blob: ecc5e27616682ca99d426dd55d21730eed9fca44 [file] [log] [blame]
Philipp Reisnerb8907332011-01-27 14:07:51 +01001/*
2 drbd_state.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 Thanks to Carter Burden, Bart Grantham and Gennadiy Nerubayev
11 from Logicworks, Inc. for making SDP replication support possible.
12
13 drbd is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2, or (at your option)
16 any later version.
17
18 drbd is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with drbd; see the file COPYING. If not, write to
25 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
26 */
27
28#include <linux/drbd_limits.h>
29#include "drbd_int.h"
30#include "drbd_req.h"
31
Philipp Reisnercdfda632011-07-05 15:38:59 +020032/* in drbd_main.c */
Andreas Gruenbacher71fc7ee2011-07-17 23:06:12 +020033extern void tl_abort_disk_io(struct drbd_conf *mdev);
Philipp Reisnercdfda632011-07-05 15:38:59 +020034
Philipp Reisnerb8907332011-01-27 14:07:51 +010035struct after_state_chg_work {
36 struct drbd_work w;
37 union drbd_state os;
38 union drbd_state ns;
39 enum chg_state_flags flags;
40 struct completion *done;
41};
42
Philipp Reisnerd942ae42011-05-31 13:07:24 +020043enum sanitize_state_warnings {
44 NO_WARNING,
45 ABORTED_ONLINE_VERIFY,
46 ABORTED_RESYNC,
47 CONNECTION_LOST_NEGOTIATING,
48 IMPLICITLY_UPGRADED_DISK,
49 IMPLICITLY_UPGRADED_PDSK,
50};
51
Andreas Gruenbacher99920dc2011-03-16 15:31:39 +010052static int w_after_state_ch(struct drbd_work *w, int unused);
Philipp Reisnerb8907332011-01-27 14:07:51 +010053static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
54 union drbd_state ns, enum chg_state_flags flags);
Philipp Reisnera75f34a2011-02-09 15:10:33 +010055static enum drbd_state_rv is_valid_state(struct drbd_conf *, union drbd_state);
56static enum drbd_state_rv is_valid_soft_transition(union drbd_state, union drbd_state);
Philipp Reisner35095022011-02-09 16:29:33 +010057static enum drbd_state_rv is_valid_transition(union drbd_state os, union drbd_state ns);
Philipp Reisner4308a0a2011-02-10 11:24:38 +010058static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
Philipp Reisnerd942ae42011-05-31 13:07:24 +020059 enum sanitize_state_warnings *warn);
Philipp Reisnerb8907332011-01-27 14:07:51 +010060
Philipp Reisner2aebfab2011-03-28 16:48:11 +020061static inline bool is_susp(union drbd_state s)
62{
63 return s.susp || s.susp_nod || s.susp_fen;
64}
65
Lars Ellenbergd0456c72011-03-10 23:28:13 +010066bool conn_all_vols_unconf(struct drbd_tconn *tconn)
Philipp Reisner0e29d162011-02-18 14:23:11 +010067{
68 struct drbd_conf *mdev;
Philipp Reisner695d08f2011-04-11 22:53:32 -070069 bool rv = true;
Philipp Reisnere90285e2011-03-22 12:51:21 +010070 int vnr;
Philipp Reisner0e29d162011-02-18 14:23:11 +010071
Philipp Reisner695d08f2011-04-11 22:53:32 -070072 rcu_read_lock();
Philipp Reisnere90285e2011-03-22 12:51:21 +010073 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
Lars Ellenbergd0456c72011-03-10 23:28:13 +010074 if (mdev->state.disk != D_DISKLESS ||
75 mdev->state.conn != C_STANDALONE ||
Philipp Reisner695d08f2011-04-11 22:53:32 -070076 mdev->state.role != R_SECONDARY) {
77 rv = false;
78 break;
79 }
Philipp Reisner0e29d162011-02-18 14:23:11 +010080 }
Philipp Reisner695d08f2011-04-11 22:53:32 -070081 rcu_read_unlock();
82
83 return rv;
Philipp Reisner0e29d162011-02-18 14:23:11 +010084}
85
Philipp Reisnercb703452011-03-24 11:03:07 +010086/* Unfortunately the states where not correctly ordered, when
87 they where defined. therefore can not use max_t() here. */
88static enum drbd_role max_role(enum drbd_role role1, enum drbd_role role2)
89{
90 if (role1 == R_PRIMARY || role2 == R_PRIMARY)
91 return R_PRIMARY;
92 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
93 return R_SECONDARY;
94 return R_UNKNOWN;
95}
96static enum drbd_role min_role(enum drbd_role role1, enum drbd_role role2)
97{
98 if (role1 == R_UNKNOWN || role2 == R_UNKNOWN)
99 return R_UNKNOWN;
100 if (role1 == R_SECONDARY || role2 == R_SECONDARY)
101 return R_SECONDARY;
102 return R_PRIMARY;
103}
104
105enum drbd_role conn_highest_role(struct drbd_tconn *tconn)
106{
107 enum drbd_role role = R_UNKNOWN;
108 struct drbd_conf *mdev;
109 int vnr;
110
Philipp Reisner695d08f2011-04-11 22:53:32 -0700111 rcu_read_lock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100112 idr_for_each_entry(&tconn->volumes, mdev, vnr)
113 role = max_role(role, mdev->state.role);
Philipp Reisner695d08f2011-04-11 22:53:32 -0700114 rcu_read_unlock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100115
116 return role;
117}
118
119enum drbd_role conn_highest_peer(struct drbd_tconn *tconn)
120{
121 enum drbd_role peer = R_UNKNOWN;
122 struct drbd_conf *mdev;
123 int vnr;
124
Philipp Reisner695d08f2011-04-11 22:53:32 -0700125 rcu_read_lock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100126 idr_for_each_entry(&tconn->volumes, mdev, vnr)
127 peer = max_role(peer, mdev->state.peer);
Philipp Reisner695d08f2011-04-11 22:53:32 -0700128 rcu_read_unlock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100129
130 return peer;
131}
132
133enum drbd_disk_state conn_highest_disk(struct drbd_tconn *tconn)
134{
135 enum drbd_disk_state ds = D_DISKLESS;
136 struct drbd_conf *mdev;
137 int vnr;
138
Philipp Reisner695d08f2011-04-11 22:53:32 -0700139 rcu_read_lock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100140 idr_for_each_entry(&tconn->volumes, mdev, vnr)
141 ds = max_t(enum drbd_disk_state, ds, mdev->state.disk);
Philipp Reisner695d08f2011-04-11 22:53:32 -0700142 rcu_read_unlock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100143
144 return ds;
145}
146
Philipp Reisner46692652011-03-29 18:15:49 +0200147enum drbd_disk_state conn_lowest_disk(struct drbd_tconn *tconn)
148{
149 enum drbd_disk_state ds = D_MASK;
150 struct drbd_conf *mdev;
151 int vnr;
152
Philipp Reisner695d08f2011-04-11 22:53:32 -0700153 rcu_read_lock();
Philipp Reisner46692652011-03-29 18:15:49 +0200154 idr_for_each_entry(&tconn->volumes, mdev, vnr)
155 ds = min_t(enum drbd_disk_state, ds, mdev->state.disk);
Philipp Reisner695d08f2011-04-11 22:53:32 -0700156 rcu_read_unlock();
Philipp Reisner46692652011-03-29 18:15:49 +0200157
158 return ds;
159}
160
Philipp Reisnercb703452011-03-24 11:03:07 +0100161enum drbd_disk_state conn_highest_pdsk(struct drbd_tconn *tconn)
162{
163 enum drbd_disk_state ds = D_DISKLESS;
164 struct drbd_conf *mdev;
165 int vnr;
166
Philipp Reisner695d08f2011-04-11 22:53:32 -0700167 rcu_read_lock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100168 idr_for_each_entry(&tconn->volumes, mdev, vnr)
169 ds = max_t(enum drbd_disk_state, ds, mdev->state.pdsk);
Philipp Reisner695d08f2011-04-11 22:53:32 -0700170 rcu_read_unlock();
Philipp Reisnercb703452011-03-24 11:03:07 +0100171
172 return ds;
173}
174
Philipp Reisner19f83c72011-03-29 14:21:03 +0200175enum drbd_conns conn_lowest_conn(struct drbd_tconn *tconn)
176{
177 enum drbd_conns conn = C_MASK;
178 struct drbd_conf *mdev;
179 int vnr;
180
Philipp Reisner695d08f2011-04-11 22:53:32 -0700181 rcu_read_lock();
Philipp Reisner19f83c72011-03-29 14:21:03 +0200182 idr_for_each_entry(&tconn->volumes, mdev, vnr)
183 conn = min_t(enum drbd_conns, conn, mdev->state.conn);
Philipp Reisner695d08f2011-04-11 22:53:32 -0700184 rcu_read_unlock();
Philipp Reisner19f83c72011-03-29 14:21:03 +0200185
186 return conn;
187}
188
Philipp Reisnerb8907332011-01-27 14:07:51 +0100189/**
190 * cl_wide_st_chg() - true if the state change is a cluster wide one
191 * @mdev: DRBD device.
192 * @os: old (current) state.
193 * @ns: new (wanted) state.
194 */
195static int cl_wide_st_chg(struct drbd_conf *mdev,
196 union drbd_state os, union drbd_state ns)
197{
198 return (os.conn >= C_CONNECTED && ns.conn >= C_CONNECTED &&
199 ((os.role != R_PRIMARY && ns.role == R_PRIMARY) ||
200 (os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
201 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S) ||
202 (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))) ||
203 (os.conn >= C_CONNECTED && ns.conn == C_DISCONNECTING) ||
Philipp Reisner369bea62011-07-06 23:04:44 +0200204 (os.conn == C_CONNECTED && ns.conn == C_VERIFY_S) ||
205 (os.conn == C_CONNECTED && ns.conn == C_WF_REPORT_PARAMS);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100206}
207
Philipp Reisner56707f92011-02-16 14:57:50 +0100208static union drbd_state
209apply_mask_val(union drbd_state os, union drbd_state mask, union drbd_state val)
210{
211 union drbd_state ns;
212 ns.i = (os.i & ~mask.i) | val.i;
213 return ns;
214}
215
Philipp Reisnerb8907332011-01-27 14:07:51 +0100216enum drbd_state_rv
217drbd_change_state(struct drbd_conf *mdev, enum chg_state_flags f,
218 union drbd_state mask, union drbd_state val)
219{
220 unsigned long flags;
Philipp Reisner56707f92011-02-16 14:57:50 +0100221 union drbd_state ns;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100222 enum drbd_state_rv rv;
223
224 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
Philipp Reisner78bae592011-03-28 15:40:12 +0200225 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100226 rv = _drbd_set_state(mdev, ns, f, NULL);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100227 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
228
229 return rv;
230}
231
232/**
233 * drbd_force_state() - Impose a change which happens outside our control on our state
234 * @mdev: DRBD device.
235 * @mask: mask of state bits to change.
236 * @val: value of new state bits.
