/*
Unix SMB/CIFS implementation.
Samba internal messaging functions
Copyright (C) 2007 by Volker Lendecke
Copyright (C) 2007 by Andrew Tridgell
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
*/
#include "replace.h"
#include
#include "util_tdb.h"
#include "serverid.h"
#include "ctdbd_conn.h"
#include "system/select.h"
#include "lib/util/util_net.h"
#include "lib/util/sys_rw_data.h"
#include "lib/util/iov_buf.h"
#include "lib/util/select.h"
#include "lib/util/debug.h"
#include "lib/util/talloc_stack.h"
#include "lib/util/genrand.h"
#include "lib/util/fault.h"
#include "lib/util/dlinklist.h"
#include "lib/util/tevent_unix.h"
#include "lib/util/sys_rw.h"
#include "lib/util/blocking.h"
#include "ctdb/include/ctdb_protocol.h"
#include "lib/async_req/async_sock.h"
#include "lib/dbwrap/dbwrap.h"
#include "lib/dbwrap/dbwrap_rbt.h"
/* paths to these include files come from --with-ctdb= in configure */
struct ctdbd_srvid_cb {
uint64_t srvid;
int (*cb)(struct tevent_context *ev,
uint32_t src_vnn, uint32_t dst_vnn,
uint64_t dst_srvid,
const uint8_t *msg, size_t msglen,
void *private_data);
void *private_data;
};
struct ctdbd_connection {
uint32_t reqid;
uint32_t our_vnn;
uint64_t rand_srvid;
struct ctdbd_srvid_cb *callbacks;
int fd;
int timeout;
/*
* Outgoing queue for writev_send of asynchronous ctdb requests
*/
struct tevent_queue *outgoing;
struct tevent_req **pending;
struct tevent_req *read_req;
};
static bool ctdbd_conn_has_async_reqs(struct ctdbd_connection *conn)
{
size_t len = talloc_array_length(conn->pending);
return (len != 0);
}
static uint32_t ctdbd_next_reqid(struct ctdbd_connection *conn)
{
conn->reqid += 1;
if (conn->reqid == 0) {
conn->reqid += 1;
}
return conn->reqid;
}
static int ctdbd_control(struct ctdbd_connection *conn,
uint32_t vnn, uint32_t opcode,
uint64_t srvid, uint32_t flags,
TDB_DATA data,
TALLOC_CTX *mem_ctx, TDB_DATA *outdata,
int32_t *cstatus);
/*
* exit on fatal communications errors with the ctdbd daemon
*/
static void cluster_fatal(const char *why)
{
DEBUG(0,("cluster fatal event: %s - exiting immediately\n", why));
/* we don't use smb_panic() as we don't want to delay to write
a core file. We need to release this process id immediately
so that someone else can take over without getting sharing
violations */
_exit(1);
}
/*
*
*/
static void ctdb_packet_dump(struct ctdb_req_header *hdr)
{
if (DEBUGLEVEL < 11) {
return;
}
DEBUGADD(11, ("len=%"PRIu32", magic=%"PRIu32", vers=%"PRIu32", "
"gen=%"PRIu32", op=%"PRIu32", reqid=%"PRIu32"\n",
hdr->length,
hdr->ctdb_magic,
hdr->ctdb_version,
hdr->generation,
hdr->operation,
hdr->reqid));
}
/*
* Register a srvid with ctdbd
*/
int register_with_ctdbd(struct ctdbd_connection *conn, uint64_t srvid,
int (*cb)(struct tevent_context *ev,
uint32_t src_vnn, uint32_t dst_vnn,
uint64_t dst_srvid,
const uint8_t *msg, size_t msglen,
void *private_data),
void *private_data)
{
size_t num_callbacks = talloc_array_length(conn->callbacks);
struct ctdbd_srvid_cb *tmp;
bool need_register = true;
size_t i;
for (i = 0; i < num_callbacks; i++) {
struct ctdbd_srvid_cb *c = &conn->callbacks[i];
if (c->srvid == srvid) {
need_register = false;
break;
}
}
if (need_register) {
int ret;
int32_t cstatus;
ret = ctdbd_control_local(conn, CTDB_CONTROL_REGISTER_SRVID,
srvid, 0, tdb_null, NULL, NULL,
&cstatus);
if (ret != 0) {
return ret;
}
}
tmp = talloc_realloc(conn, conn->callbacks, struct ctdbd_srvid_cb,
num_callbacks + 1);
if (tmp == NULL) {
return ENOMEM;
}
conn->callbacks = tmp;
conn->callbacks[num_callbacks] = (struct ctdbd_srvid_cb) {
.srvid = srvid, .cb = cb, .private_data = private_data
};
return 0;
}
void deregister_from_ctdbd(struct ctdbd_connection *conn,
uint64_t srvid,
int (*cb)(struct tevent_context *ev,
uint32_t src_vnn,
uint32_t dst_vnn,
uint64_t dst_srvid,
const uint8_t *msg,
size_t msglen,
void *private_data),
void *private_data)
{
struct ctdbd_srvid_cb *cbs = conn->callbacks;
size_t i, num_callbacks = talloc_array_length(cbs);
bool need_deregister = false;
bool keep_registration = false;
if (num_callbacks == 0) {
return;
}
for (i = 0; i < num_callbacks;) {
struct ctdbd_srvid_cb *c = &cbs[i];
if (c->srvid != srvid) {
i++;
continue;
}
if ((c->cb == cb) && (c->private_data == private_data)) {
need_deregister = true;
ARRAY_DEL_ELEMENT(cbs, i, num_callbacks);
num_callbacks--;
continue;
}
keep_registration = true;
i++;
}
conn->callbacks = talloc_realloc(conn,
cbs,
struct ctdbd_srvid_cb,
num_callbacks);
if (keep_registration) {
need_deregister = false;
}
if (need_deregister) {
int ret;
int32_t cstatus;
ret = ctdbd_control_local(conn, CTDB_CONTROL_DEREGISTER_SRVID,
srvid, 0, tdb_null, NULL, NULL,
&cstatus);
if (ret != 0) {
/*
* If CTDB_CONTROL_DEREGISTER_SRVID fails we may still
* get messages later, but we don't have a callback
* anymore, we just ignore these.
*/
}
}
return;
}
static int ctdbd_msg_call_back(struct tevent_context *ev,
struct ctdbd_connection *conn,
struct ctdb_req_message_old *msg)
{
uint32_t msg_len;
size_t i, num_callbacks;
msg_len = msg->hdr.length;
if (msg_len < offsetof(struct ctdb_req_message_old, data)) {
DBG_DEBUG("len %"PRIu32" too small\n", msg_len);
return 0;
}
msg_len -= offsetof(struct ctdb_req_message_old, data);
if (msg_len < msg->datalen) {
DBG_DEBUG("msg_len=%"PRIu32" < msg->datalen=%"PRIu32"\n",
msg_len, msg->datalen);
return 0;
}
num_callbacks = talloc_array_length(conn->callbacks);
for (i=0; icallbacks[i];
if ((cb->srvid == msg->srvid) && (cb->cb != NULL)) {
int ret;
ret = cb->cb(ev,
msg->hdr.srcnode, msg->hdr.destnode,
msg->srvid, msg->data, msg->datalen,
cb->private_data);
if (ret != 0) {
return ret;
}
}
}
return 0;
}
/*
* get our vnn from the cluster
*/
static int get_cluster_vnn(struct ctdbd_connection *conn, uint32_t *vnn)
{
int32_t cstatus=-1;
int ret;
ret = ctdbd_control_local(conn, CTDB_CONTROL_GET_PNN, 0, 0,
tdb_null, NULL, NULL, &cstatus);
if (ret != 0) {
DEBUG(1, ("ctdbd_control failed: %s\n", strerror(ret)));
return ret;
}
*vnn = (uint32_t)cstatus;
return ret;
}
static int ctdbd_control_get_nodemap(struct ctdbd_connection *conn,
TALLOC_CTX *mem_ctx,
struct ctdb_node_map_old **_nodemap)
{
int32_t cstatus=-1;
TDB_DATA outdata = {0};
int ret;
ret = ctdbd_control_local(conn, CTDB_CONTROL_GET_NODEMAP, 0, 0,
tdb_null, mem_ctx, &outdata, &cstatus);
if (ret != 0) {
DEBUG(1, ("ctdbd_control failed: %s\n", strerror(ret)));
return ret;
}
if ((cstatus != 0) || (outdata.dptr == NULL)) {
DEBUG(2, ("Received invalid ctdb data\n"));
return EINVAL;
}
*_nodemap = (struct ctdb_node_map_old *)outdata.dptr;
return 0;
}
/*
* Are we active (i.e. not banned or stopped?)
