b8907339
PR
902 struct after_state_chg_work *ascw;
903
78bae59b 904 os = drbd_read_state(mdev);
b8907339 905
d942ae44 906 ns = sanitize_state(mdev, ns, &ssw);
b8907339
PR
907 if (ns.i == os.i)
908 return SS_NOTHING_TO_DO;
909
3509502d
PR
910 rv = is_valid_transition(os, ns);
911 if (rv < SS_SUCCESS)
912 return rv;
913
b8907339
PR
914 if (!(flags & CS_HARD)) {
915 /* pre-state-change checks ; only look at ns */
916 /* See drbd_state_sw_errors in drbd_strings.c */
917
918 rv = is_valid_state(mdev, ns);
919 if (rv < SS_SUCCESS) {
920 /* If the old state was illegal as well, then let
921 this happen...*/
922
923 if (is_valid_state(mdev, os) == rv)
a75f34ad 924 rv = is_valid_soft_transition(os, ns);
b8907339 925 } else
a75f34ad 926 rv = is_valid_soft_transition(os, ns);
b8907339
PR
927 }
928
929 if (rv < SS_SUCCESS) {
930 if (flags & CS_VERBOSE)
931 print_st_err(mdev, os, ns, rv);
932 return rv;
933 }
934
d942ae44 935 print_sanitize_warnings(mdev, ssw);
b8907339 936
435693e8 937 drbd_pr_state_change(mdev, os, ns, flags);
b8907339 938
706cb24c
PR
939 /* Display changes to the susp* flags that where caused by the call to
940 sanitize_state(). Only display it here if we where not called from
941 _conn_request_state() */
942 if (!(flags & CS_DC_SUSP))
943 conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
944
b8907339
PR
945 /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
946 * on the ldev here, to be sure the transition -> D_DISKLESS resp.
947 * drbd_ldev_destroy() won't happen before our corresponding
948 * after_state_ch works run, where we put_ldev again. */
949 if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
950 (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
951 atomic_inc(&mdev->local_cnt);
952
da9fbc27 953 mdev->state.i = ns.i;
8e0af25f
PR
954 mdev->tconn->susp = ns.susp;
955 mdev->tconn->susp_nod = ns.susp_nod;
956 mdev->tconn->susp_fen = ns.susp_fen;
b8907339
PR
957
958 if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
959 drbd_print_uuids(mdev, "attached to UUIDs");
960
961 wake_up(&mdev->misc_wait);
962 wake_up(&mdev->state_wait);
2a67d8b9 963 wake_up(&mdev->tconn->ping_wait);
b8907339
PR
964
965 /* aborted verify run. log the last position */
966 if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
967 ns.conn < C_CONNECTED) {
968 mdev->ov_start_sector =
969 BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
970 dev_info(DEV, "Online Verify reached sector %llu\n",
971 (unsigned long long)mdev->ov_start_sector);
972 }
973
974 if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
975 (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
976 dev_info(DEV, "Syncer continues.\n");
977 mdev->rs_paused += (long)jiffies
978 -(long)mdev->rs_mark_time[mdev->rs_last_mark];
979 if (ns.conn == C_SYNC_TARGET)
980 mod_timer(&mdev->resync_timer, jiffies);
981 }
982
983 if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
984 (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
985 dev_info(DEV, "Resync suspended\n");
986 mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
987 }
988
989 if (os.conn == C_CONNECTED &&
990 (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
991 unsigned long now = jiffies;
992 int i;
993
994 set_ov_position(mdev, ns.conn);
995 mdev->rs_start = now;
996 mdev->rs_last_events = 0;
997 mdev->rs_last_sect_ev = 0;
998 mdev->ov_last_oos_size = 0;
999 mdev->ov_last_oos_start = 0;
1000
1001 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
1002 mdev->rs_mark_left[i] = mdev->ov_left;
1003 mdev->rs_mark_time[i] = now;
1004 }
1005
1006 drbd_rs_controller_reset(mdev);
1007
1008 if (ns.conn == C_VERIFY_S) {
1009 dev_info(DEV, "Starting Online Verify from sector %llu\n",
1010 (unsigned long long)mdev->ov_position);
1011 mod_timer(&mdev->resync_timer, jiffies);
1012 }
1013 }
1014
1015 if (get_ldev(mdev)) {
1016 u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
