1 /* -*- mode: c; c-basic-offset: 8; -*-
3 * vim: noexpandtab sw=8 ts=8 sts=0:
5 * Copyright (C) 2005 Oracle. All rights reserved.
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public
9 * License as published by the Free Software Foundation; either
10 * version 2 of the License, or (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
17 * You should have received a copy of the GNU General Public
18 * License along with this program; if not, write to the
19 * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
20 * Boston, MA 021110-1307, USA.
23 /* This quorum hack is only here until we transition to some more rational
24 * approach that is driven from userspace. Honest. No foolin'.
26 * Imagine two nodes lose network connectivity to each other but they're still
27 * up and operating in every other way. Presumably a network timeout indicates
28 * that a node is broken and should be recovered. They can't both recover each
29 * other and both carry on without serialising their access to the file system.
30 * They need to decide who is authoritative. Now extend that problem to
31 * arbitrary groups of nodes losing connectivity between each other.
33 * So we declare that a node which has given up on connecting to a majority
34 * of nodes who are still heartbeating will fence itself.
36 * There are huge opportunities for races here. After we give up on a node's
37 * connection we need to wait long enough to give heartbeat an opportunity
38 * to declare the node as truly dead. We also need to be careful with the
39 * race between when we see a node start heartbeating and when we connect
42 * So nodes that are in this transtion put a hold on the quorum decision
43 * with a counter. As they fall out of this transition they drop the count
44 * and if they're the last, they fire off the decision.
46 #include <linux/kernel.h>
47 #include <linux/workqueue.h>
48 #include <linux/reboot.h>
50 #include "heartbeat.h"
51 #include "nodemanager.h"
52 #define MLOG_MASK_PREFIX ML_QUORUM
56 static struct o2quo_state
{
58 struct work_struct qs_work
;
61 unsigned long qs_hb_bm
[BITS_TO_LONGS(O2NM_MAX_NODES
)];
63 unsigned long qs_conn_bm
[BITS_TO_LONGS(O2NM_MAX_NODES
)];
65 unsigned long qs_hold_bm
[BITS_TO_LONGS(O2NM_MAX_NODES
)];
68 /* this is horribly heavy-handed. It should instead flip the file
69 * system RO and call some userspace script. */
70 static void o2quo_fence_self(void)
72 /* panic spins with interrupts enabled. with preempt
73 * threads can still schedule, etc, etc */
74 o2hb_stop_all_regions();
76 switch (o2nm_single_cluster
->cl_fence_method
) {
77 case O2NM_FENCE_PANIC
:
78 panic("*** ocfs2 is very sorry to be fencing this system by "
82 WARN_ON(o2nm_single_cluster
->cl_fence_method
>=
84 case O2NM_FENCE_RESET
:
85 printk(KERN_ERR
"*** ocfs2 is very sorry to be fencing this "
86 "system by restarting ***\n");
92 /* Indicate that a timeout occurred on a hearbeat region write. The
93 * other nodes in the cluster may consider us dead at that time so we
94 * want to "fence" ourselves so that we don't scribble on the disk
95 * after they think they've recovered us. This can't solve all
96 * problems related to writeout after recovery but this hack can at