*/
static bool ctdbd_working(struct ctdbd_connection *conn, uint32_t vnn)
{
struct ctdb_node_map_old *m = NULL;
bool ok = false;
uint32_t i;
int ret;
ret = ctdbd_control_get_nodemap(conn, talloc_tos(), &m);
if (ret != 0) {
DEBUG(1, ("ctdbd_control_get_nodemap() failed: %s\n", strerror(ret)));
return false;
}
for (i=0; inum; i++) {
if (vnn == m->nodes[i].pnn) {
break;
}
}
if (i == m->num) {
DEBUG(2, ("Did not find ourselves (node %d) in nodemap\n",
(int)vnn));
goto fail;
}
if ((m->nodes[i].flags & NODE_FLAGS_INACTIVE) != 0) {
DEBUG(2, ("Node has status %x, not active\n",
(int)m->nodes[i].flags));
goto fail;
}
ok = true;
fail:
TALLOC_FREE(m);
return ok;
}
uint32_t ctdbd_vnn(const struct ctdbd_connection *conn)
{
return conn->our_vnn;
}
/*
* Get us a ctdb connection
*/
static int ctdbd_connect(const char *sockname, int *pfd)
{
struct samba_sockaddr addr = {
.sa_socklen = sizeof(struct sockaddr_un),
.u = {
.un = {
.sun_family = AF_UNIX,
},
},
};
int fd;
size_t namelen;
int ret;
fd = socket(AF_UNIX, SOCK_STREAM, 0);
if (fd == -1) {
int err = errno;
DEBUG(3, ("Could not create socket: %s\n", strerror(err)));
return err;
}
namelen = strlcpy(addr.u.un.sun_path,
sockname,
sizeof(addr.u.un.sun_path));
if (namelen >= sizeof(addr.u.un.sun_path)) {
DEBUG(3, ("%s: Socket name too long: %s\n", __func__,
sockname));
close(fd);
return ENAMETOOLONG;
}
ret = connect(fd, &addr.u.sa, addr.sa_socklen);
if (ret == -1) {
int err = errno;
DEBUG(1, ("connect(%s) failed: %s\n", sockname,
strerror(err)));
close(fd);
return err;
}
*pfd = fd;
return 0;
}
static int ctdb_read_packet(int fd, int timeout, TALLOC_CTX *mem_ctx,
struct ctdb_req_header **result)
{
struct ctdb_req_header *req;
uint32_t msglen;
ssize_t nread;
if (timeout != -1) {
struct pollfd pfd = { .fd = fd, .events = POLLIN };
int ret;
ret = sys_poll_intr(&pfd, 1, timeout);
if (ret == -1) {
return errno;
}
if (ret == 0) {
return ETIMEDOUT;
}
if (ret != 1) {
return EIO;
}
}
nread = read_data(fd, &msglen, sizeof(msglen));
if (nread == -1) {
return errno;
}
if (nread == 0) {
return EIO;
}
if (msglen < sizeof(struct ctdb_req_header)) {
return EIO;
}
req = talloc_size(mem_ctx, msglen);
if (req == NULL) {
return ENOMEM;
}
talloc_set_name_const(req, "struct ctdb_req_header");
req->length = msglen;
nread = read_data(fd, ((char *)req) + sizeof(msglen),
msglen - sizeof(msglen));
if (nread == -1) {
TALLOC_FREE(req);
return errno;
}
if (nread == 0) {
TALLOC_FREE(req);
return EIO;
}
*result = req;
return 0;
}
/*
* Read a full ctdbd request. If we have a messaging context, defer incoming
* messages that might come in between.
*/
static int ctdb_read_req(struct ctdbd_connection *conn, uint32_t reqid,
TALLOC_CTX *mem_ctx, struct ctdb_req_header **result)
{
struct ctdb_req_header *hdr = NULL;
int ret;
next_pkt:
ret = ctdb_read_packet(conn->fd, conn->timeout, mem_ctx, &hdr);
if (ret != 0) {
DBG_ERR("ctdb_read_packet failed: %s\n", strerror(ret));
cluster_fatal("failed to read data from ctdbd\n");
return -1;
}
SMB_ASSERT(hdr != NULL);
DEBUG(11, ("Received ctdb packet\n"));
ctdb_packet_dump(hdr);
if (hdr->operation == CTDB_REQ_MESSAGE) {
struct ctdb_req_message_old *msg = (struct ctdb_req_message_old *)hdr;
ret = ctdbd_msg_call_back(NULL, conn, msg);
if (ret != 0) {
TALLOC_FREE(hdr);
return ret;
}
TALLOC_FREE(hdr);
goto next_pkt;
}
if ((reqid != 0) && (hdr->reqid != reqid)) {
/* we got the wrong reply */
DEBUG(0,("Discarding mismatched ctdb reqid %u should have "
"been %u\n", hdr->reqid, reqid));
TALLOC_FREE(hdr);
goto next_pkt;
}
*result = talloc_move(mem_ctx, &hdr);
return 0;
}
static int ctdbd_connection_destructor(struct ctdbd_connection *c);
/*
* Get us a ctdbd connection
*/
static int ctdbd_init_connection_internal(TALLOC_CTX *mem_ctx,
const char *sockname, int timeout,
struct ctdbd_connection *conn)
{
int ret;
conn->timeout = timeout;
if (conn->timeout == 0) {
conn->timeout = -1;
}
ret = ctdbd_connect(sockname, &conn->fd);
if (ret != 0) {
DEBUG(1, ("ctdbd_connect failed: %s\n", strerror(ret)));
return ret;
}
talloc_set_destructor(conn, ctdbd_connection_destructor);
ret = get_cluster_vnn(conn, &conn->our_vnn);
if (ret != 0) {
DEBUG(10, ("get_cluster_vnn failed: %s\n", strerror(ret)));
return ret;
}
if (!ctdbd_working(conn, conn->our_vnn)) {
DEBUG(2, ("Node is not working, can not connect\n"));
return EIO;
}
generate_random_buffer((unsigned char *)&conn->rand_srvid,
sizeof(conn->rand_srvid));
ret = register_with_ctdbd(conn, conn->rand_srvid, NULL, NULL);
if (ret != 0) {
DEBUG(5, ("Could not register random srvid: %s\n",
strerror(ret)));
return ret;
}
return 0;
}
int ctdbd_init_connection(TALLOC_CTX *mem_ctx,
const char *sockname, int timeout,
struct ctdbd_connection **pconn)
{
struct ctdbd_connection *conn;
int ret;
if (!(conn = talloc_zero(mem_ctx, struct ctdbd_connection))) {
DEBUG(0, ("talloc failed\n"));
return ENOMEM;
}
ret = ctdbd_init_connection_internal(mem_ctx,
sockname,
timeout,
conn);
if (ret != 0) {
DBG_ERR("ctdbd_init_connection_internal failed (%s)\n",
strerror(ret));
goto fail;
}
*pconn = conn;
return 0;
fail:
TALLOC_FREE(conn);
return ret;
}
int ctdbd_reinit_connection(TALLOC_CTX *mem_ctx,
const char *sockname, int timeout,
struct ctdbd_connection *conn)
{
int ret;
ret = ctdbd_connection_destructor(conn);
if (ret != 0) {
DBG_ERR("ctdbd_connection_destructor failed\n");
return ret;
}
ret = ctdbd_init_connection_internal(mem_ctx,
sockname,
timeout,
conn);
if (ret != 0) {
DBG_ERR("ctdbd_init_connection_internal failed (%s)\n",
strerror(ret));
return ret;
}
return 0;
}
int ctdbd_init_async_connection(
TALLOC_CTX *mem_ctx,
const char *sockname,
int timeout,
struct ctdbd_connection **pconn)
{
struct ctdbd_connection *conn = NULL;
int ret;
*pconn = NULL;
ret = ctdbd_init_connection(mem_ctx, sockname, timeout, &conn);
if (ret != 0) {
return ret;
}
ret = set_blocking(conn->fd, false);
if (ret == -1) {
int err = errno;
SMB_ASSERT(err != 0);
TALLOC_FREE(conn);
return err;
}
conn->outgoing = tevent_queue_create(conn, "ctdb async outgoing");
if (conn->outgoing == NULL) {
TALLOC_FREE(conn);
return ENOMEM;
}
*pconn = conn;
return 0;
}
int ctdbd_conn_get_fd(struct ctdbd_connection *conn)
{
return conn->fd;
}
/*
* Packet handler to receive and handle a ctdb message
*/
static int ctdb_handle_message(struct tevent_context *ev,
struct ctdbd_connection *conn,
struct ctdb_req_header *hdr)
{
struct ctdb_req_message_old *msg;
if (hdr->operation != CTDB_REQ_MESSAGE) {