1017 MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
1018 MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
1019
d5d7ebd4 1020 mdf &= ~MDF_AL_CLEAN;
b8907339
PR
1021 if (test_bit(CRASHED_PRIMARY, &mdev->flags))
1022 mdf |= MDF_CRASHED_PRIMARY;
1023 if (mdev->state.role == R_PRIMARY ||
1024 (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
1025 mdf |= MDF_PRIMARY_IND;
1026 if (mdev->state.conn > C_WF_REPORT_PARAMS)
1027 mdf |= MDF_CONNECTED_IND;
1028 if (mdev->state.disk > D_INCONSISTENT)
1029 mdf |= MDF_CONSISTENT;
1030 if (mdev->state.disk > D_OUTDATED)
1031 mdf |= MDF_WAS_UP_TO_DATE;
1032 if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
1033 mdf |= MDF_PEER_OUT_DATED;
1034 if (mdf != mdev->ldev->md.flags) {
1035 mdev->ldev->md.flags = mdf;
1036 drbd_md_mark_dirty(mdev);
1037 }
1038 if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
1039 drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
1040 put_ldev(mdev);
1041 }
1042
1043 /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
1044 if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
1045 os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
1046 set_bit(CONSIDER_RESYNC, &mdev->flags);
1047
1048 /* Receiver should clean up itself */
1049 if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
1050 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1051
1052 /* Now the receiver finished cleaning up itself, it should die */
1053 if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
1054 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1055
1056 /* Upon network failure, we need to restart the receiver. */
1057 if (os.conn > C_TEAR_DOWN &&
1058 ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
1059 drbd_thread_restart_nowait(&mdev->tconn->receiver);
1060
1061 /* Resume AL writing if we get a connection */
1062 if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED)
1063 drbd_resume_al(mdev);
1064
1065 ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
1066 if (ascw) {
1067 ascw->os = os;
1068 ascw->ns = ns;
1069 ascw->flags = flags;
1070 ascw->w.cb = w_after_state_ch;
a21e9298 1071 ascw->w.mdev = mdev;
b8907339
PR
1072 ascw->done = done;
1073 drbd_queue_work(&mdev->tconn->data.work, &ascw->w);
1074 } else {
bbeb641c 1075 dev_err(DEV, "Could not kmalloc an ascw\n");
b8907339
PR
1076 }
1077
1078 return rv;
1079}
1080
99920dc5 1081static int w_after_state_ch(struct drbd_work *w, int unused)
b8907339
PR
1082{
1083 struct after_state_chg_work *ascw =
1084 container_of(w, struct after_state_chg_work, w);
00d56944 1085 struct drbd_conf *mdev = w->mdev;
b8907339
PR
1086
1087 after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
1088 if (ascw->flags & CS_WAIT_COMPLETE) {
1089 D_ASSERT(ascw->done != NULL);
1090 complete(ascw->done);
1091 }
1092 kfree(ascw);
1093
99920dc5 1094 return 0;
b8907339
PR
1095}
1096
1097static void abw_start_sync(struct drbd_conf *mdev, int rv)
1098{
1099 if (rv) {
1100 dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
1101 _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
1102 return;
1103 }
1104
1105 switch (mdev->state.conn) {
1106 case C_STARTING_SYNC_T:
1107 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
1108 break;
1109 case C_STARTING_SYNC_S:
1110 drbd_start_resync(mdev, C_SYNC_SOURCE);
1111 break;
1112 }
1113}
1114
1115int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
1116 int (*io_fn)(struct drbd_conf *),
1117 char *why, enum bm_flag flags)
1118{
1119 int rv;
1120
1121 D_ASSERT(current == mdev->tconn->worker.task);
1122
1123 /* open coded non-blocking drbd_suspend_io(mdev); */
1124 set_bit(SUSPEND_IO, &mdev->flags);
1125
1126 drbd_bm_lock(mdev, why, flags);
1127 rv = io_fn(mdev);
1128 drbd_bm_unlock(mdev);
1129
1130 drbd_resume_io(mdev);
1131
1132 return rv;
1133}
1134
1135/**
1136 * after_state_ch() - Perform after state change actions that may sleep
1137 * @mdev: DRBD device.