97 * least close some of those gaps. When we have real fencing, this can
98 * go away as our node would be fenced externally before other nodes
100 void o2quo_disk_timeout(void)
105 static void o2quo_make_decision(struct work_struct
*work
)
108 int lowest_hb
, lowest_reachable
= 0, fence
= 0;
109 struct o2quo_state
*qs
= &o2quo_state
;
111 spin_lock(&qs
->qs_lock
);
113 lowest_hb
= find_first_bit(qs
->qs_hb_bm
, O2NM_MAX_NODES
);
114 if (lowest_hb
!= O2NM_MAX_NODES
)
115 lowest_reachable
= test_bit(lowest_hb
, qs
->qs_conn_bm
);
117 mlog(0, "heartbeating: %d, connected: %d, "
118 "lowest: %d (%sreachable)\n", qs
->qs_heartbeating
,
119 qs
->qs_connected
, lowest_hb
, lowest_reachable
? "" : "un");
121 if (!test_bit(o2nm_this_node(), qs
->qs_hb_bm
) ||
122 qs
->qs_heartbeating
== 1)
125 if (qs
->qs_heartbeating
& 1) {
126 /* the odd numbered cluster case is straight forward --
127 * if we can't talk to the majority we're hosed */
128 quorum
= (qs
->qs_heartbeating
+ 1)/2;
129 if (qs
->qs_connected
< quorum
) {
130 mlog(ML_ERROR
, "fencing this node because it is "
131 "only connected to %u nodes and %u is needed "
132 "to make a quorum out of %u heartbeating nodes\n",
133 qs
->qs_connected
, quorum
,
134 qs
->qs_heartbeating
);
138 /* the even numbered cluster adds the possibility of each half
139 * of the cluster being able to talk amongst themselves.. in
140 * that case we're hosed if we can't talk to the group that has
141 * the lowest numbered node */
142 quorum
= qs
->qs_heartbeating
/ 2;
143 if (qs
->qs_connected
< quorum
) {
144 mlog(ML_ERROR
, "fencing this node because it is "
145 "only connected to %u nodes and %u is needed "
146 "to make a quorum out of %u heartbeating nodes\n",
147 qs
->qs_connected
, quorum
,
148 qs
->qs_heartbeating
);
151 else if ((qs
->qs_connected
== quorum
) &&
153 mlog(ML_ERROR
, "fencing this node because it is "
154 "connected to a half-quorum of %u out of %u "
155 "nodes which doesn't include the lowest active "
156 "node %u\n", quorum
, qs
->qs_heartbeating
,
163 spin_unlock(&qs
->qs_lock
);
168 static void o2quo_set_hold(struct o2quo_state
*qs
, u8 node
)
170 assert_spin_locked(&qs
->qs_lock
);
172 if (!test_and_set_bit(node
, qs
->qs_hold_bm
)) {
174 mlog_bug_on_msg(qs
->qs_holds
== O2NM_MAX_NODES
,
176 mlog(0, "node %u, %d total\n", node
, qs
->qs_holds
);
180 static void o2quo_clear_hold(struct o2quo_state
*qs
, u8 node
)
182 assert_spin_locked(&qs
->qs_lock
);
184 if (test_and_clear_bit(node
, qs
->qs_hold_bm
)) {
185 mlog(0, "node %u, %d total\n", node
, qs
->qs_holds
- 1);
186 if (--qs
->qs_holds
== 0) {
187 if (qs
->qs_pending
) {
189 schedule_work(&qs
->qs_work
);
192 mlog_bug_on_msg(qs
->qs_holds
< 0, "node %u, holds %d\n",
197 /* as a node comes up we delay the quorum decision until we know the fate of
198 * the connection. the hold will be droped in conn_up or hb_down. it might be
199 * perpetuated by con_err until hb_down. if we already have a conn, we might
200 * be dropping a hold that conn_up got. */
201 void o2quo_hb_up(u8 node
)
203 struct o2quo_state
*qs
= &o2quo_state
;
205 spin_lock(&qs
->qs_lock
);
207 qs
->qs_heartbeating
++;
208 mlog_bug_on_msg(qs
->qs_heartbeating
== O2NM_MAX_NODES
,
210 mlog_bug_on_msg(test_bit(node
, qs
->qs_hb_bm
), "node %u\n", node