237 */
238void drbd_force_state(struct drbd_conf *mdev,
239 union drbd_state mask, union drbd_state val)
240{
241 drbd_change_state(mdev, CS_HARD, mask, val);
242}
243
244static enum drbd_state_rv
245_req_st_cond(struct drbd_conf *mdev, union drbd_state mask,
246 union drbd_state val)
247{
248 union drbd_state os, ns;
249 unsigned long flags;
250 enum drbd_state_rv rv;
251
252 if (test_and_clear_bit(CL_ST_CHG_SUCCESS, &mdev->flags))
253 return SS_CW_SUCCESS;
254
255 if (test_and_clear_bit(CL_ST_CHG_FAIL, &mdev->flags))
256 return SS_CW_FAILED_BY_PEER;
257
Philipp Reisnerb8907332011-01-27 14:07:51 +0100258 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
Philipp Reisner78bae592011-03-28 15:40:12 +0200259 os = drbd_read_state(mdev);
Philipp Reisner56707f92011-02-16 14:57:50 +0100260 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
Philipp Reisner35095022011-02-09 16:29:33 +0100261 rv = is_valid_transition(os, ns);
262 if (rv == SS_SUCCESS)
263 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
Philipp Reisnerb8907332011-01-27 14:07:51 +0100264
265 if (!cl_wide_st_chg(mdev, os, ns))
266 rv = SS_CW_NO_NEED;
Philipp Reisner35095022011-02-09 16:29:33 +0100267 if (rv == SS_UNKNOWN_ERROR) {
Philipp Reisnerb8907332011-01-27 14:07:51 +0100268 rv = is_valid_state(mdev, ns);
269 if (rv == SS_SUCCESS) {
Philipp Reisnera75f34a2011-02-09 15:10:33 +0100270 rv = is_valid_soft_transition(os, ns);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100271 if (rv == SS_SUCCESS)
272 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
273 }
274 }
275 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
276
277 return rv;
278}
279
280/**
281 * drbd_req_state() - Perform an eventually cluster wide state change
282 * @mdev: DRBD device.
283 * @mask: mask of state bits to change.
284 * @val: value of new state bits.
285 * @f: flags
286 *
287 * Should not be called directly, use drbd_request_state() or
288 * _drbd_request_state().
289 */
290static enum drbd_state_rv
291drbd_req_state(struct drbd_conf *mdev, union drbd_state mask,
292 union drbd_state val, enum chg_state_flags f)
293{
294 struct completion done;
295 unsigned long flags;
296 union drbd_state os, ns;
297 enum drbd_state_rv rv;
298
299 init_completion(&done);
300
301 if (f & CS_SERIALIZE)
Philipp Reisner8410da82011-02-11 20:11:10 +0100302 mutex_lock(mdev->state_mutex);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100303
304 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
Philipp Reisner78bae592011-03-28 15:40:12 +0200305 os = drbd_read_state(mdev);
Philipp Reisner56707f92011-02-16 14:57:50 +0100306 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
Philipp Reisner35095022011-02-09 16:29:33 +0100307 rv = is_valid_transition(os, ns);
Lars Ellenberg3c5e5f62011-03-15 16:04:09 +0100308 if (rv < SS_SUCCESS) {
309 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
Philipp Reisner35095022011-02-09 16:29:33 +0100310 goto abort;
Lars Ellenberg3c5e5f62011-03-15 16:04:09 +0100311 }
Philipp Reisnerb8907332011-01-27 14:07:51 +0100312
313 if (cl_wide_st_chg(mdev, os, ns)) {
314 rv = is_valid_state(mdev, ns);
315 if (rv == SS_SUCCESS)
Philipp Reisnera75f34a2011-02-09 15:10:33 +0100316 rv = is_valid_soft_transition(os, ns);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100317 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
318
319 if (rv < SS_SUCCESS) {
320 if (f & CS_VERBOSE)
321 print_st_err(mdev, os, ns, rv);
322 goto abort;
323 }
324
Andreas Gruenbacherd24ae212011-03-16 01:19:27 +0100325 if (drbd_send_state_req(mdev, mask, val)) {
Philipp Reisnerb8907332011-01-27 14:07:51 +0100326 rv = SS_CW_FAILED_BY_PEER;
327 if (f & CS_VERBOSE)
328 print_st_err(mdev, os, ns, rv);
329 goto abort;
330 }
331
332 wait_event(mdev->state_wait,
333 (rv = _req_st_cond(mdev, mask, val)));
334
335 if (rv < SS_SUCCESS) {
Philipp Reisnerb8907332011-01-27 14:07:51 +0100336 if (f & CS_VERBOSE)
337 print_st_err(mdev, os, ns, rv);
338 goto abort;
339 }
340 spin_lock_irqsave(&mdev->tconn->req_lock, flags);
Philipp Reisner78bae592011-03-28 15:40:12 +0200341 ns = apply_mask_val(drbd_read_state(mdev), mask, val);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100342 rv = _drbd_set_state(mdev, ns, f, &done);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100343 } else {
344 rv = _drbd_set_state(mdev, ns, f, &done);
345 }
346
347 spin_unlock_irqrestore(&mdev->tconn->req_lock, flags);
348
349 if (f & CS_WAIT_COMPLETE && rv == SS_SUCCESS) {
350 D_ASSERT(current != mdev->tconn->worker.task);
351 wait_for_completion(&done);
352 }
353
354abort:
355 if (f & CS_SERIALIZE)
Philipp Reisner8410da82011-02-11 20:11:10 +0100356 mutex_unlock(mdev->state_mutex);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100357
358 return rv;
359}
360
361/**
362 * _drbd_request_state() - Request a state change (with flags)
363 * @mdev: DRBD device.
364 * @mask: mask of state bits to change.
365 * @val: value of new state bits.
366 * @f: flags
367 *
368 * Cousin of drbd_request_state(), useful with the CS_WAIT_COMPLETE
369 * flag, or when logging of failed state change requests is not desired.
370 */
371enum drbd_state_rv
372_drbd_request_state(struct drbd_conf *mdev, union drbd_state mask,
373 union drbd_state val, enum chg_state_flags f)
374{
375 enum drbd_state_rv rv;
376
377 wait_event(mdev->state_wait,
378 (rv = drbd_req_state(mdev, mask, val, f)) != SS_IN_TRANSIENT_STATE);
379
380 return rv;
381}
382
383static void print_st(struct drbd_conf *mdev, char *name, union drbd_state ns)
384{
385 dev_err(DEV, " %s = { cs:%s ro:%s/%s ds:%s/%s %c%c%c%c%c%c }\n",
386 name,
387 drbd_conn_str(ns.conn),
388 drbd_role_str(ns.role),
389 drbd_role_str(ns.peer),
390 drbd_disk_str(ns.disk),
391 drbd_disk_str(ns.pdsk),
392 is_susp(ns) ? 's' : 'r',
393 ns.aftr_isp ? 'a' : '-',
394 ns.peer_isp ? 'p' : '-',
395 ns.user_isp ? 'u' : '-',
396 ns.susp_fen ? 'F' : '-',
397 ns.susp_nod ? 'N' : '-'
398 );
399}
400
401void print_st_err(struct drbd_conf *mdev, union drbd_state os,
402 union drbd_state ns, enum drbd_state_rv err)
403{
404 if (err == SS_IN_TRANSIENT_STATE)
405 return;
406 dev_err(DEV, "State change failed: %s\n", drbd_set_st_err_str(err));
407 print_st(mdev, " state", os);
408 print_st(mdev, "wanted", ns);
409}
410
Philipp Reisner435693e2011-03-25 15:11:30 +0100411static long print_state_change(char *pb, union drbd_state os, union drbd_state ns,
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100412 enum chg_state_flags flags)
413{
Philipp Reisner435693e2011-03-25 15:11:30 +0100414 char *pbp;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100415 pbp = pb;
416 *pbp = 0;
Philipp Reisner706cb242011-03-29 15:20:27 +0200417
Philipp Reisner435693e2011-03-25 15:11:30 +0100418 if (ns.role != os.role && flags & CS_DC_ROLE)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100419 pbp += sprintf(pbp, "role( %s -> %s ) ",
420 drbd_role_str(os.role),
421 drbd_role_str(ns.role));
Philipp Reisner435693e2011-03-25 15:11:30 +0100422 if (ns.peer != os.peer && flags & CS_DC_PEER)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100423 pbp += sprintf(pbp, "peer( %s -> %s ) ",
424 drbd_role_str(os.peer),
425 drbd_role_str(ns.peer));
Philipp Reisner435693e2011-03-25 15:11:30 +0100426 if (ns.conn != os.conn && flags & CS_DC_CONN)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100427 pbp += sprintf(pbp, "conn( %s -> %s ) ",
428 drbd_conn_str(os.conn),
429 drbd_conn_str(ns.conn));
Philipp Reisner435693e2011-03-25 15:11:30 +0100430 if (ns.disk != os.disk && flags & CS_DC_DISK)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100431 pbp += sprintf(pbp, "disk( %s -> %s ) ",
432 drbd_disk_str(os.disk),
433 drbd_disk_str(ns.disk));
Philipp Reisner435693e2011-03-25 15:11:30 +0100434 if (ns.pdsk != os.pdsk && flags & CS_DC_PDSK)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100435 pbp += sprintf(pbp, "pdsk( %s -> %s ) ",
436 drbd_disk_str(os.pdsk),
437 drbd_disk_str(ns.pdsk));
Philipp Reisner706cb242011-03-29 15:20:27 +0200438
439 return pbp - pb;
440}
441
442static void drbd_pr_state_change(struct drbd_conf *mdev, union drbd_state os, union drbd_state ns,
443 enum chg_state_flags flags)
444{
445 char pb[300];
446 char *pbp = pb;
447
448 pbp += print_state_change(pbp, os, ns, flags ^ CS_DC_MASK);
449
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100450 if (ns.aftr_isp != os.aftr_isp)
451 pbp += sprintf(pbp, "aftr_isp( %d -> %d ) ",
452 os.aftr_isp,
453 ns.aftr_isp);
454 if (ns.peer_isp != os.peer_isp)
455 pbp += sprintf(pbp, "peer_isp( %d -> %d ) ",
456 os.peer_isp,
457 ns.peer_isp);
458 if (ns.user_isp != os.user_isp)
459 pbp += sprintf(pbp, "user_isp( %d -> %d ) ",
460 os.user_isp,
461 ns.user_isp);
Philipp Reisner435693e2011-03-25 15:11:30 +0100462
Philipp Reisner706cb242011-03-29 15:20:27 +0200463 if (pbp != pb)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +0100464 dev_info(DEV, "%s\n", pb);
465}
Philipp Reisnerb8907332011-01-27 14:07:51 +0100466
Philipp Reisner435693e2011-03-25 15:11:30 +0100467static void conn_pr_state_change(struct drbd_tconn *tconn, union drbd_state os, union drbd_state ns,
468 enum chg_state_flags flags)
469{
470 char pb[300];
Philipp Reisner706cb242011-03-29 15:20:27 +0200471 char *pbp = pb;
Philipp Reisner435693e2011-03-25 15:11:30 +0100472
Philipp Reisner706cb242011-03-29 15:20:27 +0200473 pbp += print_state_change(pbp, os, ns, flags);
474
475 if (is_susp(ns) != is_susp(os) && flags & CS_DC_SUSP)
476 pbp += sprintf(pbp, "susp( %d -> %d ) ",
477 is_susp(os),
478 is_susp(ns));
479
480 if (pbp != pb)
Philipp Reisner435693e2011-03-25 15:11:30 +0100481 conn_info(tconn, "%s\n", pb);
482}
483
484
Philipp Reisnerb8907332011-01-27 14:07:51 +0100485/**
486 * is_valid_state() - Returns an SS_ error code if ns is not valid
487 * @mdev: DRBD device.