DEBUG(0, ("Received async msg of type %u, discarding\n",
hdr->operation));
return EINVAL;
}
msg = (struct ctdb_req_message_old *)hdr;
ctdbd_msg_call_back(ev, conn, msg);
return 0;
}
void ctdbd_socket_readable(struct tevent_context *ev,
struct ctdbd_connection *conn)
{
struct ctdb_req_header *hdr = NULL;
int ret;
ret = ctdb_read_packet(conn->fd, conn->timeout, talloc_tos(), &hdr);
if (ret != 0) {
DBG_ERR("ctdb_read_packet failed: %s\n", strerror(ret));
cluster_fatal("failed to read data from ctdbd\n");
}
SMB_ASSERT(hdr != NULL);
ret = ctdb_handle_message(ev, conn, hdr);
TALLOC_FREE(hdr);
if (ret != 0) {
DEBUG(10, ("could not handle incoming message: %s\n",
strerror(ret)));
}
}
int ctdbd_messaging_send_iov(struct ctdbd_connection *conn,
uint32_t dst_vnn, uint64_t dst_srvid,
const struct iovec *iov, int iovlen)
{
struct ctdb_req_message_old r;
struct iovec iov2[iovlen+1];
size_t buflen = iov_buflen(iov, iovlen);
ssize_t nwritten;
r.hdr.length = offsetof(struct ctdb_req_message_old, data) + buflen;
r.hdr.ctdb_magic = CTDB_MAGIC;
r.hdr.ctdb_version = CTDB_PROTOCOL;
r.hdr.generation = 1;
r.hdr.operation = CTDB_REQ_MESSAGE;
r.hdr.destnode = dst_vnn;
r.hdr.srcnode = conn->our_vnn;
r.hdr.reqid = 0;
r.srvid = dst_srvid;
r.datalen = buflen;
DEBUG(10, ("ctdbd_messaging_send: Sending ctdb packet\n"));
ctdb_packet_dump(&r.hdr);
iov2[0].iov_base = &r;
iov2[0].iov_len = offsetof(struct ctdb_req_message_old, data);
memcpy(&iov2[1], iov, iovlen * sizeof(struct iovec));
nwritten = write_data_iov(conn->fd, iov2, iovlen+1);
if (nwritten == -1) {
DEBUG(3, ("write_data_iov failed: %s\n", strerror(errno)));
cluster_fatal("cluster dispatch daemon msg write error\n");
}
return 0;
}
/*
* send/recv a generic ctdb control message
*/
static int ctdbd_control(struct ctdbd_connection *conn,
uint32_t vnn, uint32_t opcode,
uint64_t srvid, uint32_t flags,
TDB_DATA data,
TALLOC_CTX *mem_ctx, TDB_DATA *outdata,
int32_t *cstatus)
{
struct ctdb_req_control_old req;
struct ctdb_req_header *hdr;
struct ctdb_reply_control_old *reply = NULL;
struct iovec iov[2];
ssize_t nwritten;
int ret;
if (ctdbd_conn_has_async_reqs(conn)) {
/*
* Can't use sync call while an async call is in flight. Adding
* this check as a safety net. We'll be using different
* connections for sync and async requests, so this shouldn't
* happen, but who knows...
*/
DBG_ERR("Async ctdb req on sync connection\n");
return EINVAL;
}
ZERO_STRUCT(req);
req.hdr.length = offsetof(struct ctdb_req_control_old, data) + data.dsize;
req.hdr.ctdb_magic = CTDB_MAGIC;
req.hdr.ctdb_version = CTDB_PROTOCOL;
req.hdr.operation = CTDB_REQ_CONTROL;
req.hdr.reqid = ctdbd_next_reqid(conn);
req.hdr.destnode = vnn;
req.opcode = opcode;
req.srvid = srvid;
req.datalen = data.dsize;
req.flags = flags;
DBG_DEBUG("Sending ctdb packet reqid=%"PRIu32", vnn=%"PRIu32", "
"opcode=%"PRIu32", srvid=%"PRIu64"\n", req.hdr.reqid,
req.hdr.destnode, req.opcode, req.srvid);
ctdb_packet_dump(&req.hdr);
iov[0].iov_base = &req;
iov[0].iov_len = offsetof(struct ctdb_req_control_old, data);
iov[1].iov_base = data.dptr;
iov[1].iov_len = data.dsize;
nwritten = write_data_iov(conn->fd, iov, ARRAY_SIZE(iov));
if (nwritten == -1) {
DEBUG(3, ("write_data_iov failed: %s\n", strerror(errno)));
cluster_fatal("cluster dispatch daemon msg write error\n");
}
if (flags & CTDB_CTRL_FLAG_NOREPLY) {
if (cstatus) {
*cstatus = 0;
}
return 0;
}
ret = ctdb_read_req(conn, req.hdr.reqid, NULL, &hdr);
if (ret != 0) {
DEBUG(10, ("ctdb_read_req failed: %s\n", strerror(ret)));
return ret;
}
if (hdr->operation != CTDB_REPLY_CONTROL) {
DEBUG(0, ("received invalid reply\n"));
TALLOC_FREE(hdr);
return EIO;
}
reply = (struct ctdb_reply_control_old *)hdr;
if (outdata) {
if (!(outdata->dptr = (uint8_t *)talloc_memdup(
mem_ctx, reply->data, reply->datalen))) {
TALLOC_FREE(reply);
return ENOMEM;
}
outdata->dsize = reply->datalen;
}
if (cstatus) {
(*cstatus) = reply->status;
}
TALLOC_FREE(reply);
return ret;
}
/*
* see if a remote process exists
*/
bool ctdbd_process_exists(struct ctdbd_connection *conn, uint32_t vnn,
pid_t pid, uint64_t unique_id)
{
uint8_t buf[sizeof(pid)+sizeof(unique_id)];
int32_t cstatus = 0;
int ret;
if (unique_id == SERVERID_UNIQUE_ID_NOT_TO_VERIFY) {
ret = ctdbd_control(conn, vnn, CTDB_CONTROL_PROCESS_EXISTS,
0, 0,
(TDB_DATA) { .dptr = (uint8_t *)&pid,
.dsize = sizeof(pid) },
NULL, NULL, &cstatus);
if (ret != 0) {
return false;
}
return (cstatus == 0);
}
memcpy(buf, &pid, sizeof(pid));
memcpy(buf+sizeof(pid), &unique_id, sizeof(unique_id));
ret = ctdbd_control(conn, vnn, CTDB_CONTROL_CHECK_PID_SRVID, 0, 0,
(TDB_DATA) { .dptr = buf, .dsize = sizeof(buf) },
NULL, NULL, &cstatus);
if (ret != 0) {
return false;
}
return (cstatus == 0);
}
/*
* Get a db path
*/
char *ctdbd_dbpath(struct ctdbd_connection *conn,
TALLOC_CTX *mem_ctx, uint32_t db_id)
{
int ret;
TDB_DATA data;
TDB_DATA rdata = {0};
int32_t cstatus = 0;
data.dptr = (uint8_t*)&db_id;
data.dsize = sizeof(db_id);
ret = ctdbd_control_local(conn, CTDB_CONTROL_GETDBPATH, 0, 0, data,
mem_ctx, &rdata, &cstatus);
if ((ret != 0) || cstatus != 0) {
DEBUG(0, (__location__ " ctdb_control for getdbpath failed: %s\n",
strerror(ret)));
TALLOC_FREE(rdata.dptr);
}
return (char *)rdata.dptr;
}
/*
* attach to a ctdb database
*/
int ctdbd_db_attach(struct ctdbd_connection *conn,
const char *name, uint32_t *db_id, bool persistent)
{
int ret;
TDB_DATA data = {0};
int32_t cstatus;
data = string_term_tdb_data(name);
ret = ctdbd_control_local(conn,
persistent
? CTDB_CONTROL_DB_ATTACH_PERSISTENT
: CTDB_CONTROL_DB_ATTACH,
0, 0, data, NULL, &data, &cstatus);
if (ret != 0) {
DEBUG(0, (__location__ " ctdb_control for db_attach "
"failed: %s\n", strerror(ret)));
return ret;
}
if (cstatus != 0 || data.dsize != sizeof(uint32_t)) {
DEBUG(0,(__location__ " ctdb_control for db_attach failed\n"));
TALLOC_FREE(data.dptr);
return EIO;
}
*db_id = *(uint32_t *)data.dptr;
talloc_free(data.dptr);
return 0;
}
/*
* force the migration of a record to this node
*/
int ctdbd_migrate(struct ctdbd_connection *conn, uint32_t db_id, TDB_DATA key)
{
struct ctdb_req_call_old req;
struct ctdb_req_header *hdr = NULL;
struct iovec iov[2];
ssize_t nwritten;
int ret;
if (ctdbd_conn_has_async_reqs(conn)) {
/*
* Can't use sync call while an async call is in flight. Adding
* this check as a safety net. We'll be using different
* connections for sync and async requests, so this shouldn't
* happen, but who knows...