1138 * @os: old state.
1139 * @ns: new state.
1140 * @flags: Flags
1141 */
1142static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
1143 union drbd_state ns, enum chg_state_flags flags)
1144{
1145 enum drbd_fencing_p fp;
3b98c0c2
LE
1146 struct sib_info sib;
1147
1148 sib.sib_reason = SIB_STATE_CHANGE;
1149 sib.os = os;
1150 sib.ns = ns;
b8907339
PR
1151
1152 if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
1153 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1154 if (mdev->p_uuid)
1155 mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
1156 }
1157
1158 fp = FP_DONT_CARE;
1159 if (get_ldev(mdev)) {
daeda1cc
PR
1160 rcu_read_lock();
1161 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
1162 rcu_read_unlock();
b8907339
PR
1163 put_ldev(mdev);
1164 }
1165
1166 /* Inform userspace about the change... */
3b98c0c2 1167 drbd_bcast_event(mdev, &sib);
b8907339
PR
1168
1169 if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
1170 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
1171 drbd_khelper(mdev, "pri-on-incon-degr");
1172
1173 /* Here we have the actions that are performed after a
1174 state change. This function might sleep */
1175
b8907339 1176 if (ns.susp_nod) {
a6d00c8e
PR
1177 enum drbd_req_event what = NOTHING;
1178
1179 if (os.conn < C_CONNECTED && conn_lowest_conn(mdev->tconn) >= C_CONNECTED)
b8907339
PR
1180 what = RESEND;
1181
a6d00c8e 1182 if (os.disk == D_ATTACHING && conn_lowest_disk(mdev->tconn) > D_ATTACHING)
b8907339
PR
1183 what = RESTART_FROZEN_DISK_IO;
1184
a6d00c8e 1185 if (what != NOTHING) {
b8907339 1186 spin_lock_irq(&mdev->tconn->req_lock);
a6d00c8e
PR
1187 _tl_restart(mdev->tconn, what);
1188 _drbd_set_state(_NS(mdev, susp_nod, 0), CS_VERBOSE, NULL);
b8907339
PR
1189 spin_unlock_irq(&mdev->tconn->req_lock);
1190 }
b8907339
PR
1191 }
1192
1193 /* Became sync source. With protocol >= 96, we still need to send out
1194 * the sync uuid now. Need to do that before any drbd_send_state, or
1195 * the other side may go "paused sync" before receiving the sync uuids,
1196 * which is unexpected. */
1197 if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
1198 (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
1199 mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
1200 drbd_gen_and_send_sync_uuid(mdev);
1201 put_ldev(mdev);
1202 }
1203
1204 /* Do not change the order of the if above and the two below... */
1205 if (os.pdsk == D_DISKLESS && ns.pdsk > D_DISKLESS) { /* attach on the peer */
1206 drbd_send_uuids(mdev);
1207 drbd_send_state(mdev);
1208 }
1209 /* No point in queuing send_bitmap if we don't have a connection
1210 * anymore, so check also the _current_ state, not only the new state
1211 * at the time this work was queued. */
1212 if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
1213 mdev->state.conn == C_WF_BITMAP_S)
1214 drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
1215 "send_bitmap (WFBitMapS)",
1216 BM_LOCKED_TEST_ALLOWED);
1217
1218 /* Lost contact to peer's copy of the data */
1219 if ((os.pdsk >= D_INCONSISTENT &&
1220 os.pdsk != D_UNKNOWN &&
1221 os.pdsk != D_OUTDATED)
1222 && (ns.pdsk < D_INCONSISTENT ||
1223 ns.pdsk == D_UNKNOWN ||
1224 ns.pdsk == D_OUTDATED)) {
1225 if (get_ldev(mdev)) {
1226 if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
1227 mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
2aebfabb 1228 if (drbd_suspended(mdev)) {
b8907339
PR
1229 set_bit(NEW_CUR_UUID, &mdev->flags);
1230 } else {
1231 drbd_uuid_new_current(mdev);
1232 drbd_send_uuids(mdev);
1233 }
1234 }
1235 put_ldev(mdev);
1236 }
1237 }
1238
1239 if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
1240 if (ns.peer == R_PRIMARY && mdev->ldev->md.uuid[UI_BITMAP] == 0) {
1241 drbd_uuid_new_current(mdev);
1242 drbd_send_uuids(mdev);
1243 }
1244
1245 /* D_DISKLESS Peer becomes secondary */
1246 if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
1247 /* We may still be Primary ourselves.