488 * @ns: State to consider.
489 */
490static enum drbd_state_rv
491is_valid_state(struct drbd_conf *mdev, union drbd_state ns)
492{
493 /* See drbd_state_sw_errors in drbd_strings.c */
494
495 enum drbd_fencing_p fp;
496 enum drbd_state_rv rv = SS_SUCCESS;
Philipp Reisner44ed1672011-04-19 17:10:19 +0200497 struct net_conf *nc;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100498
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200499 rcu_read_lock();
Philipp Reisnerb8907332011-01-27 14:07:51 +0100500 fp = FP_DONT_CARE;
501 if (get_ldev(mdev)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200502 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100503 put_ldev(mdev);
504 }
505
Philipp Reisner44ed1672011-04-19 17:10:19 +0200506 nc = rcu_dereference(mdev->tconn->net_conf);
507 if (nc) {
508 if (!nc->two_primaries && ns.role == R_PRIMARY) {
Philipp Reisner047e95e22011-03-16 14:43:36 +0100509 if (ns.peer == R_PRIMARY)
510 rv = SS_TWO_PRIMARIES;
Philipp Reisnercb703452011-03-24 11:03:07 +0100511 else if (conn_highest_peer(mdev->tconn) == R_PRIMARY)
Philipp Reisner047e95e22011-03-16 14:43:36 +0100512 rv = SS_O_VOL_PEER_PRI;
Philipp Reisner44ed1672011-04-19 17:10:19 +0200513 }
Philipp Reisnerb8907332011-01-27 14:07:51 +0100514 }
515
516 if (rv <= 0)
517 /* already found a reason to abort */;
518 else if (ns.role == R_SECONDARY && mdev->open_cnt)
519 rv = SS_DEVICE_IN_USE;
520
521 else if (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.disk < D_UP_TO_DATE)
522 rv = SS_NO_UP_TO_DATE_DISK;
523
524 else if (fp >= FP_RESOURCE &&
525 ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk >= D_UNKNOWN)
526 rv = SS_PRIMARY_NOP;
527
528 else if (ns.role == R_PRIMARY && ns.disk <= D_INCONSISTENT && ns.pdsk <= D_INCONSISTENT)
529 rv = SS_NO_UP_TO_DATE_DISK;
530
531 else if (ns.conn > C_CONNECTED && ns.disk < D_INCONSISTENT)
532 rv = SS_NO_LOCAL_DISK;
533
534 else if (ns.conn > C_CONNECTED && ns.pdsk < D_INCONSISTENT)
535 rv = SS_NO_REMOTE_DISK;
536
537 else if (ns.conn > C_CONNECTED && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE)
538 rv = SS_NO_UP_TO_DATE_DISK;
539
540 else if ((ns.conn == C_CONNECTED ||
541 ns.conn == C_WF_BITMAP_S ||
542 ns.conn == C_SYNC_SOURCE ||
543 ns.conn == C_PAUSED_SYNC_S) &&
544 ns.disk == D_OUTDATED)
545 rv = SS_CONNECTED_OUTDATES;
546
547 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
Philipp Reisner44ed1672011-04-19 17:10:19 +0200548 (nc->verify_alg[0] == 0))
Philipp Reisnerb8907332011-01-27 14:07:51 +0100549 rv = SS_NO_VERIFY_ALG;
550
551 else if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
552 mdev->tconn->agreed_pro_version < 88)
553 rv = SS_NOT_SUPPORTED;
554
555 else if (ns.conn >= C_CONNECTED && ns.pdsk == D_UNKNOWN)
556 rv = SS_CONNECTED_OUTDATES;
557
Philipp Reisner44ed1672011-04-19 17:10:19 +0200558 rcu_read_unlock();
559
Philipp Reisnerb8907332011-01-27 14:07:51 +0100560 return rv;
561}
562
563/**
Philipp Reisnera75f34a2011-02-09 15:10:33 +0100564 * is_valid_soft_transition() - Returns an SS_ error code if the state transition is not possible
Philipp Reisner35095022011-02-09 16:29:33 +0100565 * This function limits state transitions that may be declined by DRBD. I.e.
566 * user requests (aka soft transitions).
Philipp Reisnerb8907332011-01-27 14:07:51 +0100567 * @mdev: DRBD device.
568 * @ns: new state.
569 * @os: old state.
570 */
571static enum drbd_state_rv
Philipp Reisnera75f34a2011-02-09 15:10:33 +0100572is_valid_soft_transition(union drbd_state os, union drbd_state ns)
Philipp Reisnerb8907332011-01-27 14:07:51 +0100573{
574 enum drbd_state_rv rv = SS_SUCCESS;
575
576 if ((ns.conn == C_STARTING_SYNC_T || ns.conn == C_STARTING_SYNC_S) &&
577 os.conn > C_CONNECTED)
578 rv = SS_RESYNC_RUNNING;
579
580 if (ns.conn == C_DISCONNECTING && os.conn == C_STANDALONE)
581 rv = SS_ALREADY_STANDALONE;
582
583 if (ns.disk > D_ATTACHING && os.disk == D_DISKLESS)
584 rv = SS_IS_DISKLESS;
585
586 if (ns.conn == C_WF_CONNECTION && os.conn < C_UNCONNECTED)
587 rv = SS_NO_NET_CONFIG;
588
589 if (ns.disk == D_OUTDATED && os.disk < D_OUTDATED && os.disk != D_ATTACHING)
590 rv = SS_LOWER_THAN_OUTDATED;
591
592 if (ns.conn == C_DISCONNECTING && os.conn == C_UNCONNECTED)
593 rv = SS_IN_TRANSIENT_STATE;
594
Philipp Reisner2325eb62011-03-15 16:56:18 +0100595 /* if (ns.conn == os.conn && ns.conn == C_WF_REPORT_PARAMS)
596 rv = SS_IN_TRANSIENT_STATE; */
Philipp Reisnerb8907332011-01-27 14:07:51 +0100597
598 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) && os.conn < C_CONNECTED)
599 rv = SS_NEED_CONNECTION;
600
601 if ((ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T) &&
602 ns.conn != os.conn && os.conn > C_CONNECTED)
603 rv = SS_RESYNC_RUNNING;
604
605 if ((ns.conn == C_STARTING_SYNC_S || ns.conn == C_STARTING_SYNC_T) &&
606 os.conn < C_CONNECTED)
607 rv = SS_NEED_CONNECTION;
608
609 if ((ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)
610 && os.conn < C_WF_REPORT_PARAMS)
611 rv = SS_NEED_CONNECTION; /* No NetworkFailure -> SyncTarget etc... */
612
613 return rv;
614}
615
Philipp Reisnerfda74112011-02-10 10:38:06 +0100616static enum drbd_state_rv
617is_valid_conn_transition(enum drbd_conns oc, enum drbd_conns nc)
618{
Lars Ellenbergd9cc6e22011-04-27 10:25:28 +0200619 /* no change -> nothing to do, at least for the connection part */
620 if (oc == nc)
621 return SS_NOTHING_TO_DO;
Philipp Reisnerfda74112011-02-10 10:38:06 +0100622
Lars Ellenbergd9cc6e22011-04-27 10:25:28 +0200623 /* disconnect of an unconfigured connection does not make sense */
624 if (oc == C_STANDALONE && nc == C_DISCONNECTING)
625 return SS_ALREADY_STANDALONE;
626
627 /* from C_STANDALONE, we start with C_UNCONNECTED */
628 if (oc == C_STANDALONE && nc != C_UNCONNECTED)
629 return SS_NEED_CONNECTION;
Philipp Reisnerfda74112011-02-10 10:38:06 +0100630
631 /* After a network error only C_UNCONNECTED or C_DISCONNECTING may follow. */
632 if (oc >= C_TIMEOUT && oc <= C_TEAR_DOWN && nc != C_UNCONNECTED && nc != C_DISCONNECTING)
Lars Ellenbergd9cc6e22011-04-27 10:25:28 +0200633 return SS_IN_TRANSIENT_STATE;
Philipp Reisnerfda74112011-02-10 10:38:06 +0100634
635 /* After C_DISCONNECTING only C_STANDALONE may follow */
636 if (oc == C_DISCONNECTING && nc != C_STANDALONE)
Lars Ellenbergd9cc6e22011-04-27 10:25:28 +0200637 return SS_IN_TRANSIENT_STATE;
Philipp Reisnerfda74112011-02-10 10:38:06 +0100638
Lars Ellenbergd9cc6e22011-04-27 10:25:28 +0200639 return SS_SUCCESS;
Philipp Reisnerfda74112011-02-10 10:38:06 +0100640}
641
642
Philipp Reisnerb8907332011-01-27 14:07:51 +0100643/**
Philipp Reisner35095022011-02-09 16:29:33 +0100644 * is_valid_transition() - Returns an SS_ error code if the state transition is not possible
645 * This limits hard state transitions. Hard state transitions are facts there are
646 * imposed on DRBD by the environment. E.g. disk broke or network broke down.
647 * But those hard state transitions are still not allowed to do everything.
648 * @ns: new state.
649 * @os: old state.
650 */
651static enum drbd_state_rv
652is_valid_transition(union drbd_state os, union drbd_state ns)
653{
Philipp Reisnerfda74112011-02-10 10:38:06 +0100654 enum drbd_state_rv rv;
Philipp Reisner35095022011-02-09 16:29:33 +0100655
Philipp Reisnerfda74112011-02-10 10:38:06 +0100656 rv = is_valid_conn_transition(os.conn, ns.conn);
Philipp Reisner35095022011-02-09 16:29:33 +0100657
658 /* we cannot fail (again) if we already detached */
659 if (ns.disk == D_FAILED && os.disk == D_DISKLESS)
660 rv = SS_IS_DISKLESS;
661
662 return rv;
663}
664
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200665static void print_sanitize_warnings(struct drbd_conf *mdev, enum sanitize_state_warnings warn)
666{
667 static const char *msg_table[] = {
668 [NO_WARNING] = "",
669 [ABORTED_ONLINE_VERIFY] = "Online-verify aborted.",
670 [ABORTED_RESYNC] = "Resync aborted.",
671 [CONNECTION_LOST_NEGOTIATING] = "Connection lost while negotiating, no data!",
672 [IMPLICITLY_UPGRADED_DISK] = "Implicitly upgraded disk",
673 [IMPLICITLY_UPGRADED_PDSK] = "Implicitly upgraded pdsk",
674 };
675
676 if (warn != NO_WARNING)
677 dev_warn(DEV, "%s\n", msg_table[warn]);
678}
679
Philipp Reisner35095022011-02-09 16:29:33 +0100680/**
Philipp Reisnerb8907332011-01-27 14:07:51 +0100681 * sanitize_state() - Resolves implicitly necessary additional changes to a state transition
682 * @mdev: DRBD device.