*/
DBG_ERR("Async ctdb req on sync connection\n");
return EINVAL;
}
ZERO_STRUCT(req);
req.hdr.length = offsetof(struct ctdb_req_call_old, data) + key.dsize;
req.hdr.ctdb_magic = CTDB_MAGIC;
req.hdr.ctdb_version = CTDB_PROTOCOL;
req.hdr.operation = CTDB_REQ_CALL;
req.hdr.reqid = ctdbd_next_reqid(conn);
req.flags = CTDB_IMMEDIATE_MIGRATION;
req.callid = CTDB_NULL_FUNC;
req.db_id = db_id;
req.keylen = key.dsize;
DEBUG(10, ("ctdbd_migrate: Sending ctdb packet\n"));
ctdb_packet_dump(&req.hdr);
iov[0].iov_base = &req;
iov[0].iov_len = offsetof(struct ctdb_req_call_old, data);
iov[1].iov_base = key.dptr;
iov[1].iov_len = key.dsize;
nwritten = write_data_iov(conn->fd, iov, ARRAY_SIZE(iov));
if (nwritten == -1) {
DEBUG(3, ("write_data_iov failed: %s\n", strerror(errno)));
cluster_fatal("cluster dispatch daemon msg write error\n");
}
ret = ctdb_read_req(conn, req.hdr.reqid, NULL, &hdr);
if (ret != 0) {
DEBUG(10, ("ctdb_read_req failed: %s\n", strerror(ret)));
goto fail;
}
if (hdr->operation != CTDB_REPLY_CALL) {
if (hdr->operation == CTDB_REPLY_ERROR) {
DBG_ERR("received error from ctdb\n");
} else {
DBG_ERR("received invalid reply\n");
}
ret = EIO;
goto fail;
}
fail:
TALLOC_FREE(hdr);
return ret;
}
/*
* Fetch a record and parse it
*/
int ctdbd_parse(struct ctdbd_connection *conn, uint32_t db_id,
TDB_DATA key, bool local_copy,
void (*parser)(TDB_DATA key, TDB_DATA data,
void *private_data),
void *private_data)
{
struct ctdb_req_call_old req;
struct ctdb_req_header *hdr = NULL;
struct ctdb_reply_call_old *reply;
struct iovec iov[2];
ssize_t nwritten;
uint32_t flags;
int ret;
if (ctdbd_conn_has_async_reqs(conn)) {
/*
* Can't use sync call while an async call is in flight. Adding
* this check as a safety net. We'll be using different
* connections for sync and async requests, so this shouldn't
* happen, but who knows...
*/
DBG_ERR("Async ctdb req on sync connection\n");
return EINVAL;
}
flags = local_copy ? CTDB_WANT_READONLY : 0;
ZERO_STRUCT(req);
req.hdr.length = offsetof(struct ctdb_req_call_old, data) + key.dsize;
req.hdr.ctdb_magic = CTDB_MAGIC;
req.hdr.ctdb_version = CTDB_PROTOCOL;
req.hdr.operation = CTDB_REQ_CALL;
req.hdr.reqid = ctdbd_next_reqid(conn);
req.flags = flags;
req.callid = CTDB_FETCH_FUNC;
req.db_id = db_id;
req.keylen = key.dsize;
iov[0].iov_base = &req;
iov[0].iov_len = offsetof(struct ctdb_req_call_old, data);
iov[1].iov_base = key.dptr;
iov[1].iov_len = key.dsize;
nwritten = write_data_iov(conn->fd, iov, ARRAY_SIZE(iov));
if (nwritten == -1) {
DEBUG(3, ("write_data_iov failed: %s\n", strerror(errno)));
cluster_fatal("cluster dispatch daemon msg write error\n");
}
ret = ctdb_read_req(conn, req.hdr.reqid, NULL, &hdr);
if (ret != 0) {
DEBUG(10, ("ctdb_read_req failed: %s\n", strerror(ret)));
goto fail;
}
if ((hdr == NULL) || (hdr->operation != CTDB_REPLY_CALL)) {
DEBUG(0, ("received invalid reply\n"));
ret = EIO;
goto fail;
}
reply = (struct ctdb_reply_call_old *)hdr;
if (reply->datalen == 0) {
/*
* Treat an empty record as non-existing
*/
ret = ENOENT;
goto fail;
}
parser(key, make_tdb_data(&reply->data[0], reply->datalen),
private_data);
ret = 0;
fail:
TALLOC_FREE(hdr);
return ret;
}
/*
Traverse a ctdb database. "conn" must be an otherwise unused
ctdb_connection where no other messages but the traverse ones are
expected.
*/
int ctdbd_traverse(struct ctdbd_connection *conn, uint32_t db_id,
void (*fn)(TDB_DATA key, TDB_DATA data,
void *private_data),
void *private_data)
{
int ret;
TDB_DATA key, data;
struct ctdb_traverse_start t;
int32_t cstatus = 0;
if (ctdbd_conn_has_async_reqs(conn)) {
/*
* Can't use sync call while an async call is in flight. Adding
* this check as a safety net. We'll be using different
* connections for sync and async requests, so this shouldn't
* happen, but who knows...
*/
DBG_ERR("Async ctdb req on sync connection\n");
return EINVAL;
}
t.db_id = db_id;
t.srvid = conn->rand_srvid;
t.reqid = ctdbd_next_reqid(conn);
data.dptr = (uint8_t *)&t;
data.dsize = sizeof(t);
ret = ctdbd_control_local(conn, CTDB_CONTROL_TRAVERSE_START,
conn->rand_srvid,
0, data, NULL, NULL, &cstatus);
if ((ret != 0) || (cstatus != 0)) {
DEBUG(0,("ctdbd_control failed: %s, %d\n", strerror(ret),
cstatus));
if (ret == 0) {
/*
* We need a mapping here
*/
ret = EIO;
}
return ret;
}
while (true) {
struct ctdb_req_header *hdr = NULL;
struct ctdb_req_message_old *m;
struct ctdb_rec_data_old *d;
ret = ctdb_read_packet(conn->fd, conn->timeout, conn, &hdr);
if (ret != 0) {
DBG_ERR("ctdb_read_packet failed: %s\n", strerror(ret));
cluster_fatal("failed to read data from ctdbd\n");
}
SMB_ASSERT(hdr != NULL);
if (hdr->operation != CTDB_REQ_MESSAGE) {
DEBUG(0, ("Got operation %u, expected a message\n",
(unsigned)hdr->operation));
return EIO;
}
m = (struct ctdb_req_message_old *)hdr;
d = (struct ctdb_rec_data_old *)&m->data[0];
if (m->datalen < sizeof(uint32_t) || m->datalen != d->length) {
DEBUG(0, ("Got invalid traverse data of length %d\n",
(int)m->datalen));
return EIO;
}
key.dsize = d->keylen;
key.dptr = &d->data[0];
data.dsize = d->datalen;
data.dptr = &d->data[d->keylen];
if (key.dsize == 0 && data.dsize == 0) {
/* end of traverse */
return 0;
}
if (data.dsize < sizeof(struct ctdb_ltdb_header)) {
DEBUG(0, ("Got invalid ltdb header length %d\n",
(int)data.dsize));
return EIO;
}
data.dsize -= sizeof(struct ctdb_ltdb_header);
data.dptr += sizeof(struct ctdb_ltdb_header);
if (fn != NULL) {
fn(key, data, private_data);
}
}
return 0;
}
/*
This is used to canonicalize a ctdb_sock_addr structure.