);
211 set_bit(node
, qs
->qs_hb_bm
);
213 mlog(0, "node %u, %d total\n", node
, qs
->qs_heartbeating
);
215 if (!test_bit(node
, qs
->qs_conn_bm
))
216 o2quo_set_hold(qs
, node
);
218 o2quo_clear_hold(qs
, node
);
220 spin_unlock(&qs
->qs_lock
);
223 /* hb going down releases any holds we might have had due to this node from
224 * conn_up, conn_err, or hb_up */
225 void o2quo_hb_down(u8 node
)
227 struct o2quo_state
*qs
= &o2quo_state
;
229 spin_lock(&qs
->qs_lock
);
231 qs
->qs_heartbeating
--;
232 mlog_bug_on_msg(qs
->qs_heartbeating
< 0,
233 "node %u, %d heartbeating\n",
234 node
, qs
->qs_heartbeating
);
235 mlog_bug_on_msg(!test_bit(node
, qs
->qs_hb_bm
), "node %u\n", node
);
236 clear_bit(node
, qs
->qs_hb_bm
);
238 mlog(0, "node %u, %d total\n", node
, qs
->qs_heartbeating
);
240 o2quo_clear_hold(qs
, node
);
242 spin_unlock(&qs
->qs_lock
);
245 /* this tells us that we've decided that the node is still heartbeating
246 * even though we've lost it's conn. it must only be called after conn_err
247 * and indicates that we must now make a quorum decision in the future,
248 * though we might be doing so after waiting for holds to drain. Here
249 * we'll be dropping the hold from conn_err. */
250 void o2quo_hb_still_up(u8 node
)
252 struct o2quo_state
*qs
= &o2quo_state
;
254 spin_lock(&qs
->qs_lock
);
256 mlog(0, "node %u\n", node
);
259 o2quo_clear_hold(qs
, node
);
261 spin_unlock(&qs
->qs_lock
);
264 /* This is analogous to hb_up. as a node's connection comes up we delay the
265 * quorum decision until we see it heartbeating. the hold will be droped in
266 * hb_up or hb_down. it might be perpetuated by con_err until hb_down. if
267 * it's already heartbeating we we might be dropping a hold that conn_up got.
269 void o2quo_conn_up(u8 node
)
271 struct o2quo_state
*qs
= &o2quo_state
;
273 spin_lock(&qs
->qs_lock
);
276 mlog_bug_on_msg(qs
->qs_connected
== O2NM_MAX_NODES
,
278 mlog_bug_on_msg(test_bit(node
, qs
->qs_conn_bm
), "node %u\n", node
);
279 set_bit(node
, qs
->qs_conn_bm
);
281 mlog(0, "node %u, %d total\n", node
, qs
->qs_connected
);
283 if (!test_bit(node
, qs
->qs_hb_bm
))
284 o2quo_set_hold(qs
, node
);
286 o2quo_clear_hold(qs
, node
);
288 spin_unlock(&qs
->qs_lock
);
291 /* we've decided that we won't ever be connecting to the node again. if it's
292 * still heartbeating we grab a hold that will delay decisions until either the
293 * node stops heartbeating from hb_down or the caller decides that the node is
294 * still up and calls still_up */
295 void o2quo_conn_err(u8 node
)
297 struct o2quo_state
*qs
= &o2quo_state
;
299 spin_lock(&qs
->qs_lock
);
301 if (test_bit(node
, qs
->qs_conn_bm
)) {
303 mlog_bug_on_msg(qs
->qs_connected
< 0,
304 "node %u, connected %d\n",
305 node
, qs
->qs_connected
);
307 clear_bit(node
, qs
->qs_conn_bm
);
310 mlog(0, "node %u, %d total\n", node
, qs
->qs_connected
);
312 if (test_bit(node
, qs
->qs_hb_bm
))
313 o2quo_set_hold(qs
, node
);
315 spin_unlock(&qs
->qs_lock
);
318 void o2quo_init(void)
320 struct o2quo_state
*qs
= &o2quo_state
;
322 spin_lock_init(&qs
->qs_lock
);
323 INIT_WORK(&qs
->qs_work
, o2quo_make_decision
);
326 void o2quo_exit(void)
328 struct o2quo_state
*qs
= &o2quo_state
;
330 flush_work_sync(&qs
->qs_work
);