683 * @os: old state.
684 * @ns: new state.
685 * @warn_sync_abort:
686 *
687 * When we loose connection, we have to set the state of the peers disk (pdsk)
688 * to D_UNKNOWN. This rule and many more along those lines are in this function.
689 */
Philipp Reisner4308a0a2011-02-10 11:24:38 +0100690static union drbd_state sanitize_state(struct drbd_conf *mdev, union drbd_state ns,
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200691 enum sanitize_state_warnings *warn)
Philipp Reisnerb8907332011-01-27 14:07:51 +0100692{
693 enum drbd_fencing_p fp;
694 enum drbd_disk_state disk_min, disk_max, pdsk_min, pdsk_max;
695
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200696 if (warn)
697 *warn = NO_WARNING;
698
Philipp Reisnerb8907332011-01-27 14:07:51 +0100699 fp = FP_DONT_CARE;
700 if (get_ldev(mdev)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +0200701 rcu_read_lock();
702 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
703 rcu_read_unlock();
Philipp Reisnerb8907332011-01-27 14:07:51 +0100704 put_ldev(mdev);
705 }
706
Philipp Reisner35095022011-02-09 16:29:33 +0100707 /* Implications from connection to peer and peer_isp */
Philipp Reisnerb8907332011-01-27 14:07:51 +0100708 if (ns.conn < C_CONNECTED) {
709 ns.peer_isp = 0;
710 ns.peer = R_UNKNOWN;
711 if (ns.pdsk > D_UNKNOWN || ns.pdsk < D_INCONSISTENT)
712 ns.pdsk = D_UNKNOWN;
713 }
714
715 /* Clear the aftr_isp when becoming unconfigured */
716 if (ns.conn == C_STANDALONE && ns.disk == D_DISKLESS && ns.role == R_SECONDARY)
717 ns.aftr_isp = 0;
718
Philipp Reisner4308a0a2011-02-10 11:24:38 +0100719 /* An implication of the disk states onto the connection state */
Philipp Reisnerb8907332011-01-27 14:07:51 +0100720 /* Abort resync if a disk fails/detaches */
Philipp Reisner4308a0a2011-02-10 11:24:38 +0100721 if (ns.conn > C_CONNECTED && (ns.disk <= D_FAILED || ns.pdsk <= D_FAILED)) {
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200722 if (warn)
723 *warn = ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T ?
724 ABORTED_ONLINE_VERIFY : ABORTED_RESYNC;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100725 ns.conn = C_CONNECTED;
726 }
727
728 /* Connection breaks down before we finished "Negotiating" */
729 if (ns.conn < C_CONNECTED && ns.disk == D_NEGOTIATING &&
730 get_ldev_if_state(mdev, D_NEGOTIATING)) {
731 if (mdev->ed_uuid == mdev->ldev->md.uuid[UI_CURRENT]) {
732 ns.disk = mdev->new_state_tmp.disk;
733 ns.pdsk = mdev->new_state_tmp.pdsk;
734 } else {
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200735 if (warn)
736 *warn = CONNECTION_LOST_NEGOTIATING;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100737 ns.disk = D_DISKLESS;
738 ns.pdsk = D_UNKNOWN;
739 }
740 put_ldev(mdev);
741 }
742
743 /* D_CONSISTENT and D_OUTDATED vanish when we get connected */
744 if (ns.conn >= C_CONNECTED && ns.conn < C_AHEAD) {
745 if (ns.disk == D_CONSISTENT || ns.disk == D_OUTDATED)
746 ns.disk = D_UP_TO_DATE;
747 if (ns.pdsk == D_CONSISTENT || ns.pdsk == D_OUTDATED)
748 ns.pdsk = D_UP_TO_DATE;
749 }
750
751 /* Implications of the connection stat on the disk states */
752 disk_min = D_DISKLESS;
753 disk_max = D_UP_TO_DATE;
754 pdsk_min = D_INCONSISTENT;
755 pdsk_max = D_UNKNOWN;
756 switch ((enum drbd_conns)ns.conn) {
757 case C_WF_BITMAP_T:
758 case C_PAUSED_SYNC_T:
759 case C_STARTING_SYNC_T:
760 case C_WF_SYNC_UUID:
761 case C_BEHIND:
762 disk_min = D_INCONSISTENT;
763 disk_max = D_OUTDATED;
764 pdsk_min = D_UP_TO_DATE;
765 pdsk_max = D_UP_TO_DATE;
766 break;
767 case C_VERIFY_S:
768 case C_VERIFY_T:
769 disk_min = D_UP_TO_DATE;
770 disk_max = D_UP_TO_DATE;
771 pdsk_min = D_UP_TO_DATE;
772 pdsk_max = D_UP_TO_DATE;
773 break;
774 case C_CONNECTED:
775 disk_min = D_DISKLESS;
776 disk_max = D_UP_TO_DATE;
777 pdsk_min = D_DISKLESS;
778 pdsk_max = D_UP_TO_DATE;
779 break;
780 case C_WF_BITMAP_S:
781 case C_PAUSED_SYNC_S:
782 case C_STARTING_SYNC_S:
783 case C_AHEAD:
784 disk_min = D_UP_TO_DATE;
785 disk_max = D_UP_TO_DATE;
786 pdsk_min = D_INCONSISTENT;
787 pdsk_max = D_CONSISTENT; /* D_OUTDATED would be nice. But explicit outdate necessary*/
788 break;
789 case C_SYNC_TARGET:
790 disk_min = D_INCONSISTENT;
791 disk_max = D_INCONSISTENT;
792 pdsk_min = D_UP_TO_DATE;
793 pdsk_max = D_UP_TO_DATE;
794 break;
795 case C_SYNC_SOURCE:
796 disk_min = D_UP_TO_DATE;
797 disk_max = D_UP_TO_DATE;
798 pdsk_min = D_INCONSISTENT;
799 pdsk_max = D_INCONSISTENT;
800 break;
801 case C_STANDALONE:
802 case C_DISCONNECTING:
803 case C_UNCONNECTED:
804 case C_TIMEOUT:
805 case C_BROKEN_PIPE:
806 case C_NETWORK_FAILURE:
807 case C_PROTOCOL_ERROR:
808 case C_TEAR_DOWN:
809 case C_WF_CONNECTION:
810 case C_WF_REPORT_PARAMS:
811 case C_MASK:
812 break;
813 }
814 if (ns.disk > disk_max)
815 ns.disk = disk_max;
816
817 if (ns.disk < disk_min) {
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200818 if (warn)
819 *warn = IMPLICITLY_UPGRADED_DISK;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100820 ns.disk = disk_min;
821 }
822 if (ns.pdsk > pdsk_max)
823 ns.pdsk = pdsk_max;
824
825 if (ns.pdsk < pdsk_min) {
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200826 if (warn)
827 *warn = IMPLICITLY_UPGRADED_PDSK;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100828 ns.pdsk = pdsk_min;
829 }
830
831 if (fp == FP_STONITH &&
Philipp Reisner4308a0a2011-02-10 11:24:38 +0100832 (ns.role == R_PRIMARY && ns.conn < C_CONNECTED && ns.pdsk > D_OUTDATED))
Philipp Reisnerb8907332011-01-27 14:07:51 +0100833 ns.susp_fen = 1; /* Suspend IO while fence-peer handler runs (peer lost) */
834
Lars Ellenbergf3990022011-03-23 14:31:09 +0100835 if (mdev->tconn->res_opts.on_no_data == OND_SUSPEND_IO &&
Philipp Reisner4308a0a2011-02-10 11:24:38 +0100836 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
Philipp Reisnerb8907332011-01-27 14:07:51 +0100837 ns.susp_nod = 1; /* Suspend IO while no data available (no accessible data available) */
838
839 if (ns.aftr_isp || ns.peer_isp || ns.user_isp) {
840 if (ns.conn == C_SYNC_SOURCE)
841 ns.conn = C_PAUSED_SYNC_S;
842 if (ns.conn == C_SYNC_TARGET)
843 ns.conn = C_PAUSED_SYNC_T;
844 } else {
845 if (ns.conn == C_PAUSED_SYNC_S)
846 ns.conn = C_SYNC_SOURCE;
847 if (ns.conn == C_PAUSED_SYNC_T)
848 ns.conn = C_SYNC_TARGET;
849 }
850
851 return ns;
852}
853
854void drbd_resume_al(struct drbd_conf *mdev)
855{
856 if (test_and_clear_bit(AL_SUSPENDED, &mdev->flags))
857 dev_info(DEV, "Resumed AL updates\n");
858}
859
860/* helper for __drbd_set_state */
861static void set_ov_position(struct drbd_conf *mdev, enum drbd_conns cs)
862{
863 if (mdev->tconn->agreed_pro_version < 90)
864 mdev->ov_start_sector = 0;
865 mdev->rs_total = drbd_bm_bits(mdev);
866 mdev->ov_position = 0;
867 if (cs == C_VERIFY_T) {
868 /* starting online verify from an arbitrary position
869 * does not fit well into the existing protocol.
870 * on C_VERIFY_T, we initialize ov_left and friends
871 * implicitly in receive_DataRequest once the
872 * first P_OV_REQUEST is received */
873 mdev->ov_start_sector = ~(sector_t)0;
874 } else {
875 unsigned long bit = BM_SECT_TO_BIT(mdev->ov_start_sector);
876 if (bit >= mdev->rs_total) {
877 mdev->ov_start_sector =
878 BM_BIT_TO_SECT(mdev->rs_total - 1);
879 mdev->rs_total = 1;
880 } else
881 mdev->rs_total -= bit;
882 mdev->ov_position = mdev->ov_start_sector;
883 }
884 mdev->ov_left = mdev->rs_total;
885}
886
887/**
888 * __drbd_set_state() - Set a new DRBD state
889 * @mdev: DRBD device.
890 * @ns: new state.
891 * @flags: Flags
892 * @done: Optional completion, that will get completed after the after_state_ch() finished
893 *
894 * Caller needs to hold req_lock, and global_state_lock. Do not call directly.