*/
static void smbd_ctdb_canonicalize_ip(const struct sockaddr_storage *in,
struct sockaddr_storage *out)
{
memcpy(out, in, sizeof (*out));
#ifdef HAVE_IPV6
if (in->ss_family == AF_INET6) {
const char prefix[12] = { 0,0,0,0,0,0,0,0,0,0,0xff,0xff };
const struct sockaddr_in6 *in6 =
(const struct sockaddr_in6 *)in;
struct sockaddr_in *out4 = (struct sockaddr_in *)out;
if (memcmp(&in6->sin6_addr, prefix, 12) == 0) {
memset(out, 0, sizeof(*out));
#ifdef HAVE_SOCK_SIN_LEN
out4->sin_len = sizeof(*out);
#endif
out4->sin_family = AF_INET;
out4->sin_port = in6->sin6_port;
memcpy(&out4->sin_addr, &in6->sin6_addr.s6_addr[12], 4);
}
}
#endif
}
/*
* Register us as a server for a particular tcp connection
*/
int ctdbd_register_ips(struct ctdbd_connection *conn,
const struct sockaddr_storage *_server,
const struct sockaddr_storage *_client,
int (*cb)(struct tevent_context *ev,
uint32_t src_vnn, uint32_t dst_vnn,
uint64_t dst_srvid,
const uint8_t *msg, size_t msglen,
void *private_data),
void *private_data)
{
struct ctdb_connection p;
TDB_DATA data = { .dptr = (uint8_t *)&p, .dsize = sizeof(p) };
int ret;
struct sockaddr_storage client;
struct sockaddr_storage server;
/*
* Only one connection so far
*/
smbd_ctdb_canonicalize_ip(_client, &client);
smbd_ctdb_canonicalize_ip(_server, &server);
ZERO_STRUCT(p);
switch (client.ss_family) {
case AF_INET:
memcpy(&p.dst.ip, &server, sizeof(p.dst.ip));
memcpy(&p.src.ip, &client, sizeof(p.src.ip));
break;
case AF_INET6:
memcpy(&p.dst.ip6, &server, sizeof(p.dst.ip6));
memcpy(&p.src.ip6, &client, sizeof(p.src.ip6));
break;
default:
return EIO;
}
/*
* We want to be told about IP releases
*/
ret = register_with_ctdbd(conn, CTDB_SRVID_RELEASE_IP,
cb, private_data);
if (ret != 0) {
return ret;
}
/*
* inform ctdb of our tcp connection, so if IP takeover happens ctdb
* can send an extra ack to trigger a reset for our client, so it
* immediately reconnects
*/
ret = ctdbd_control_local(conn,
CTDB_CONTROL_TCP_CLIENT, 0,
CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL,
NULL);
if (ret != 0) {
return ret;
}
return 0;
}
void ctdbd_unregister_ips(struct ctdbd_connection *conn,
const struct sockaddr_storage *_server,
const struct sockaddr_storage *_client,
int (*cb)(struct tevent_context *ev,
uint32_t src_vnn,
uint32_t dst_vnn,
uint64_t dst_srvid,
const uint8_t *msg,
size_t msglen,
void *private_data),
void *private_data)
{
struct ctdb_connection p;
TDB_DATA data = { .dptr = (uint8_t *)&p, .dsize = sizeof(p) };
int ret;
struct sockaddr_storage client;
struct sockaddr_storage server;
/*
* Only one connection so far
*/
smbd_ctdb_canonicalize_ip(_client, &client);
smbd_ctdb_canonicalize_ip(_server, &server);
ZERO_STRUCT(p);
switch (client.ss_family) {
case AF_INET:
memcpy(&p.dst.ip, &server, sizeof(p.dst.ip));
memcpy(&p.src.ip, &client, sizeof(p.src.ip));
break;
case AF_INET6:
memcpy(&p.dst.ip6, &server, sizeof(p.dst.ip6));
memcpy(&p.src.ip6, &client, sizeof(p.src.ip6));
break;
default:
return;
}
/*
* We no longer want to be told about IP releases
* for the given callback/private_data combination
*/
deregister_from_ctdbd(conn, CTDB_SRVID_RELEASE_IP,
cb, private_data);
/*
* inform ctdb of our tcp connection is no longer active
*/
ret = ctdbd_control_local(conn,
CTDB_CONTROL_TCP_CLIENT_DISCONNECTED, 0,
CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL,
NULL);
if (ret != 0) {
/*
* We ignore errors here, as we'll just
* no longer have a callback handler
* registered and messages may just be ignored
*/
}
return;
}
void ctdbd_passed_ips(struct ctdbd_connection *conn,
const struct sockaddr_storage *_server,
const struct sockaddr_storage *_client,
int (*cb)(struct tevent_context *ev,
uint32_t src_vnn,
uint32_t dst_vnn,
uint64_t dst_srvid,
const uint8_t *msg,
size_t msglen,
void *private_data),
void *private_data)
{
struct ctdb_connection p;
TDB_DATA data = { .dptr = (uint8_t *)&p, .dsize = sizeof(p) };
int ret;
struct sockaddr_storage client;
struct sockaddr_storage server;
/*
* Only one connection so far
*/
smbd_ctdb_canonicalize_ip(_client, &client);
smbd_ctdb_canonicalize_ip(_server, &server);
ZERO_STRUCT(p);
switch (client.ss_family) {
case AF_INET:
memcpy(&p.dst.ip, &server, sizeof(p.dst.ip));
memcpy(&p.src.ip, &client, sizeof(p.src.ip));
break;
case AF_INET6:
memcpy(&p.dst.ip6, &server, sizeof(p.dst.ip6));
memcpy(&p.src.ip6, &client, sizeof(p.src.ip6));
break;
default:
return;
}
/*
* We no longer want to be told about IP releases
* for the given callback/private_data combination
*/
deregister_from_ctdbd(conn, CTDB_SRVID_RELEASE_IP,
cb, private_data);
/*
* inform ctdb of our tcp connection is now passed to
* another process.
*/
ret = ctdbd_control_local(conn,
CTDB_CONTROL_TCP_CLIENT_PASSED, 0,
CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL,
NULL);
if (ret != 0) {
/*
* We ignore errors here, as we'll just
* no longer have a callback handler
* registered and messages may just be ignored
*/
}
return;
}
static int ctdbd_control_get_public_ips(struct ctdbd_connection *conn,
uint32_t vnn,
uint32_t flags,
TALLOC_CTX *mem_ctx,
struct ctdb_public_ip_list_old **_ips)
{
struct ctdb_public_ip_list_old *ips = NULL;
TDB_DATA outdata;
int32_t cstatus = -1;
size_t min_dsize;
size_t max_ips;
int ret;
*_ips = NULL;
ret = ctdbd_control(conn,
vnn,
CTDB_CONTROL_GET_PUBLIC_IPS,
0, /* srvid */
flags,
tdb_null, /* indata */
mem_ctx,
&outdata,
&cstatus);
if (ret != 0 || cstatus != 0) {
DBG_ERR("ctdb_control for getpublicips failed ret:%d cstatus:%d\n",
ret, (int)cstatus);
return -1;
}
min_dsize = offsetof(struct ctdb_public_ip_list_old, ips);
if (outdata.dsize < min_dsize) {
DBG_ERR("outdata.dsize=%zu < min_dsize=%zu\n",
outdata.dsize, min_dsize);
return -1;
}
max_ips = (outdata.dsize - min_dsize)/sizeof(struct ctdb_public_ip);
ips = (struct ctdb_public_ip_list_old *)outdata.dptr;
if ((size_t)ips->num > max_ips) {
DBG_ERR("ips->num=%zu > max_ips=%zu\n",
(size_t)ips->num, max_ips);
return -1;
}
*_ips = ips;
return 0;
}
static struct samba_sockaddr ctdbd_sock_addr_to_samba(const ctdb_sock_addr *c)
{
struct samba_sockaddr s = {};
switch (c->sa.sa_family) {
case AF_INET:
s.u.in = c->ip;
break;
case AF_INET6:
/*
* ctdb always requires HAVE_IPV6,
* so we don't need an ifdef here.