1248 * No harm done if the bitmap still changes,
1249 * redirtied pages will follow later. */
1250 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1251 "demote diskless peer", BM_LOCKED_SET_ALLOWED);
1252 put_ldev(mdev);
1253 }
1254
1255 /* Write out all changed bits on demote.
1256 * Though, no need to da that just yet
1257 * if there is a resync going on still */
1258 if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
1259 mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
1260 /* No changes to the bitmap expected this time, so assert that,
1261 * even though no harm was done if it did change. */
1262 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1263 "demote", BM_LOCKED_TEST_ALLOWED);
1264 put_ldev(mdev);
1265 }
1266
1267 /* Last part of the attaching process ... */
1268 if (ns.conn >= C_CONNECTED &&
1269 os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
1270 drbd_send_sizes(mdev, 0, 0); /* to start sync... */
1271 drbd_send_uuids(mdev);
1272 drbd_send_state(mdev);
1273 }
1274
1275 /* We want to pause/continue resync, tell peer. */
1276 if (ns.conn >= C_CONNECTED &&
1277 ((os.aftr_isp != ns.aftr_isp) ||
1278 (os.user_isp != ns.user_isp)))
1279 drbd_send_state(mdev);
1280
1281 /* In case one of the isp bits got set, suspend other devices. */
1282 if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
1283 (ns.aftr_isp || ns.peer_isp || ns.user_isp))
1284 suspend_other_sg(mdev);
1285
1286 /* Make sure the peer gets informed about eventual state
1287 changes (ISP bits) while we were in WFReportParams. */
1288 if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
1289 drbd_send_state(mdev);
1290
1291 if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
1292 drbd_send_state(mdev);
1293
1294 /* We are in the progress to start a full sync... */
1295 if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
1296 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
1297 /* no other bitmap changes expected during this phase */
1298 drbd_queue_bitmap_io(mdev,
1299 &drbd_bmio_set_n_write, &abw_start_sync,
1300 "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
1301
1302 /* We are invalidating our self... */
1303 if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED &&
1304 os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT)
1305 /* other bitmap operation expected during this phase */
1306 drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL,
1307 "set_n_write from invalidate", BM_LOCKED_MASK);
1308
1309 /* first half of local IO error, failure to attach,
1310 * or administrative detach */
1311 if (os.disk != D_FAILED && ns.disk == D_FAILED) {
1312 enum drbd_io_error_p eh;
1313 int was_io_error;
1314 /* corresponding get_ldev was in __drbd_set_state, to serialize
1315 * our cleanup here with the transition to D_DISKLESS,
1316 * so it is safe to dreference ldev here. */
daeda1cc
PR
1317 rcu_read_lock();
1318 eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
1319 rcu_read_unlock();
b8907339
PR
1320 was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
1321
cdfda633
PR
1322 /* Immediately allow completion of all application IO, that waits
1323 for completion from the local disk. */
1324 tl_apply(mdev, ABORT_DISK_IO);
1325
b8907339
PR
1326 /* current state still has to be D_FAILED,
1327 * there is only one way out: to D_DISKLESS,
1328 * and that may only happen after our put_ldev below. */
1329 if (mdev->state.disk != D_FAILED)
1330 dev_err(DEV,
1331 "ASSERT FAILED: disk is %s during detach\n",
1332 drbd_disk_str(mdev->state.disk));
1333
927036f9 1334 if (!drbd_send_state(mdev))
4dbdae3e 1335 dev_info(DEV, "Notified peer that I am detaching my disk\n");
b8907339
PR
1336
1337 drbd_rs_cancel_all(mdev);
1338
1339 /* In case we want to get something to stable storage still,
1340 * this may be the last chance.