895 */
896enum drbd_state_rv
897__drbd_set_state(struct drbd_conf *mdev, union drbd_state ns,
898 enum chg_state_flags flags, struct completion *done)
899{
900 union drbd_state os;
901 enum drbd_state_rv rv = SS_SUCCESS;
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200902 enum sanitize_state_warnings ssw;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100903 struct after_state_chg_work *ascw;
904
Philipp Reisner78bae592011-03-28 15:40:12 +0200905 os = drbd_read_state(mdev);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100906
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200907 ns = sanitize_state(mdev, ns, &ssw);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100908 if (ns.i == os.i)
909 return SS_NOTHING_TO_DO;
910
Philipp Reisner35095022011-02-09 16:29:33 +0100911 rv = is_valid_transition(os, ns);
912 if (rv < SS_SUCCESS)
913 return rv;
914
Philipp Reisnerb8907332011-01-27 14:07:51 +0100915 if (!(flags & CS_HARD)) {
916 /* pre-state-change checks ; only look at ns */
917 /* See drbd_state_sw_errors in drbd_strings.c */
918
919 rv = is_valid_state(mdev, ns);
920 if (rv < SS_SUCCESS) {
921 /* If the old state was illegal as well, then let
922 this happen...*/
923
924 if (is_valid_state(mdev, os) == rv)
Philipp Reisnera75f34a2011-02-09 15:10:33 +0100925 rv = is_valid_soft_transition(os, ns);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100926 } else
Philipp Reisnera75f34a2011-02-09 15:10:33 +0100927 rv = is_valid_soft_transition(os, ns);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100928 }
929
930 if (rv < SS_SUCCESS) {
931 if (flags & CS_VERBOSE)
932 print_st_err(mdev, os, ns, rv);
933 return rv;
934 }
935
Philipp Reisnerd942ae42011-05-31 13:07:24 +0200936 print_sanitize_warnings(mdev, ssw);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100937
Philipp Reisner435693e2011-03-25 15:11:30 +0100938 drbd_pr_state_change(mdev, os, ns, flags);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100939
Philipp Reisner706cb242011-03-29 15:20:27 +0200940 /* Display changes to the susp* flags that where caused by the call to
941 sanitize_state(). Only display it here if we where not called from
942 _conn_request_state() */
943 if (!(flags & CS_DC_SUSP))
944 conn_pr_state_change(mdev->tconn, os, ns, (flags & ~CS_DC_MASK) | CS_DC_SUSP);
945
Philipp Reisnerb8907332011-01-27 14:07:51 +0100946 /* if we are going -> D_FAILED or D_DISKLESS, grab one extra reference
947 * on the ldev here, to be sure the transition -> D_DISKLESS resp.
948 * drbd_ldev_destroy() won't happen before our corresponding
949 * after_state_ch works run, where we put_ldev again. */
950 if ((os.disk != D_FAILED && ns.disk == D_FAILED) ||
951 (os.disk != D_DISKLESS && ns.disk == D_DISKLESS))
952 atomic_inc(&mdev->local_cnt);
953
Philipp Reisnerda9fbc22011-03-29 10:52:01 +0200954 mdev->state.i = ns.i;
Philipp Reisner8e0af252011-03-28 16:18:39 +0200955 mdev->tconn->susp = ns.susp;
956 mdev->tconn->susp_nod = ns.susp_nod;
957 mdev->tconn->susp_fen = ns.susp_fen;
Philipp Reisnerb8907332011-01-27 14:07:51 +0100958
959 if (os.disk == D_ATTACHING && ns.disk >= D_NEGOTIATING)
960 drbd_print_uuids(mdev, "attached to UUIDs");
961
962 wake_up(&mdev->misc_wait);
963 wake_up(&mdev->state_wait);
Philipp Reisner2a67d8b2011-02-09 14:10:32 +0100964 wake_up(&mdev->tconn->ping_wait);
Philipp Reisnerb8907332011-01-27 14:07:51 +0100965
966 /* aborted verify run. log the last position */
967 if ((os.conn == C_VERIFY_S || os.conn == C_VERIFY_T) &&
968 ns.conn < C_CONNECTED) {
969 mdev->ov_start_sector =
970 BM_BIT_TO_SECT(drbd_bm_bits(mdev) - mdev->ov_left);
971 dev_info(DEV, "Online Verify reached sector %llu\n",
972 (unsigned long long)mdev->ov_start_sector);
973 }
974
975 if ((os.conn == C_PAUSED_SYNC_T || os.conn == C_PAUSED_SYNC_S) &&
976 (ns.conn == C_SYNC_TARGET || ns.conn == C_SYNC_SOURCE)) {
977 dev_info(DEV, "Syncer continues.\n");
978 mdev->rs_paused += (long)jiffies
979 -(long)mdev->rs_mark_time[mdev->rs_last_mark];
980 if (ns.conn == C_SYNC_TARGET)
981 mod_timer(&mdev->resync_timer, jiffies);
982 }
983
984 if ((os.conn == C_SYNC_TARGET || os.conn == C_SYNC_SOURCE) &&
985 (ns.conn == C_PAUSED_SYNC_T || ns.conn == C_PAUSED_SYNC_S)) {
986 dev_info(DEV, "Resync suspended\n");
987 mdev->rs_mark_time[mdev->rs_last_mark] = jiffies;
988 }
989
990 if (os.conn == C_CONNECTED &&
991 (ns.conn == C_VERIFY_S || ns.conn == C_VERIFY_T)) {
992 unsigned long now = jiffies;
993 int i;
994
995 set_ov_position(mdev, ns.conn);
996 mdev->rs_start = now;
997 mdev->rs_last_events = 0;
998 mdev->rs_last_sect_ev = 0;
999 mdev->ov_last_oos_size = 0;
1000 mdev->ov_last_oos_start = 0;
1001
1002 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
1003 mdev->rs_mark_left[i] = mdev->ov_left;
1004 mdev->rs_mark_time[i] = now;
1005 }
1006
1007 drbd_rs_controller_reset(mdev);
1008
1009 if (ns.conn == C_VERIFY_S) {
1010 dev_info(DEV, "Starting Online Verify from sector %llu\n",
1011 (unsigned long long)mdev->ov_position);
1012 mod_timer(&mdev->resync_timer, jiffies);
1013 }
1014 }
1015
1016 if (get_ldev(mdev)) {
1017 u32 mdf = mdev->ldev->md.flags & ~(MDF_CONSISTENT|MDF_PRIMARY_IND|
1018 MDF_CONNECTED_IND|MDF_WAS_UP_TO_DATE|
1019 MDF_PEER_OUT_DATED|MDF_CRASHED_PRIMARY);
1020
Lars Ellenbergd5d7ebd2011-07-05 20:59:26 +02001021 mdf &= ~MDF_AL_CLEAN;
Philipp Reisnerb8907332011-01-27 14:07:51 +01001022 if (test_bit(CRASHED_PRIMARY, &mdev->flags))
1023 mdf |= MDF_CRASHED_PRIMARY;
1024 if (mdev->state.role == R_PRIMARY ||
1025 (mdev->state.pdsk < D_INCONSISTENT && mdev->state.peer == R_PRIMARY))
1026 mdf |= MDF_PRIMARY_IND;
1027 if (mdev->state.conn > C_WF_REPORT_PARAMS)
1028 mdf |= MDF_CONNECTED_IND;
1029 if (mdev->state.disk > D_INCONSISTENT)
1030 mdf |= MDF_CONSISTENT;
1031 if (mdev->state.disk > D_OUTDATED)
1032 mdf |= MDF_WAS_UP_TO_DATE;
1033 if (mdev->state.pdsk <= D_OUTDATED && mdev->state.pdsk >= D_INCONSISTENT)
1034 mdf |= MDF_PEER_OUT_DATED;
1035 if (mdf != mdev->ldev->md.flags) {
1036 mdev->ldev->md.flags = mdf;
1037 drbd_md_mark_dirty(mdev);
1038 }
1039 if (os.disk < D_CONSISTENT && ns.disk >= D_CONSISTENT)
1040 drbd_set_ed_uuid(mdev, mdev->ldev->md.uuid[UI_CURRENT]);
1041 put_ldev(mdev);
1042 }
1043
1044 /* Peer was forced D_UP_TO_DATE & R_PRIMARY, consider to resync */
1045 if (os.disk == D_INCONSISTENT && os.pdsk == D_INCONSISTENT &&
1046 os.peer == R_SECONDARY && ns.peer == R_PRIMARY)
1047 set_bit(CONSIDER_RESYNC, &mdev->flags);
1048
1049 /* Receiver should clean up itself */
1050 if (os.conn != C_DISCONNECTING && ns.conn == C_DISCONNECTING)
1051 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1052
1053 /* Now the receiver finished cleaning up itself, it should die */
1054 if (os.conn != C_STANDALONE && ns.conn == C_STANDALONE)
1055 drbd_thread_stop_nowait(&mdev->tconn->receiver);
1056
1057 /* Upon network failure, we need to restart the receiver. */
Philipp Reisner823bd832012-11-08 15:04:36 +01001058 if (os.conn > C_WF_CONNECTION &&
Philipp Reisnerb8907332011-01-27 14:07:51 +01001059 ns.conn <= C_TEAR_DOWN && ns.conn >= C_TIMEOUT)
1060 drbd_thread_restart_nowait(&mdev->tconn->receiver);
1061
1062 /* Resume AL writing if we get a connection */
1063 if (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED)
1064 drbd_resume_al(mdev);
1065
1066 ascw = kmalloc(sizeof(*ascw), GFP_ATOMIC);
1067 if (ascw) {
1068 ascw->os = os;
1069 ascw->ns = ns;
1070 ascw->flags = flags;
1071 ascw->w.cb = w_after_state_ch;
Philipp Reisnera21e9292011-02-08 15:08:49 +01001072 ascw->w.mdev = mdev;
Philipp Reisnerb8907332011-01-27 14:07:51 +01001073 ascw->done = done;
1074 drbd_queue_work(&mdev->tconn->data.work, &ascw->w);
1075 } else {
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001076 dev_err(DEV, "Could not kmalloc an ascw\n");
Philipp Reisnerb8907332011-01-27 14:07:51 +01001077 }
1078
1079 return rv;
1080}
1081
Andreas Gruenbacher99920dc2011-03-16 15:31:39 +01001082static int w_after_state_ch(struct drbd_work *w, int unused)
Philipp Reisnerb8907332011-01-27 14:07:51 +01001083{
1084 struct after_state_chg_work *ascw =
1085 container_of(w, struct after_state_chg_work, w);
Philipp Reisner00d56942011-02-09 18:09:48 +01001086 struct drbd_conf *mdev = w->mdev;
Philipp Reisnerb8907332011-01-27 14:07:51 +01001087
1088 after_state_ch(mdev, ascw->os, ascw->ns, ascw->flags);
1089 if (ascw->flags & CS_WAIT_COMPLETE) {
1090 D_ASSERT(ascw->done != NULL);
1091 complete(ascw->done);
1092 }
1093 kfree(ascw);
1094
Andreas Gruenbacher99920dc2011-03-16 15:31:39 +01001095 return 0;
Philipp Reisnerb8907332011-01-27 14:07:51 +01001096}
1097
1098static void abw_start_sync(struct drbd_conf *mdev, int rv)
1099{
1100 if (rv) {
1101 dev_err(DEV, "Writing the bitmap failed not starting resync.\n");
1102 _drbd_request_state(mdev, NS(conn, C_CONNECTED), CS_VERBOSE);
1103 return;
1104 }
1105
1106 switch (mdev->state.conn) {
1107 case C_STARTING_SYNC_T:
1108 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
1109 break;
1110 case C_STARTING_SYNC_S:
1111 drbd_start_resync(mdev, C_SYNC_SOURCE);
1112 break;
1113 }
1114}
1115
1116int drbd_bitmap_io_from_worker(struct drbd_conf *mdev,
1117 int (*io_fn)(struct drbd_conf *),
1118 char *why, enum bm_flag flags)
1119{
1120 int rv;
1121
1122 D_ASSERT(current == mdev->tconn->worker.task);
1123
1124 /* open coded non-blocking drbd_suspend_io(mdev); */
1125 set_bit(SUSPEND_IO, &mdev->flags);
1126
1127 drbd_bm_lock(mdev, why, flags);
1128 rv = io_fn(mdev);
1129 drbd_bm_unlock(mdev);
1130
1131 drbd_resume_io(mdev);
1132
1133 return rv;
1134}
1135
1136/**
1137 * after_state_ch() - Perform after state change actions that may sleep
1138 * @mdev: DRBD device.