*/
s.u.in6 = c->ip6;
break;
default:
/*
* ctdb_sock_addr only supports ipv4 and ipv6
*/
smb_panic(__location__);
break;
}
return s;
}
int ctdbd_public_ip_foreach(struct ctdbd_connection *conn,
int (*cb)(uint32_t total_ip_count,
const struct sockaddr_storage *ip,
bool is_movable_ip,
void *private_data),
void *private_data)
{
uint32_t i;
struct ctdb_public_ip_list_old *ips = NULL;
int ret = ENOMEM;
TALLOC_CTX *frame = talloc_stackframe();
ret = ctdbd_control_get_public_ips(conn, CTDB_CURRENT_NODE, 0, frame, &ips);
if (ret < 0) {
ret = EIO;
goto out_free;
}
for (i=0; i < ips->num; i++) {
const ctdb_sock_addr *addr = &ips->ips[i].addr;
struct samba_sockaddr tmp = ctdbd_sock_addr_to_samba(addr);
ret = cb(ips->num,
&tmp.u.ss,
true, /* all ctdb public ips are movable */
private_data);
if (ret != 0) {
goto out_free;
}
}
ret = 0;
out_free:
TALLOC_FREE(frame);
return ret;
}
static int count_ips(struct db_record *rec, void *private_data)
{
return 0;
}
static int collect_ips(struct db_record *rec, void *private_data)
{
struct ctdb_public_ip_list_old *ips = talloc_get_type_abort(
private_data, struct ctdb_public_ip_list_old);
struct ctdb_public_ip *ip;
TDB_DATA val = dbwrap_record_get_value(rec);
SMB_ASSERT(val.dsize == sizeof(*ip));
ip = (struct ctdb_public_ip *)val.dptr;
ips->ips[ips->num] = *ip;
ips->num += 1;
return 0;
}
static int ctdbd_control_get_all_public_ips(struct ctdbd_connection *conn,
const struct ctdb_node_map_old *nodemap,
TALLOC_CTX *mem_ctx,
struct ctdb_public_ip_list_old **_ips)
{
TALLOC_CTX *frame = talloc_stackframe();
uint32_t ni;
struct ctdb_public_ip_list_old *ips = NULL;
struct db_context *rbt = NULL;
NTSTATUS status;
size_t len;
int ret;
int count;
rbt = db_open_rbt(frame);
if (rbt == NULL) {
DBG_WARNING("db_open_rbt() failed\n");
TALLOC_FREE(frame);
return -1;
}
for (ni=0; ni < nodemap->num; ni++) {
const struct ctdb_node_and_flags *n = &nodemap->nodes[ni];
uint32_t j;
if (n->flags & NODE_FLAGS_INACTIVE) {
continue;
}
ret = ctdbd_control_get_public_ips(conn,
n->pnn,
0,
frame,
&ips);
if (ret != 0) {
TALLOC_FREE(frame);
return -1;
}
for (j=0; jnum; j++) {
struct ctdb_public_ip ip;
TDB_DATA key;
TDB_DATA val;
ip.pnn = ips->ips[j].pnn;
ip.addr = ips->ips[j].addr;
key = make_tdb_data((uint8_t *)&ip.addr, sizeof(ip.addr));
val = make_tdb_data((uint8_t *)&ip, sizeof(ip));
if (n->pnn == ip.pnn) {
/*
* Node claims IP is hosted on it, so
* save that information
*/
status = dbwrap_store(rbt, key, val,
TDB_REPLACE);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(frame);
return -1;
}
} else {
/*
* Node thinks IP is hosted elsewhere,
* so overwrite with CTDB_UNKNOWN_PNN
* if there's no existing entry
*/
bool exists = dbwrap_exists(rbt, key);
if (!exists) {
ip.pnn = CTDB_UNKNOWN_PNN;
status = dbwrap_store(rbt, key, val,
TDB_INSERT);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(frame);
return -1;
}
}
}
}
TALLOC_FREE(ips);
}
status = dbwrap_traverse_read(rbt, count_ips, NULL, &count);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(frame);
return -1;
}
len = offsetof(struct ctdb_public_ip_list_old, ips) +
count*sizeof(struct ctdb_public_ip);
ips = talloc_zero_size(mem_ctx, len);
if (ips == NULL) {
TALLOC_FREE(frame);
return -1;
}
talloc_set_type(ips, struct ctdb_public_ip_list_old);
talloc_reparent(mem_ctx, frame, ips);
status = dbwrap_traverse_read(rbt, collect_ips, ips, &count);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(frame);
return -1;
}
if ((unsigned int)count != ips->num) {
TALLOC_FREE(frame);
return -1;
}
*_ips = talloc_move(mem_ctx, &ips);
TALLOC_FREE(frame);
return 0;
}
/*
* This includes all node and/or public ips
* of the whole cluster.
*
* node ips have:
* - a valid pinned_pnn value.
* - current_pnn is valid if the node is healthy
*
* public ips have:
* - pinned_pnn as CTDB_UNKNOWN_PNN
* - current_pnn is valid if a node healthy and hosting this ip.
*/
int ctdbd_all_ip_foreach(struct ctdbd_connection *conn,
bool include_node_ips,
bool include_public_ips,
int (*cb)(uint32_t total_ip_count,
const struct sockaddr_storage *ip,
uint32_t pinned_pnn,
uint32_t current_pnn,
void *private_data),
void *private_data)
{
TALLOC_CTX *frame = talloc_stackframe();
struct ctdb_node_map_old *nodemap = NULL;
struct ctdb_public_ip_list_old *ips = NULL;
int ret = ENOMEM;
uint32_t total_ip_count = 0;
uint32_t i;
ret = ctdbd_control_get_nodemap(conn, frame, &nodemap);
if (ret != 0) {
DBG_WARNING("ctdbd_control_get_nodemap() failed: %s\n", strerror(ret));
TALLOC_FREE(frame);
return -1;
}
for (i=0; include_node_ips && i < nodemap->num; i++) {
const struct ctdb_node_and_flags *n = &nodemap->nodes[i];
if (n->flags & NODE_FLAGS_DELETED) {
continue;
}
total_ip_count += 1;
}
if (include_public_ips) {
ret = ctdbd_control_get_all_public_ips(conn, nodemap,
frame, &ips);
if (ret < 0) {
ret = EIO;
goto out_free;
}
total_ip_count += ips->num;
}
for (i=0; include_node_ips && i < nodemap->num; i++) {
const struct ctdb_node_and_flags *n = &nodemap->nodes[i];
struct samba_sockaddr tmp = ctdbd_sock_addr_to_samba(&n->addr);
uint32_t pinned_pnn = n->pnn;
uint32_t current_pnn = n->pnn;
if (n->flags & NODE_FLAGS_DELETED) {
continue;
}
if (n->flags & (NODE_FLAGS_INACTIVE|NODE_FLAGS_DISABLED)) {
/*
* The ip address is not available
* unless the node is up and
* healthy.