1341 * Following put_ldev may transition to D_DISKLESS. */
1342 drbd_md_sync(mdev);
1343 put_ldev(mdev);
1344
1345 if (was_io_error && eh == EP_CALL_HELPER)
1346 drbd_khelper(mdev, "local-io-error");
1347 }
1348
1349 /* second half of local IO error, failure to attach,
1350 * or administrative detach,
1351 * after local_cnt references have reached zero again */
1352 if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
1353 /* We must still be diskless,
1354 * re-attach has to be serialized with this! */
1355 if (mdev->state.disk != D_DISKLESS)
1356 dev_err(DEV,
1357 "ASSERT FAILED: disk is %s while going diskless\n",
1358 drbd_disk_str(mdev->state.disk));
1359
1360 mdev->rs_total = 0;
1361 mdev->rs_failed = 0;
1362 atomic_set(&mdev->rs_pending_cnt, 0);
1363
927036f9 1364 if (!drbd_send_state(mdev))
4dbdae3e 1365 dev_info(DEV, "Notified peer that I'm now diskless.\n");
b8907339
PR
1366 /* corresponding get_ldev in __drbd_set_state
1367 * this may finally trigger drbd_ldev_destroy. */
1368 put_ldev(mdev);
1369 }
1370
1371 /* Notify peer that I had a local IO error, and did not detached.. */
1372 if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT)
1373 drbd_send_state(mdev);
1374
1375 /* Disks got bigger while they were detached */
1376 if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
1377 test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
1378 if (ns.conn == C_CONNECTED)
1379 resync_after_online_grow(mdev);
1380 }
1381
1382 /* A resync finished or aborted, wake paused devices... */
1383 if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
1384 (os.peer_isp && !ns.peer_isp) ||
1385 (os.user_isp && !ns.user_isp))
1386 resume_next_sg(mdev);
1387
1388 /* sync target done with resync. Explicitly notify peer, even though
1389 * it should (at least for non-empty resyncs) already know itself. */
1390 if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
1391 drbd_send_state(mdev);
1392
1393 /* This triggers bitmap writeout of potentially still unwritten pages
1394 * if the resync finished cleanly, or aborted because of peer disk
1395 * failure, or because of connection loss.
1396 * For resync aborted because of local disk failure, we cannot do
1397 * any bitmap writeout anymore.
1398 * No harm done if some bits change during this phase.
1399 */
1400 if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
1401 drbd_queue_bitmap_io(mdev, &drbd_bm_write, NULL,
1402 "write from resync_finished", BM_LOCKED_SET_ALLOWED);
1403 put_ldev(mdev);
1404 }
1405
1406 if (ns.disk == D_DISKLESS &&
1407 ns.conn == C_STANDALONE &&
1408 ns.role == R_SECONDARY) {
1409 if (os.aftr_isp != ns.aftr_isp)
1410 resume_next_sg(mdev);
1411 }
1412
b8907339
PR
1413 drbd_md_sync(mdev);
1414}
1415
bbeb641c
PR
1416struct after_conn_state_chg_work {
1417 struct drbd_work w;
1418 enum drbd_conns oc;
8c7e16c3 1419 union drbd_state ns_min;
5f082f98 1420 union drbd_state ns_max; /* new, max state, over all mdevs */
bbeb641c
PR
1421 enum chg_state_flags flags;
1422};
1423
99920dc5 1424static int w_after_conn_state_ch(struct drbd_work *w, int unused)
bbeb641c
PR
1425{
1426 struct after_conn_state_chg_work *acscw =
1427 container_of(w, struct after_conn_state_chg_work, w);
1428 struct drbd_tconn *tconn = w->tconn;
1429 enum drbd_conns oc = acscw->oc;