1139 * @os: old state.
1140 * @ns: new state.
1141 * @flags: Flags
1142 */
1143static void after_state_ch(struct drbd_conf *mdev, union drbd_state os,
1144 union drbd_state ns, enum chg_state_flags flags)
1145{
1146 enum drbd_fencing_p fp;
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001147 struct sib_info sib;
1148
1149 sib.sib_reason = SIB_STATE_CHANGE;
1150 sib.os = os;
1151 sib.ns = ns;
Philipp Reisnerb8907332011-01-27 14:07:51 +01001152
1153 if (os.conn != C_CONNECTED && ns.conn == C_CONNECTED) {
1154 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1155 if (mdev->p_uuid)
1156 mdev->p_uuid[UI_FLAGS] &= ~((u64)2);
1157 }
1158
1159 fp = FP_DONT_CARE;
1160 if (get_ldev(mdev)) {
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001161 rcu_read_lock();
1162 fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
1163 rcu_read_unlock();
Philipp Reisnerb8907332011-01-27 14:07:51 +01001164 put_ldev(mdev);
1165 }
1166
1167 /* Inform userspace about the change... */
Lars Ellenberg3b98c0c2011-03-07 12:49:34 +01001168 drbd_bcast_event(mdev, &sib);
Philipp Reisnerb8907332011-01-27 14:07:51 +01001169
1170 if (!(os.role == R_PRIMARY && os.disk < D_UP_TO_DATE && os.pdsk < D_UP_TO_DATE) &&
1171 (ns.role == R_PRIMARY && ns.disk < D_UP_TO_DATE && ns.pdsk < D_UP_TO_DATE))
1172 drbd_khelper(mdev, "pri-on-incon-degr");
1173
1174 /* Here we have the actions that are performed after a
1175 state change. This function might sleep */
1176
Philipp Reisnerb8907332011-01-27 14:07:51 +01001177 if (ns.susp_nod) {
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001178 enum drbd_req_event what = NOTHING;
1179
1180 if (os.conn < C_CONNECTED && conn_lowest_conn(mdev->tconn) >= C_CONNECTED)
Philipp Reisnerb8907332011-01-27 14:07:51 +01001181 what = RESEND;
1182
Philipp Reisner3fb47462011-07-15 18:44:26 +02001183 if ((os.disk == D_ATTACHING || os.disk == D_NEGOTIATING) &&
1184 conn_lowest_disk(mdev->tconn) > D_NEGOTIATING)
Philipp Reisnerb8907332011-01-27 14:07:51 +01001185 what = RESTART_FROZEN_DISK_IO;
1186
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001187 if (what != NOTHING) {
Philipp Reisnerb8907332011-01-27 14:07:51 +01001188 spin_lock_irq(&mdev->tconn->req_lock);
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001189 _tl_restart(mdev->tconn, what);
1190 _drbd_set_state(_NS(mdev, susp_nod, 0), CS_VERBOSE, NULL);
Philipp Reisnerb8907332011-01-27 14:07:51 +01001191 spin_unlock_irq(&mdev->tconn->req_lock);
1192 }
Philipp Reisnerb8907332011-01-27 14:07:51 +01001193 }
1194
1195 /* Became sync source. With protocol >= 96, we still need to send out
1196 * the sync uuid now. Need to do that before any drbd_send_state, or
1197 * the other side may go "paused sync" before receiving the sync uuids,
1198 * which is unexpected. */
1199 if ((os.conn != C_SYNC_SOURCE && os.conn != C_PAUSED_SYNC_S) &&
1200 (ns.conn == C_SYNC_SOURCE || ns.conn == C_PAUSED_SYNC_S) &&
1201 mdev->tconn->agreed_pro_version >= 96 && get_ldev(mdev)) {
1202 drbd_gen_and_send_sync_uuid(mdev);
1203 put_ldev(mdev);
1204 }
1205
1206 /* Do not change the order of the if above and the two below... */
Philipp Reisner369bea62011-07-06 23:04:44 +02001207 if (os.pdsk == D_DISKLESS &&
1208 ns.pdsk > D_DISKLESS && ns.pdsk != D_UNKNOWN) { /* attach on the peer */
Philipp Reisnerb8907332011-01-27 14:07:51 +01001209 drbd_send_uuids(mdev);
1210 drbd_send_state(mdev);
1211 }
1212 /* No point in queuing send_bitmap if we don't have a connection
1213 * anymore, so check also the _current_ state, not only the new state
1214 * at the time this work was queued. */
1215 if (os.conn != C_WF_BITMAP_S && ns.conn == C_WF_BITMAP_S &&
1216 mdev->state.conn == C_WF_BITMAP_S)
1217 drbd_queue_bitmap_io(mdev, &drbd_send_bitmap, NULL,
1218 "send_bitmap (WFBitMapS)",
1219 BM_LOCKED_TEST_ALLOWED);
1220
1221 /* Lost contact to peer's copy of the data */
1222 if ((os.pdsk >= D_INCONSISTENT &&
1223 os.pdsk != D_UNKNOWN &&
1224 os.pdsk != D_OUTDATED)
1225 && (ns.pdsk < D_INCONSISTENT ||
1226 ns.pdsk == D_UNKNOWN ||
1227 ns.pdsk == D_OUTDATED)) {
1228 if (get_ldev(mdev)) {
1229 if ((ns.role == R_PRIMARY || ns.peer == R_PRIMARY) &&
1230 mdev->ldev->md.uuid[UI_BITMAP] == 0 && ns.disk >= D_UP_TO_DATE) {
Philipp Reisner2aebfab2011-03-28 16:48:11 +02001231 if (drbd_suspended(mdev)) {
Philipp Reisnerb8907332011-01-27 14:07:51 +01001232 set_bit(NEW_CUR_UUID, &mdev->flags);
1233 } else {
1234 drbd_uuid_new_current(mdev);
1235 drbd_send_uuids(mdev);
1236 }
1237 }
1238 put_ldev(mdev);
1239 }
1240 }
1241
1242 if (ns.pdsk < D_INCONSISTENT && get_ldev(mdev)) {
Philipp Reisnerb8907332011-01-27 14:07:51 +01001243 /* D_DISKLESS Peer becomes secondary */
1244 if (os.peer == R_PRIMARY && ns.peer == R_SECONDARY)
1245 /* We may still be Primary ourselves.
1246 * No harm done if the bitmap still changes,
1247 * redirtied pages will follow later. */
1248 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1249 "demote diskless peer", BM_LOCKED_SET_ALLOWED);
1250 put_ldev(mdev);
1251 }
1252
1253 /* Write out all changed bits on demote.
1254 * Though, no need to da that just yet
1255 * if there is a resync going on still */
1256 if (os.role == R_PRIMARY && ns.role == R_SECONDARY &&
1257 mdev->state.conn <= C_CONNECTED && get_ldev(mdev)) {
1258 /* No changes to the bitmap expected this time, so assert that,
1259 * even though no harm was done if it did change. */
1260 drbd_bitmap_io_from_worker(mdev, &drbd_bm_write,
1261 "demote", BM_LOCKED_TEST_ALLOWED);
1262 put_ldev(mdev);
1263 }
1264
1265 /* Last part of the attaching process ... */
1266 if (ns.conn >= C_CONNECTED &&
1267 os.disk == D_ATTACHING && ns.disk == D_NEGOTIATING) {
1268 drbd_send_sizes(mdev, 0, 0); /* to start sync... */
1269 drbd_send_uuids(mdev);
1270 drbd_send_state(mdev);
1271 }
1272
1273 /* We want to pause/continue resync, tell peer. */
1274 if (ns.conn >= C_CONNECTED &&
1275 ((os.aftr_isp != ns.aftr_isp) ||
1276 (os.user_isp != ns.user_isp)))
1277 drbd_send_state(mdev);
1278
1279 /* In case one of the isp bits got set, suspend other devices. */
1280 if ((!os.aftr_isp && !os.peer_isp && !os.user_isp) &&
1281 (ns.aftr_isp || ns.peer_isp || ns.user_isp))
1282 suspend_other_sg(mdev);
1283
1284 /* Make sure the peer gets informed about eventual state
1285 changes (ISP bits) while we were in WFReportParams. */
1286 if (os.conn == C_WF_REPORT_PARAMS && ns.conn >= C_CONNECTED)
1287 drbd_send_state(mdev);
1288
1289 if (os.conn != C_AHEAD && ns.conn == C_AHEAD)
1290 drbd_send_state(mdev);
1291
1292 /* We are in the progress to start a full sync... */
1293 if ((os.conn != C_STARTING_SYNC_T && ns.conn == C_STARTING_SYNC_T) ||
1294 (os.conn != C_STARTING_SYNC_S && ns.conn == C_STARTING_SYNC_S))
1295 /* no other bitmap changes expected during this phase */
1296 drbd_queue_bitmap_io(mdev,
1297 &drbd_bmio_set_n_write, &abw_start_sync,
1298 "set_n_write from StartingSync", BM_LOCKED_TEST_ALLOWED);
1299
1300 /* We are invalidating our self... */
1301 if (os.conn < C_CONNECTED && ns.conn < C_CONNECTED &&
1302 os.disk > D_INCONSISTENT && ns.disk == D_INCONSISTENT)
1303 /* other bitmap operation expected during this phase */
1304 drbd_queue_bitmap_io(mdev, &drbd_bmio_set_n_write, NULL,
1305 "set_n_write from invalidate", BM_LOCKED_MASK);
1306
1307 /* first half of local IO error, failure to attach,
1308 * or administrative detach */
1309 if (os.disk != D_FAILED && ns.disk == D_FAILED) {
1310 enum drbd_io_error_p eh;
1311 int was_io_error;
1312 /* corresponding get_ldev was in __drbd_set_state, to serialize
1313 * our cleanup here with the transition to D_DISKLESS,
1314 * so it is safe to dreference ldev here. */
Philipp Reisnerdaeda1c2011-05-03 15:00:55 +02001315 rcu_read_lock();
1316 eh = rcu_dereference(mdev->ldev->disk_conf)->on_io_error;
1317 rcu_read_unlock();
Philipp Reisnerb8907332011-01-27 14:07:51 +01001318 was_io_error = test_and_clear_bit(WAS_IO_ERROR, &mdev->flags);
1319
Philipp Reisnercdfda632011-07-05 15:38:59 +02001320 /* Immediately allow completion of all application IO, that waits
1321 for completion from the local disk. */
Andreas Gruenbacher71fc7ee2011-07-17 23:06:12 +02001322 tl_abort_disk_io(mdev);
Philipp Reisnercdfda632011-07-05 15:38:59 +02001323
Philipp Reisnerb8907332011-01-27 14:07:51 +01001324 /* current state still has to be D_FAILED,
1325 * there is only one way out: to D_DISKLESS,
1326 * and that may only happen after our put_ldev below. */
1327 if (mdev->state.disk != D_FAILED)
1328 dev_err(DEV,
1329 "ASSERT FAILED: disk is %s during detach\n",
1330 drbd_disk_str(mdev->state.disk));
1331
Philipp Reisnera67e1d92011-07-08 14:47:45 +02001332 drbd_send_state(mdev);
Philipp Reisnerb8907332011-01-27 14:07:51 +01001333 drbd_rs_cancel_all(mdev);
1334
1335 /* In case we want to get something to stable storage still,
1336 * this may be the last chance.