*/
current_pnn = CTDB_UNKNOWN_PNN;
}
ret = cb(total_ip_count,
&tmp.u.ss,
pinned_pnn,
current_pnn,
private_data);
if (ret != 0) {
goto out_free;
}
}
for (i=0; include_public_ips && i < ips->num; i++) {
const ctdb_sock_addr *addr = &ips->ips[i].addr;
struct samba_sockaddr tmp = ctdbd_sock_addr_to_samba(addr);
/* all ctdb public ips are movable and not pinned */
uint32_t pinned_pnn = CTDB_UNKNOWN_PNN;
uint32_t current_pnn = ips->ips[i].pnn;
uint32_t ni;
for (ni=0; ni < nodemap->num; ni++) {
const struct ctdb_node_and_flags *n = &nodemap->nodes[ni];
if (n->pnn != current_pnn) {
continue;
}
if (n->flags & (NODE_FLAGS_INACTIVE|NODE_FLAGS_DISABLED)) {
current_pnn = CTDB_UNKNOWN_PNN;
}
break;
}
ret = cb(total_ip_count,
&tmp.u.ss,
pinned_pnn,
current_pnn,
private_data);
if (ret != 0) {
goto out_free;
}
}
ret = 0;
out_free:
TALLOC_FREE(frame);
return ret;
}
/*
call a control on the local node
*/
int ctdbd_control_local(struct ctdbd_connection *conn, uint32_t opcode,
uint64_t srvid, uint32_t flags, TDB_DATA data,
TALLOC_CTX *mem_ctx, TDB_DATA *outdata,
int32_t *cstatus)
{
return ctdbd_control(conn, CTDB_CURRENT_NODE, opcode, srvid, flags, data,
mem_ctx, outdata, cstatus);
}
int ctdb_watch_us(struct ctdbd_connection *conn)
{
struct ctdb_notify_data_old reg_data;
size_t struct_len;
int ret;
int32_t cstatus;
reg_data.srvid = CTDB_SRVID_SAMBA_NOTIFY;
reg_data.len = 1;
reg_data.notify_data[0] = 0;
struct_len = offsetof(struct ctdb_notify_data_old,
notify_data) + reg_data.len;
ret = ctdbd_control_local(
conn, CTDB_CONTROL_REGISTER_NOTIFY, conn->rand_srvid, 0,
make_tdb_data((uint8_t *)®_data, struct_len),
NULL, NULL, &cstatus);
if (ret != 0) {
DEBUG(1, ("ctdbd_control_local failed: %s\n",
strerror(ret)));
}
return ret;
}
int ctdb_unwatch(struct ctdbd_connection *conn)
{
uint64_t srvid = CTDB_SRVID_SAMBA_NOTIFY;
int ret;
int32_t cstatus;
ret = ctdbd_control_local(
conn, CTDB_CONTROL_DEREGISTER_NOTIFY, conn->rand_srvid, 0,
make_tdb_data((uint8_t *)&srvid, sizeof(srvid)),
NULL, NULL, &cstatus);
if (ret != 0) {
DEBUG(1, ("ctdbd_control_local failed: %s\n",
strerror(ret)));
}
return ret;
}
int ctdbd_probe(const char *sockname, int timeout)
{
/*
* Do a very early check if ctdbd is around to avoid an abort and core
* later
*/
struct ctdbd_connection *conn = NULL;
int ret;
ret = ctdbd_init_connection(talloc_tos(), sockname, timeout,
&conn);
/*
* We only care if we can connect.
*/
TALLOC_FREE(conn);
return ret;
}
static int ctdbd_connection_destructor(struct ctdbd_connection *c)
{
if (c->fd != -1) {
close(c->fd);
c->fd = -1;
}
return 0;
}
void ctdbd_prep_hdr_next_reqid(
struct ctdbd_connection *conn, struct ctdb_req_header *hdr)
{
*hdr = (struct ctdb_req_header) {
.ctdb_magic = CTDB_MAGIC,
.ctdb_version = CTDB_PROTOCOL,
.reqid = ctdbd_next_reqid(conn),
.destnode = CTDB_CURRENT_NODE,
};
}
struct ctdbd_pkt_read_state {
uint8_t *pkt;
};
static ssize_t ctdbd_pkt_read_more(
uint8_t *buf, size_t buflen, void *private_data);
static void ctdbd_pkt_read_done(struct tevent_req *subreq);
static struct tevent_req *ctdbd_pkt_read_send(
TALLOC_CTX *mem_ctx, struct tevent_context *ev, int fd)
{
struct tevent_req *req = NULL, *subreq = NULL;
struct ctdbd_pkt_read_state *state = NULL;
req = tevent_req_create(mem_ctx, &state, struct ctdbd_pkt_read_state);
if (req == NULL) {
return NULL;
}
subreq = read_packet_send(state, ev, fd, 4, ctdbd_pkt_read_more, NULL);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
}
tevent_req_set_callback(subreq, ctdbd_pkt_read_done, req);
return req;
}
static ssize_t ctdbd_pkt_read_more(
uint8_t *buf, size_t buflen, void *private_data)
{
uint32_t msglen;
if (buflen < 4) {
return -1;
}
if (buflen > 4) {
return 0; /* Been here, done */
}
memcpy(&msglen, buf, 4);
if (msglen < sizeof(struct ctdb_req_header)) {
return -1;
}
return msglen - sizeof(msglen);
}
static void ctdbd_pkt_read_done(struct tevent_req *subreq)
{
struct tevent_req *req = tevent_req_callback_data(
subreq, struct tevent_req);
struct ctdbd_pkt_read_state *state = tevent_req_data(
req, struct ctdbd_pkt_read_state);
ssize_t nread;
int err;
nread = read_packet_recv(subreq, state, &state->pkt, &err);
TALLOC_FREE(subreq);
if (nread == -1) {
tevent_req_error(req, err);
return;
}
tevent_req_done(req);
}
static int ctdbd_pkt_read_recv(
struct tevent_req *req, TALLOC_CTX *mem_ctx, uint8_t **pkt)
{
struct ctdbd_pkt_read_state *state = tevent_req_data(
req, struct ctdbd_pkt_read_state);
int err;
if (tevent_req_is_unix_error(req, &err)) {
return err;
}
*pkt = talloc_move(mem_ctx, &state->pkt);
tevent_req_received(req);
return 0;
}
static bool ctdbd_conn_receive_next(struct ctdbd_connection *conn);
static void ctdbd_conn_received(struct tevent_req *subreq);
struct ctdbd_req_state {
struct ctdbd_connection *conn;
struct tevent_context *ev;
uint32_t reqid;
struct ctdb_req_header *reply;
};
static void ctdbd_req_unset_pending(struct tevent_req *req)
{
struct ctdbd_req_state *state = tevent_req_data(
req, struct ctdbd_req_state);
struct ctdbd_connection *conn = state->conn;
size_t num_pending = talloc_array_length(conn->pending);
size_t i, num_after;
tevent_req_set_cleanup_fn(req, NULL);
if (num_pending == 1) {
/*
* conn->read_req is a child of conn->pending
*/
TALLOC_FREE(conn->pending);
conn->read_req = NULL;
return;
}
for (i=0; ipending[i]) {
break;
}
}
if (i == num_pending) {
/*
* Something's seriously broken. Just returning here is the
* right thing nevertheless, the point of this routine is to
* remove ourselves from conn->pending.