5f082f98 1430 union drbd_state ns_max = acscw->ns_max;
a6d00c8e
PR
1431 union drbd_state ns_min = acscw->ns_min;
1432 struct drbd_conf *mdev;
1433 int vnr;
bbeb641c
PR
1434
1435 kfree(acscw);
1436
b8907339 1437 /* Upon network configuration, we need to start the receiver */
5f082f98 1438 if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
b8907339
PR
1439 drbd_thread_start(&tconn->receiver);
1440
f3dfa40a
LE
1441 if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
1442 struct net_conf *old_conf;
1443
a0095508 1444 mutex_lock(&tconn->conf_update);
f3dfa40a 1445 old_conf = tconn->net_conf;
089c075d
AG
1446 tconn->my_addr_len = 0;
1447 tconn->peer_addr_len = 0;
f3dfa40a
LE
1448 rcu_assign_pointer(tconn->net_conf, NULL);
1449 conn_free_crypto(tconn);
a0095508 1450 mutex_unlock(&tconn->conf_update);
f3dfa40a
LE
1451
1452 synchronize_rcu();
1453 kfree(old_conf);
1454 }
1455
a6d00c8e
PR
1456 if (ns_max.susp_fen) {
1457 /* case1: The outdate peer handler is successful: */
1458 if (ns_max.pdsk <= D_OUTDATED) {
1459 tl_clear(tconn);
695d08fa 1460 rcu_read_lock();
a6d00c8e
PR
1461 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1462 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
1463 drbd_uuid_new_current(mdev);
1464 clear_bit(NEW_CUR_UUID, &mdev->flags);
1465 }
1466 }
695d08fa 1467 rcu_read_unlock();
a6d00c8e
PR
1468 conn_request_state(tconn,
1469 (union drbd_state) { { .susp_fen = 1 } },
1470 (union drbd_state) { { .susp_fen = 0 } },
1471 CS_VERBOSE);
1472 }
1473 /* case2: The connection was established again: */
1474 if (ns_min.conn >= C_CONNECTED) {
695d08fa 1475 rcu_read_lock();
a6d00c8e
PR
1476 idr_for_each_entry(&tconn->volumes, mdev, vnr)
1477 clear_bit(NEW_CUR_UUID, &mdev->flags);
695d08fa 1478 rcu_read_unlock();
a6d00c8e
PR
1479 spin_lock_irq(&tconn->req_lock);
1480 _tl_restart(tconn, RESEND);
1481 _conn_request_state(tconn,
1482 (union drbd_state) { { .susp_fen = 1 } },
1483 (union drbd_state) { { .susp_fen = 0 } },
1484 CS_VERBOSE);
1485 spin_unlock_irq(&tconn->req_lock);
1486 }
1487 }
9dc9fbb3 1488 kref_put(&tconn->kref, &conn_destroy);
99920dc5 1489 return 0;
bbeb641c
PR
1490}
1491
435693e8 1492void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
88ef594e 1493{
435693e8 1494 enum chg_state_flags flags = ~0;
da9fbc27 1495 union drbd_dev_state os, cs = {}; /* old_state, common_state */
88ef594e 1496 struct drbd_conf *mdev;
435693e8 1497 int vnr, first_vol = 1;
88ef594e 1498
695d08fa 1499 rcu_read_lock();
88ef594e
PR
1500 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1501 os = mdev->state;
1502
435693e8
PR
1503 if (first_vol) {
1504 cs = os;
1505 first_vol = 0;
1506 continue;
1507 }
1508
1509 if (cs.role != os.role)
1510 flags &= ~CS_DC_ROLE;
1511
1512 if (cs.peer != os.peer)
1513 flags &= ~CS_DC_PEER;
1514
1515 if (cs.conn != os.conn)
1516 flags &= ~CS_DC_CONN;
88ef594e 1517
435693e8
PR
1518 if (cs.disk != os.disk)
1519 flags &= ~CS_DC_DISK;
88ef594e 1520
435693e8
PR
1521 if (cs.pdsk != os.pdsk)
1522 flags &= ~CS_DC_PDSK;
1523 }
695d08fa 1524 rcu_read_unlock();
435693e8
PR
1525
1526 *pf |= CS_DC_MASK;
1527 *pf &= flags;
da9fbc27 1528 (*pcs).i = cs.i;
88ef594e 1529}
bbeb641c 1530
bd0c824a
PR
1531static enum drbd_state_rv
1532conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