1337 * Following put_ldev may transition to D_DISKLESS. */
1338 drbd_md_sync(mdev);
1339 put_ldev(mdev);
1340
1341 if (was_io_error && eh == EP_CALL_HELPER)
1342 drbd_khelper(mdev, "local-io-error");
1343 }
1344
1345 /* second half of local IO error, failure to attach,
1346 * or administrative detach,
1347 * after local_cnt references have reached zero again */
1348 if (os.disk != D_DISKLESS && ns.disk == D_DISKLESS) {
1349 /* We must still be diskless,
1350 * re-attach has to be serialized with this! */
1351 if (mdev->state.disk != D_DISKLESS)
1352 dev_err(DEV,
1353 "ASSERT FAILED: disk is %s while going diskless\n",
1354 drbd_disk_str(mdev->state.disk));
1355
1356 mdev->rs_total = 0;
1357 mdev->rs_failed = 0;
1358 atomic_set(&mdev->rs_pending_cnt, 0);
1359
Philipp Reisnera67e1d92011-07-08 14:47:45 +02001360 drbd_send_state(mdev);
Philipp Reisnerb8907332011-01-27 14:07:51 +01001361 /* corresponding get_ldev in __drbd_set_state
1362 * this may finally trigger drbd_ldev_destroy. */
1363 put_ldev(mdev);
1364 }
1365
1366 /* Notify peer that I had a local IO error, and did not detached.. */
1367 if (os.disk == D_UP_TO_DATE && ns.disk == D_INCONSISTENT)
1368 drbd_send_state(mdev);
1369
1370 /* Disks got bigger while they were detached */
1371 if (ns.disk > D_NEGOTIATING && ns.pdsk > D_NEGOTIATING &&
1372 test_and_clear_bit(RESYNC_AFTER_NEG, &mdev->flags)) {
1373 if (ns.conn == C_CONNECTED)
1374 resync_after_online_grow(mdev);
1375 }
1376
1377 /* A resync finished or aborted, wake paused devices... */
1378 if ((os.conn > C_CONNECTED && ns.conn <= C_CONNECTED) ||
1379 (os.peer_isp && !ns.peer_isp) ||
1380 (os.user_isp && !ns.user_isp))
1381 resume_next_sg(mdev);
1382
1383 /* sync target done with resync. Explicitly notify peer, even though
1384 * it should (at least for non-empty resyncs) already know itself. */
1385 if (os.disk < D_UP_TO_DATE && os.conn >= C_SYNC_SOURCE && ns.conn == C_CONNECTED)
1386 drbd_send_state(mdev);
1387
1388 /* This triggers bitmap writeout of potentially still unwritten pages
1389 * if the resync finished cleanly, or aborted because of peer disk
1390 * failure, or because of connection loss.
1391 * For resync aborted because of local disk failure, we cannot do
1392 * any bitmap writeout anymore.
1393 * No harm done if some bits change during this phase.
1394 */
1395 if (os.conn > C_CONNECTED && ns.conn <= C_CONNECTED && get_ldev(mdev)) {
1396 drbd_queue_bitmap_io(mdev, &drbd_bm_write, NULL,
1397 "write from resync_finished", BM_LOCKED_SET_ALLOWED);
1398 put_ldev(mdev);
1399 }
1400
1401 if (ns.disk == D_DISKLESS &&
1402 ns.conn == C_STANDALONE &&
1403 ns.role == R_SECONDARY) {
1404 if (os.aftr_isp != ns.aftr_isp)
1405 resume_next_sg(mdev);
1406 }
1407
Philipp Reisnerb8907332011-01-27 14:07:51 +01001408 drbd_md_sync(mdev);
1409}
1410
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001411struct after_conn_state_chg_work {
1412 struct drbd_work w;
1413 enum drbd_conns oc;
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001414 union drbd_state ns_min;
Philipp Reisner5f082f92011-03-29 13:20:58 +02001415 union drbd_state ns_max; /* new, max state, over all mdevs */
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001416 enum chg_state_flags flags;
1417};
Philipp Reisnerb8907332011-01-27 14:07:51 +01001418
Andreas Gruenbacher99920dc2011-03-16 15:31:39 +01001419static int w_after_conn_state_ch(struct drbd_work *w, int unused)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001420{
1421 struct after_conn_state_chg_work *acscw =
1422 container_of(w, struct after_conn_state_chg_work, w);
1423 struct drbd_tconn *tconn = w->tconn;
1424 enum drbd_conns oc = acscw->oc;
Philipp Reisner5f082f92011-03-29 13:20:58 +02001425 union drbd_state ns_max = acscw->ns_max;
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001426 union drbd_state ns_min = acscw->ns_min;
1427 struct drbd_conf *mdev;
1428 int vnr;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001429
1430 kfree(acscw);
1431
1432 /* Upon network configuration, we need to start the receiver */
Philipp Reisner5f082f92011-03-29 13:20:58 +02001433 if (oc == C_STANDALONE && ns_max.conn == C_UNCONNECTED)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001434 drbd_thread_start(&tconn->receiver);
1435
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02001436 if (oc == C_DISCONNECTING && ns_max.conn == C_STANDALONE) {
1437 struct net_conf *old_conf;
1438
Philipp Reisnera0095502011-05-03 13:14:15 +02001439 mutex_lock(&tconn->conf_update);
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02001440 old_conf = tconn->net_conf;
Andreas Gruenbacher089c0752011-06-14 18:28:09 +02001441 tconn->my_addr_len = 0;
1442 tconn->peer_addr_len = 0;
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02001443 rcu_assign_pointer(tconn->net_conf, NULL);
1444 conn_free_crypto(tconn);
Philipp Reisnera0095502011-05-03 13:14:15 +02001445 mutex_unlock(&tconn->conf_update);
Lars Ellenbergf3dfa402011-05-02 10:45:05 +02001446
1447 synchronize_rcu();
1448 kfree(old_conf);
1449 }
1450
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001451 if (ns_max.susp_fen) {
1452 /* case1: The outdate peer handler is successful: */
1453 if (ns_max.pdsk <= D_OUTDATED) {
1454 tl_clear(tconn);
Philipp Reisner695d08f2011-04-11 22:53:32 -07001455 rcu_read_lock();
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001456 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1457 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
1458 drbd_uuid_new_current(mdev);
1459 clear_bit(NEW_CUR_UUID, &mdev->flags);
1460 }
1461 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07001462 rcu_read_unlock();
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001463 conn_request_state(tconn,
1464 (union drbd_state) { { .susp_fen = 1 } },
1465 (union drbd_state) { { .susp_fen = 0 } },
1466 CS_VERBOSE);
1467 }
1468 /* case2: The connection was established again: */
1469 if (ns_min.conn >= C_CONNECTED) {
Philipp Reisner695d08f2011-04-11 22:53:32 -07001470 rcu_read_lock();
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001471 idr_for_each_entry(&tconn->volumes, mdev, vnr)
1472 clear_bit(NEW_CUR_UUID, &mdev->flags);
Philipp Reisner695d08f2011-04-11 22:53:32 -07001473 rcu_read_unlock();
Philipp Reisnera6d00c82011-03-29 18:16:11 +02001474 spin_lock_irq(&tconn->req_lock);
1475 _tl_restart(tconn, RESEND);
1476 _conn_request_state(tconn,
1477 (union drbd_state) { { .susp_fen = 1 } },
1478 (union drbd_state) { { .susp_fen = 0 } },
1479 CS_VERBOSE);
1480 spin_unlock_irq(&tconn->req_lock);
1481 }
1482 }
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +02001483 kref_put(&tconn->kref, &conn_destroy);
Andreas Gruenbacher99920dc2011-03-16 15:31:39 +01001484 return 0;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001485}
1486
Philipp Reisner435693e2011-03-25 15:11:30 +01001487void conn_old_common_state(struct drbd_tconn *tconn, union drbd_state *pcs, enum chg_state_flags *pf)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001488{
Philipp Reisner435693e2011-03-25 15:11:30 +01001489 enum chg_state_flags flags = ~0;
Philipp Reisner88ef5942011-03-25 14:31:11 +01001490 struct drbd_conf *mdev;
Philipp Reisner435693e2011-03-25 15:11:30 +01001491 int vnr, first_vol = 1;
Philipp Reisnere0e16652011-07-11 17:04:23 +02001492 union drbd_dev_state os, cs = {
1493 { .role = R_SECONDARY,
1494 .peer = R_UNKNOWN,
1495 .conn = tconn->cstate,
1496 .disk = D_DISKLESS,
1497 .pdsk = D_UNKNOWN,
1498 } };
Philipp Reisner88ef5942011-03-25 14:31:11 +01001499
Philipp Reisner695d08f2011-04-11 22:53:32 -07001500 rcu_read_lock();
Philipp Reisner88ef5942011-03-25 14:31:11 +01001501 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1502 os = mdev->state;
1503
Philipp Reisner435693e2011-03-25 15:11:30 +01001504 if (first_vol) {
1505 cs = os;
1506 first_vol = 0;
1507 continue;
1508 }
Philipp Reisner88ef5942011-03-25 14:31:11 +01001509
Philipp Reisner435693e2011-03-25 15:11:30 +01001510 if (cs.role != os.role)
1511 flags &= ~CS_DC_ROLE;
Philipp Reisner88ef5942011-03-25 14:31:11 +01001512
Philipp Reisner435693e2011-03-25 15:11:30 +01001513 if (cs.peer != os.peer)
1514 flags &= ~CS_DC_PEER;
Philipp Reisner88ef5942011-03-25 14:31:11 +01001515
Philipp Reisner435693e2011-03-25 15:11:30 +01001516 if (cs.conn != os.conn)
1517 flags &= ~CS_DC_CONN;
Philipp Reisner88ef5942011-03-25 14:31:11 +01001518
Philipp Reisner435693e2011-03-25 15:11:30 +01001519 if (cs.disk != os.disk)
1520 flags &= ~CS_DC_DISK;
1521
1522 if (cs.pdsk != os.pdsk)
1523 flags &= ~CS_DC_PDSK;
Philipp Reisner88ef5942011-03-25 14:31:11 +01001524 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07001525 rcu_read_unlock();
Philipp Reisner88ef5942011-03-25 14:31:11 +01001526
Philipp Reisner435693e2011-03-25 15:11:30 +01001527 *pf |= CS_DC_MASK;
1528 *pf &= flags;
Philipp Reisnerda9fbc22011-03-29 10:52:01 +02001529 (*pcs).i = cs.i;
Philipp Reisner88ef5942011-03-25 14:31:11 +01001530}
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001531
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001532static enum drbd_state_rv
1533conn_is_valid_transition(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
Philipp Reisner88ef5942011-03-25 14:31:11 +01001534 enum chg_state_flags flags)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001535{
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001536 enum drbd_state_rv rv = SS_SUCCESS;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001537 union drbd_state ns, os;
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001538 struct drbd_conf *mdev;