*/
return;
}
num_after = num_pending - i - 1;
if (num_after > 0) {
memmove(&conn->pending[i],
&conn->pending[i] + 1,
sizeof(*conn->pending) * num_after);
}
conn->pending = talloc_realloc(
NULL, conn->pending, struct tevent_req *, num_pending - 1);
}
static void ctdbd_req_cleanup(
struct tevent_req *req, enum tevent_req_state req_state)
{
ctdbd_req_unset_pending(req);
}
static bool ctdbd_req_set_pending(struct tevent_req *req)
{
struct ctdbd_req_state *state = tevent_req_data(
req, struct ctdbd_req_state);
struct ctdbd_connection *conn = state->conn;
struct tevent_req **pending = NULL;
size_t num_pending = talloc_array_length(conn->pending);
bool ok;
pending = talloc_realloc(
conn, conn->pending, struct tevent_req *, num_pending + 1);
if (pending == NULL) {
return false;
}
pending[num_pending] = req;
conn->pending = pending;
tevent_req_set_cleanup_fn(req, ctdbd_req_cleanup);
ok = ctdbd_conn_receive_next(conn);
if (!ok) {
ctdbd_req_unset_pending(req);
return false;
}
return true;
}
static bool ctdbd_conn_receive_next(struct ctdbd_connection *conn)
{
size_t num_pending = talloc_array_length(conn->pending);
struct tevent_req *req = NULL;
struct ctdbd_req_state *state = NULL;
if (conn->read_req != NULL) {
return true;
}
if (num_pending == 0) {
/*
* done for now
*/
return true;
}
req = conn->pending[0];
state = tevent_req_data(req, struct ctdbd_req_state);
conn->read_req = ctdbd_pkt_read_send(
conn->pending, state->ev, conn->fd);
if (conn->read_req == NULL) {
return false;
}
tevent_req_set_callback(conn->read_req, ctdbd_conn_received, conn);
return true;
}
static void ctdbd_conn_received(struct tevent_req *subreq)
{
struct ctdbd_connection *conn = tevent_req_callback_data(
subreq, struct ctdbd_connection);
TALLOC_CTX *frame = talloc_stackframe();
uint8_t *pkt = NULL;
int ret;
struct ctdb_req_header *hdr = NULL;
uint32_t reqid;
struct tevent_req *req = NULL;
struct ctdbd_req_state *state = NULL;
size_t i, num_pending;
bool ok;
SMB_ASSERT(subreq == conn->read_req);
conn->read_req = NULL;
ret = ctdbd_pkt_read_recv(subreq, frame, &pkt);
TALLOC_FREE(subreq);
if (ret != 0) {
cluster_fatal("ctdbd_pkt_read failed\n");
}
hdr = (struct ctdb_req_header *)pkt;
reqid = hdr->reqid;
num_pending = talloc_array_length(conn->pending);
for (i=0; ipending[i];
state = tevent_req_data(req, struct ctdbd_req_state);
if (state->reqid == reqid) {
break;
}
}
if (i == num_pending) {
/* not found */
TALLOC_FREE(frame);
return;
}
state->reply = talloc_move(state, &hdr);
tevent_req_defer_callback(req, state->ev);
tevent_req_done(req);
TALLOC_FREE(frame);
ok = ctdbd_conn_receive_next(conn);
if (!ok) {
cluster_fatal("ctdbd_conn_receive_next failed\n");
}
}
static void ctdbd_req_written(struct tevent_req *subreq);
struct tevent_req *ctdbd_req_send(
TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct ctdbd_connection *conn,
struct iovec *iov,
size_t num_iov)
{
struct tevent_req *req = NULL, *subreq = NULL;
struct ctdbd_req_state *state = NULL;
struct ctdb_req_header *hdr = NULL;
bool ok;
req = tevent_req_create(mem_ctx, &state, struct ctdbd_req_state);
if (req == NULL) {
return NULL;
}
state->conn = conn;
state->ev = ev;
if ((num_iov == 0) ||
(iov[0].iov_len < sizeof(struct ctdb_req_header))) {
tevent_req_error(req, EINVAL);
return tevent_req_post(req, ev);
}
hdr = iov[0].iov_base;
state->reqid = hdr->reqid;
ok = ctdbd_req_set_pending(req);
if (!ok) {
tevent_req_oom(req);
return tevent_req_post(req, ev);
}
subreq = writev_send(
state, ev, conn->outgoing, conn->fd, false, iov, num_iov);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
}
tevent_req_set_callback(subreq, ctdbd_req_written, req);
return req;
}
static void ctdbd_req_written(struct tevent_req *subreq)
{
struct tevent_req *req = tevent_req_callback_data(
subreq, struct tevent_req);
ssize_t nwritten;
int err;
nwritten = writev_recv(subreq, &err);
TALLOC_FREE(subreq);
if (nwritten == -1) {
tevent_req_error(req, err);
return;
}
}
int ctdbd_req_recv(
struct tevent_req *req,
TALLOC_CTX *mem_ctx,
struct ctdb_req_header **reply)
{
struct ctdbd_req_state *state = tevent_req_data(
req, struct ctdbd_req_state);
int err;
if (tevent_req_is_unix_error(req, &err)) {
return err;
}
*reply = talloc_move(mem_ctx, &state->reply);
tevent_req_received(req);
return 0;
}
struct ctdbd_parse_state {
struct tevent_context *ev;
struct ctdbd_connection *conn;
uint32_t reqid;
TDB_DATA key;
uint8_t _keybuf[64];
struct ctdb_req_call_old ctdb_req;
struct iovec iov[2];
void (*parser)(TDB_DATA key,
TDB_DATA data,
void *private_data);
void *private_data;
};
static void ctdbd_parse_done(struct tevent_req *subreq);
struct tevent_req *ctdbd_parse_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct ctdbd_connection *conn,
uint32_t db_id,
TDB_DATA key,
bool local_copy,
void (*parser)(TDB_DATA key,
TDB_DATA data,
void *private_data),
void *private_data,
enum dbwrap_req_state *req_state)
{
struct tevent_req *req = NULL;
struct ctdbd_parse_state *state = NULL;
uint32_t flags;
uint32_t packet_length;
struct tevent_req *subreq = NULL;
req = tevent_req_create(mem_ctx, &state, struct ctdbd_parse_state);
if (req == NULL) {
*req_state = DBWRAP_REQ_ERROR;
return NULL;
}
*req_state = DBWRAP_REQ_DISPATCHED;
*state = (struct ctdbd_parse_state) {
.ev = ev,
.conn = conn,
.reqid = ctdbd_next_reqid(conn),
.parser = parser,
.private_data = private_data,
};
flags = local_copy ? CTDB_WANT_READONLY : 0;
packet_length = offsetof(struct ctdb_req_call_old, data) + key.dsize;
/*
* Copy the key into our state, as ctdb_pkt_send_cleanup() requires that
* all passed iov elements have a lifetime longer that the tevent_req
* returned by ctdb_pkt_send_send(). This is required continue sending a
* the low level request into the ctdb socket, if a higher level
* ('this') request is canceled (or talloc free'd) by the application
* layer, without sending invalid packets to ctdb.
*/
if (key.dsize > sizeof(state->_keybuf)) {
state->key.dptr = talloc_memdup(state, key.dptr, key.dsize);
if (tevent_req_nomem(state->key.dptr, req)) {
return tevent_req_post(req, ev);
}
} else {
memcpy(state->_keybuf, key.dptr, key.dsize);
state->key.dptr = state->_keybuf;
}
state->key.dsize = key.dsize;
state->ctdb_req.hdr.length = packet_length;
state->ctdb_req.hdr.ctdb_magic = CTDB_MAGIC;
state->ctdb_req.hdr.ctdb_version = CTDB_PROTOCOL;
state->ctdb_req.hdr.operation = CTDB_REQ_CALL;
state->ctdb_req.hdr.reqid = state->reqid;
state->ctdb_req.flags = flags;
state->ctdb_req.callid = CTDB_FETCH_FUNC;
state->ctdb_req.db_id = db_id;
state->ctdb_req.keylen = state->key.dsize;
state->iov[0].iov_base = &state->ctdb_req;
state->iov[0].iov_len = offsetof(struct ctdb_req_call_old, data);
state->iov[1].iov_base = state->key.dptr;
state->iov[1].iov_len = state->key.dsize;
subreq = ctdbd_req_send(
state, ev, conn, state->iov, ARRAY_SIZE(state->iov));
if (tevent_req_nomem(subreq, req)) {
*req_state = DBWRAP_REQ_ERROR;
return tevent_req_post(req, ev);
}
tevent_req_set_callback(subreq, ctdbd_parse_done, req);
return req;
}
static void ctdbd_parse_done(struct tevent_req *subreq)
{
struct tevent_req *req = tevent_req_callback_data(
subreq, struct tevent_req);
struct ctdbd_parse_state *state = tevent_req_data(
req, struct ctdbd_parse_state);
struct ctdb_req_header *hdr = NULL;
struct ctdb_reply_call_old *reply = NULL;
int ret;
ret = ctdbd_req_recv(subreq, state, &hdr);
TALLOC_FREE(subreq);
if (tevent_req_error(req, ret)) {
DBG_DEBUG("ctdb_req_recv failed %s\n", strerror(ret));
return;
}
SMB_ASSERT(hdr != NULL);
if (hdr->operation != CTDB_REPLY_CALL) {
DBG_ERR("received invalid reply\n");
ctdb_packet_dump(hdr);
tevent_req_error(req, EIO);
return;
}
reply = (struct ctdb_reply_call_old *)hdr;
if (reply->datalen == 0) {
/*
* Treat an empty record as non-existing
*/
tevent_req_error(req, ENOENT);
return;
}
state->parser(state->key,
make_tdb_data(&reply->data[0], reply->datalen),
state->private_data);
tevent_req_done(req);
return;
}
int ctdbd_parse_recv(struct tevent_req *req)
{
return tevent_req_simple_recv_unix(req);
}