88ef594e 1533 enum chg_state_flags flags)
bbeb641c 1534{
bd0c824a 1535 enum drbd_state_rv rv = SS_SUCCESS;
bbeb641c 1536 union drbd_state ns, os;
bd0c824a
PR
1537 struct drbd_conf *mdev;
1538 int vnr;
bbeb641c 1539
695d08fa 1540 rcu_read_lock();
bd0c824a 1541 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
78bae59b 1542 os = drbd_read_state(mdev);
bd0c824a
PR
1543 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
1544
778bcf2e
PR
1545 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1546 ns.disk = os.disk;
1547
bd0c824a
PR
1548 if (ns.i == os.i)
1549 continue;
bbeb641c 1550
bd0c824a
PR
1551 rv = is_valid_transition(os, ns);
1552 if (rv < SS_SUCCESS)
1553 break;
1554
1555 if (!(flags & CS_HARD)) {
1556 rv = is_valid_state(mdev, ns);
1557 if (rv < SS_SUCCESS) {
1558 if (is_valid_state(mdev, os) == rv)
1559 rv = is_valid_soft_transition(os, ns);
1560 } else
1561 rv = is_valid_soft_transition(os, ns);
1562 }
1563 if (rv < SS_SUCCESS)
1564 break;
bbeb641c 1565 }
695d08fa 1566 rcu_read_unlock();
bbeb641c 1567
bd0c824a
PR
1568 if (rv < SS_SUCCESS && flags & CS_VERBOSE)
1569 print_st_err(mdev, os, ns, rv);
1570
1571 return rv;
bbeb641c
PR
1572}
1573
8c7e16c3 1574void
bd0c824a 1575conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
8c7e16c3 1576 union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
bbeb641c 1577{
8c7e16c3
PR
1578 union drbd_state ns, os, ns_max = { };
1579 union drbd_state ns_min = {
1580 { .role = R_MASK,
1581 .peer = R_MASK,
1582 .disk = D_MASK,
1583 .pdsk = D_MASK
1584 } };
bd0c824a 1585 struct drbd_conf *mdev;
bbeb641c 1586 enum drbd_state_rv rv;
bd0c824a 1587 int vnr;
bbeb641c 1588
bd0c824a
PR
1589 if (mask.conn == C_MASK)
1590 tconn->cstate = val.conn;
1591
695d08fa 1592 rcu_read_lock();
bd0c824a 1593 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
78bae59b 1594 os = drbd_read_state(mdev);
bd0c824a
PR
1595 ns = apply_mask_val(os, mask, val);
1596 ns = sanitize_state(mdev, ns, NULL);
bbeb641c 1597
778bcf2e
PR
1598 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1599 ns.disk = os.disk;
1600
bd0c824a
PR
1601 rv = __drbd_set_state(mdev, ns, flags, NULL);
1602 if (rv < SS_SUCCESS)
1603 BUG();
bbeb641c 1604
8c7e16c3
PR
1605 ns.i = mdev->state.i;
1606 ns_max.role = max_role(ns.role, ns_max.role);
1607 ns_max.peer = max_role(ns.peer, ns_max.peer);
1608 ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
1609 ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
1610 ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
1611
1612 ns_min.role = min_role(ns.role, ns_min.role);
1613 ns_min.peer = min_role(ns.peer, ns_min.peer);
1614 ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
1615 ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
1616 ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
bd0c824a 1617 }
695d08fa 1618 rcu_read_unlock();
bbeb641c 1619
8c7e16c3
PR
1620 ns_min.susp = ns_max.susp = tconn->susp;
1621 ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
1622 ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
1623
1624 *pns_min = ns_min;
1625 *pns_max = ns_max;
bbeb641c
PR
1626}
1627
df24aa45
PR
1628static enum drbd_state_rv
1629_conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
1630{
df24aa45
PR
1631 enum drbd_state_rv rv;