1539 int vnr;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001540
Philipp Reisner695d08f2011-04-11 22:53:32 -07001541 rcu_read_lock();
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001542 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
Philipp Reisner78bae592011-03-28 15:40:12 +02001543 os = drbd_read_state(mdev);
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001544 ns = sanitize_state(mdev, apply_mask_val(os, mask, val), NULL);
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001545
Philipp Reisner778bcf22011-03-28 12:55:03 +02001546 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1547 ns.disk = os.disk;
1548
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001549 if (ns.i == os.i)
1550 continue;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001551
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001552 rv = is_valid_transition(os, ns);
1553 if (rv < SS_SUCCESS)
1554 break;
1555
1556 if (!(flags & CS_HARD)) {
1557 rv = is_valid_state(mdev, ns);
1558 if (rv < SS_SUCCESS) {
1559 if (is_valid_state(mdev, os) == rv)
1560 rv = is_valid_soft_transition(os, ns);
1561 } else
1562 rv = is_valid_soft_transition(os, ns);
1563 }
1564 if (rv < SS_SUCCESS)
1565 break;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001566 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07001567 rcu_read_unlock();
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001568
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001569 if (rv < SS_SUCCESS && flags & CS_VERBOSE)
1570 print_st_err(mdev, os, ns, rv);
1571
1572 return rv;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001573}
1574
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001575void
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001576conn_set_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001577 union drbd_state *pns_min, union drbd_state *pns_max, enum chg_state_flags flags)
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001578{
Philipp Reisnere0e16652011-07-11 17:04:23 +02001579 union drbd_state ns, os, ns_max = {
1580 { .role = R_SECONDARY,
1581 .peer = R_UNKNOWN,
1582 .conn = val.conn,
1583 .disk = D_DISKLESS,
1584 .pdsk = D_UNKNOWN
1585 } };
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001586 union drbd_state ns_min = {
1587 { .role = R_MASK,
1588 .peer = R_MASK,
Philipp Reisnere0e16652011-07-11 17:04:23 +02001589 .conn = val.conn,
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001590 .disk = D_MASK,
1591 .pdsk = D_MASK
1592 } };
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001593 struct drbd_conf *mdev;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001594 enum drbd_state_rv rv;
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001595 int vnr;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001596
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001597 if (mask.conn == C_MASK)
1598 tconn->cstate = val.conn;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001599
Philipp Reisner695d08f2011-04-11 22:53:32 -07001600 rcu_read_lock();
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001601 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
Philipp Reisner78bae592011-03-28 15:40:12 +02001602 os = drbd_read_state(mdev);
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001603 ns = apply_mask_val(os, mask, val);
1604 ns = sanitize_state(mdev, ns, NULL);
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001605
Philipp Reisner778bcf22011-03-28 12:55:03 +02001606 if (flags & CS_IGN_OUTD_FAIL && ns.disk == D_OUTDATED && os.disk < D_OUTDATED)
1607 ns.disk = os.disk;
1608
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001609 rv = __drbd_set_state(mdev, ns, flags, NULL);
1610 if (rv < SS_SUCCESS)
1611 BUG();
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001612
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001613 ns.i = mdev->state.i;
1614 ns_max.role = max_role(ns.role, ns_max.role);
1615 ns_max.peer = max_role(ns.peer, ns_max.peer);
1616 ns_max.conn = max_t(enum drbd_conns, ns.conn, ns_max.conn);
1617 ns_max.disk = max_t(enum drbd_disk_state, ns.disk, ns_max.disk);
1618 ns_max.pdsk = max_t(enum drbd_disk_state, ns.pdsk, ns_max.pdsk);
1619
1620 ns_min.role = min_role(ns.role, ns_min.role);
1621 ns_min.peer = min_role(ns.peer, ns_min.peer);
1622 ns_min.conn = min_t(enum drbd_conns, ns.conn, ns_min.conn);
1623 ns_min.disk = min_t(enum drbd_disk_state, ns.disk, ns_min.disk);
1624 ns_min.pdsk = min_t(enum drbd_disk_state, ns.pdsk, ns_min.pdsk);
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001625 }
Philipp Reisner695d08f2011-04-11 22:53:32 -07001626 rcu_read_unlock();
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001627
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001628 ns_min.susp = ns_max.susp = tconn->susp;
1629 ns_min.susp_nod = ns_max.susp_nod = tconn->susp_nod;
1630 ns_min.susp_fen = ns_max.susp_fen = tconn->susp_fen;
1631
1632 *pns_min = ns_min;
1633 *pns_max = ns_max;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001634}
1635
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001636static enum drbd_state_rv
1637_conn_rq_cond(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val)
1638{
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001639 enum drbd_state_rv rv;
1640
1641 if (test_and_clear_bit(CONN_WD_ST_CHG_OKAY, &tconn->flags))
1642 return SS_CW_SUCCESS;
1643
1644 if (test_and_clear_bit(CONN_WD_ST_CHG_FAIL, &tconn->flags))
1645 return SS_CW_FAILED_BY_PEER;
1646
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001647 spin_lock_irq(&tconn->req_lock);
1648 rv = tconn->cstate != C_WF_REPORT_PARAMS ? SS_CW_NO_NEED : SS_UNKNOWN_ERROR;
1649
1650 if (rv == SS_UNKNOWN_ERROR)
Philipp Reisner435693e2011-03-25 15:11:30 +01001651 rv = conn_is_valid_transition(tconn, mask, val, 0);
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001652
Philipp Reisnerbd0c8242011-03-25 12:02:20 +01001653 if (rv == SS_SUCCESS)
1654 rv = SS_UNKNOWN_ERROR; /* cont waiting, otherwise fail. */
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001655
1656 spin_unlock_irq(&tconn->req_lock);
1657
1658 return rv;
1659}
1660
1661static enum drbd_state_rv
1662conn_cl_wide(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1663 enum chg_state_flags f)
1664{
1665 enum drbd_state_rv rv;
1666
1667 spin_unlock_irq(&tconn->req_lock);
1668 mutex_lock(&tconn->cstate_mutex);
1669
Andreas Gruenbachercaee1c32011-03-16 01:17:35 +01001670 if (conn_send_state_req(tconn, mask, val)) {
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001671 rv = SS_CW_FAILED_BY_PEER;
1672 /* if (f & CS_VERBOSE)
1673 print_st_err(mdev, os, ns, rv); */
1674 goto abort;
1675 }
1676
1677 wait_event(tconn->ping_wait, (rv = _conn_rq_cond(tconn, mask, val)));
1678
1679abort:
1680 mutex_unlock(&tconn->cstate_mutex);
1681 spin_lock_irq(&tconn->req_lock);
1682
1683 return rv;
1684}
1685
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001686enum drbd_state_rv
1687_conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1688 enum chg_state_flags flags)
1689{
1690 enum drbd_state_rv rv = SS_SUCCESS;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001691 struct after_conn_state_chg_work *acscw;
1692 enum drbd_conns oc = tconn->cstate;
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001693 union drbd_state ns_max, ns_min, os;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001694
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001695 rv = is_valid_conn_transition(oc, val.conn);
1696 if (rv < SS_SUCCESS)
1697 goto abort;
1698
Philipp Reisner88ef5942011-03-25 14:31:11 +01001699 rv = conn_is_valid_transition(tconn, mask, val, flags);
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001700 if (rv < SS_SUCCESS)
1701 goto abort;
1702
Philipp Reisnerdf24aa42011-02-15 11:14:44 +01001703 if (oc == C_WF_REPORT_PARAMS && val.conn == C_DISCONNECTING &&
1704 !(flags & (CS_LOCAL_ONLY | CS_HARD))) {
1705 rv = conn_cl_wide(tconn, mask, val, flags);
1706 if (rv < SS_SUCCESS)
1707 goto abort;
1708 }
1709
Philipp Reisner435693e2011-03-25 15:11:30 +01001710 conn_old_common_state(tconn, &os, &flags);
Philipp Reisner706cb242011-03-29 15:20:27 +02001711 flags |= CS_DC_SUSP;
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001712 conn_set_state(tconn, mask, val, &ns_min, &ns_max, flags);
Philipp Reisner5f082f92011-03-29 13:20:58 +02001713 conn_pr_state_change(tconn, os, ns_max, flags);
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001714
1715 acscw = kmalloc(sizeof(*acscw), GFP_ATOMIC);
1716 if (acscw) {
Philipp Reisner435693e2011-03-25 15:11:30 +01001717 acscw->oc = os.conn;
Philipp Reisner8c7e16c2011-03-29 14:01:02 +02001718 acscw->ns_min = ns_min;
Philipp Reisner5f082f92011-03-29 13:20:58 +02001719 acscw->ns_max = ns_max;
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001720 acscw->flags = flags;
1721 acscw->w.cb = w_after_conn_state_ch;
Philipp Reisner9dc9fbb2011-04-22 15:23:32 +02001722 kref_get(&tconn->kref);
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001723 acscw->w.tconn = tconn;
1724 drbd_queue_work(&tconn->data.work, &acscw->w);
1725 } else {
1726 conn_err(tconn, "Could not kmalloc an acscw\n");
1727 }
1728
1729abort:
Philipp Reisnerbbeb6412011-02-10 13:45:46 +01001730 return rv;
1731}
1732
1733enum drbd_state_rv
1734conn_request_state(struct drbd_tconn *tconn, union drbd_state mask, union drbd_state val,
1735 enum chg_state_flags flags)
1736{
1737 enum drbd_state_rv rv;
1738
1739 spin_lock_irq(&tconn->req_lock);
1740 rv = _conn_request_state(tconn, mask, val, flags);
1741 spin_unlock_irq(&tconn->req_lock);
1742
1743 return rv;
1744}