1632
1633 if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
1634 return SS_CW_SUCCESS;
1635
1636 if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
1637 return SS_CW_FAILED_BY_PEER;
1638
df24aa45
PR
1639 spin_lock_irq(&tconn->req_lock);
1640 rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR;
1641
1642 if (rv == SS_UNKNOWN_ERROR)
435693e8 1643 rv = conn_is_valid_transition(tconn, mask, val, 0);
df24aa45 1644
bd0c824a
PR
1645 if (rv == SS_SUCCESS)
1646 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
df24aa45
PR
1647
1648 spin_unlock_irq(&tconn->req_lock);
1649
1650 return rv;
1651}
1652
1653static enum drbd_state_rv
1654conn_cl_wide(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1655 enum chg_state_flags f)
1656{
1657 enum drbd_state_rv rv;
1658
1659 spin_unlock_irq(&tconn->req_lock);
1660 mutex_lock(&tconn->cstate_mutex);
1661
caee1c3a 1662 if (conn_send_state_req(tconn, mask, val)) {
df24aa45
PR
1663 rv = SS_CW_FAILED_BY_PEER;
1664 /* if (f & CS_VERBOSE)
1665 print_st_err(mdev, os, ns, rv); */
1666 goto abort;
1667 }
1668
1669 wait_event(tconn->ping_wait, (rv = _conn_rq_cond(tconn, mask, val)));
1670
1671abort:
1672 mutex_unlock(&tconn->cstate_mutex);
1673 spin_lock_irq(&tconn->req_lock);
1674
1675 return rv;
1676}
1677
bbeb641c
PR
1678enum drbd_state_rv
1679_conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1680 enum chg_state_flags flags)
1681{
1682 enum drbd_state_rv rv = SS_SUCCESS;
bbeb641c
PR
1683 struct after_conn_state_chg_work *acscw;
1684 enum drbd_conns oc = tconn->cstate;
8c7e16c3 1685 union drbd_state ns_max, ns_min, os;
bbeb641c 1686
bbeb641c
PR
1687 rv = is_valid_conn_transition(oc, val.conn);
1688 if (rv < SS_SUCCESS)
1689 goto abort;
1690
88ef594e 1691 rv = conn_is_valid_transition(tconn, mask, val, flags);
bbeb641c
PR
1692 if (rv < SS_SUCCESS)
1693 goto abort;
1694
df24aa45
PR
1695 if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
1696 !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
1697 rv = conn_cl_wide(tconn, mask, val, flags);
1698 if (rv < SS_SUCCESS)
1699 goto abort;
1700 }
1701
435693e8 1702 conn_old_common_state(tconn, &os, &flags);
706cb24c 1703 flags |= CS_DC_SUSP;
8c7e16c3 1704 conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
5f082f98 1705 conn_pr_state_change(tconn, os, ns_max, flags);
bbeb641c
PR
1706
1707 acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
1708 if (acscw) {
435693e8 1709 acscw->oc = os.conn;
8c7e16c3 1710 acscw->ns_min = ns_min;
5f082f98 1711 acscw->ns_max = ns_max;
bbeb641c
PR
1712 acscw->flags = flags;
1713 acscw->w.cb = w_after_conn_state_ch;
9dc9fbb3 1714 kref_get(&tconn->kref);
bbeb641c
PR
1715 acscw->w.tconn = tconn;
1716 drbd_queue_work(&tconn->data.work, &acscw->w);
1717 } else {
1718 conn_err(tconn, "Could not kmalloc an acscw\n");
b8907339 1719 }
bbeb641c
PR
1720
1721abort:
bbeb641c
PR
1722 return rv;
1723}
1724
1725enum drbd_state_rv
1726conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1727 enum chg_state_flags flags)
1728{
1729 enum drbd_state_rv rv;
1730
1731 spin_lock_irq(&tconn->req_lock);
1732 rv = _conn_request_state(tconn, mask, val, flags);
1733 spin_unlock_irq(&tconn->req_lock);
1734
1735 return rv;
b8907339 1736}
This page took 0.114395 seconds and 5 git commands to generate.