4 Copyright (C) Andrew Tridgell 2006
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, see <http://www.gnu.org/licenses/>.
22 #include "lib/tdb/include/tdb.h"
23 #include "lib/events/events.h"
24 #include "lib/util/dlinklist.h"
25 #include "system/network.h"
26 #include "system/filesys.h"
27 #include "system/wait.h"
28 #include "../include/ctdb.h"
29 #include "../include/ctdb_private.h"
30 #include <sys/socket.h>
32 static void daemon_incoming_packet(void *, struct ctdb_req_header *);
35 static void print_exit_message(void)
37 DEBUG(DEBUG_NOTICE,("CTDB daemon shutting down\n"));
41 /* called when the "startup" event script has finished */
42 static void ctdb_start_transport(struct ctdb_context *ctdb)
44 if (ctdb->methods == NULL) {
45 DEBUG(DEBUG_ALERT,(__location__ " startup event finished but transport is DOWN.\n"));
46 ctdb_fatal(ctdb, "transport is not initialized but startup completed");
49 /* start the transport running */
50 if (ctdb->methods->start(ctdb) != 0) {
51 DEBUG(DEBUG_ALERT,("transport failed to start!\n"));
52 ctdb_fatal(ctdb, "transport failed to start");
55 /* start the recovery daemon process */
56 if (ctdb_start_recoverd(ctdb) != 0) {
57 DEBUG(DEBUG_ALERT,("Failed to start recovery daemon\n"));
61 /* Make sure we log something when the daemon terminates */
62 atexit(print_exit_message);
64 /* start monitoring for connected/disconnected nodes */
65 ctdb_start_keepalive(ctdb);
67 /* start monitoring for node health */
68 ctdb_start_monitoring(ctdb);
70 /* start periodic update of tcp tickle lists */
71 ctdb_start_tcp_tickle_update(ctdb);
73 /* start listening for recovery daemon pings */
74 ctdb_control_recd_ping(ctdb);
77 static void block_signal(int signum)
81 memset(&act, 0, sizeof(act));
83 act.sa_handler = SIG_IGN;
84 sigemptyset(&act.sa_mask);
85 sigaddset(&act.sa_mask, signum);
86 sigaction(signum, &act, NULL);
91 send a packet to a client
93 static int daemon_queue_send(struct ctdb_client *client, struct ctdb_req_header *hdr)
95 client->ctdb->statistics.client_packets_sent++;
96 if (hdr->operation == CTDB_REQ_MESSAGE) {
97 if (ctdb_queue_length(client->queue) > client->ctdb->tunable.max_queue_depth_drop_msg) {
98 DEBUG(DEBUG_ERR,("Drop CTDB_REQ_MESSAGE to client. Queue full.\n"));
102 return ctdb_queue_send(client->queue, (uint8_t *)hdr, hdr->length);
106 message handler for when we are in daemon mode. This redirects the message
109 static void daemon_message_handler(struct ctdb_context *ctdb, uint64_t srvid,
110 TDB_DATA data, void *private_data)
112 struct ctdb_client *client = talloc_get_type(private_data, struct ctdb_client);
113 struct ctdb_req_message *r;
116 /* construct a message to send to the client containing the data */
117 len = offsetof(struct ctdb_req_message, data) + data.dsize;
118 r = ctdbd_allocate_pkt(ctdb, ctdb, CTDB_REQ_MESSAGE,
119 len, struct ctdb_req_message);
120 CTDB_NO_MEMORY_VOID(ctdb, r);
122 talloc_set_name_const(r, "req_message packet");
125 r->datalen = data.dsize;
126 memcpy(&r->data[0], data.dptr, data.dsize);
128 daemon_queue_send(client, &r->hdr);
135 this is called when the ctdb daemon received a ctdb request to
136 set the srvid from the client
138 int daemon_register_message_handler(struct ctdb_context *ctdb, uint32_t client_id, uint64_t srvid)
140 struct ctdb_client *client = ctdb_reqid_find(ctdb, client_id, struct ctdb_client);
142 if (client == NULL) {
143 DEBUG(DEBUG_ERR,("Bad client_id in daemon_request_register_message_handler\n"));
146 res = ctdb_register_message_handler(ctdb, client, srvid, daemon_message_handler, client);
148 DEBUG(DEBUG_ERR,(__location__ " Failed to register handler %llu in daemon\n",
149 (unsigned long long)srvid));
151 DEBUG(DEBUG_INFO,(__location__ " Registered message handler for srvid=%llu\n",
152 (unsigned long long)srvid));
155 /* this is a hack for Samba - we now know the pid of the Samba client */
156 if ((srvid & 0xFFFFFFFF) == srvid &&
157 kill(srvid, 0) == 0) {
159 DEBUG(DEBUG_INFO,(__location__ " Registered PID %u for client %u\n",
160 (unsigned)client->pid, client_id));
166 this is called when the ctdb daemon received a ctdb request to
167 remove a srvid from the client
169 int daemon_deregister_message_handler(struct ctdb_context *ctdb, uint32_t client_id, uint64_t srvid)
171 struct ctdb_client *client = ctdb_reqid_find(ctdb, client_id, struct ctdb_client);
172 if (client == NULL) {
173 DEBUG(DEBUG_ERR,("Bad client_id in daemon_request_deregister_message_handler\n"));
176 return ctdb_deregister_message_handler(ctdb, srvid, client);
181 destroy a ctdb_client
183 static int ctdb_client_destructor(struct ctdb_client *client)
185 struct ctdb_db_context *ctdb_db;
187 ctdb_takeover_client_destructor_hook(client);
188 ctdb_reqid_remove(client->ctdb, client->client_id);
189 if (client->ctdb->statistics.num_clients) {
190 client->ctdb->statistics.num_clients--;
193 if (client->num_persistent_updates != 0) {
194 DEBUG(DEBUG_ERR,(__location__ " Client disconnecting with %u persistent updates in flight. Starting recovery\n", client->num_persistent_updates));
195 client->ctdb->recovery_mode = CTDB_RECOVERY_ACTIVE;
197 ctdb_db = find_ctdb_db(client->ctdb, client->db_id);
199 DEBUG(DEBUG_ERR, (__location__ " client exit while transaction "
200 "commit active. Forcing recovery.\n"));
201 client->ctdb->recovery_mode = CTDB_RECOVERY_ACTIVE;
202 ctdb_db->transaction_active = false;
210 this is called when the ctdb daemon received a ctdb request message
211 from a local client over the unix domain socket
213 static void daemon_request_message_from_client(struct ctdb_client *client,
214 struct ctdb_req_message *c)
219 /* maybe the message is for another client on this node */
220 if (ctdb_get_pnn(client->ctdb)==c->hdr.destnode) {
221 ctdb_request_message(client->ctdb, (struct ctdb_req_header *)c);
225 /* its for a remote node */
226 data.dptr = &c->data[0];
227 data.dsize = c->datalen;
228 res = ctdb_daemon_send_message(client->ctdb, c->hdr.destnode,
231 DEBUG(DEBUG_ERR,(__location__ " Failed to send message to remote node %u\n",
237 struct daemon_call_state {
238 struct ctdb_client *client;
240 struct ctdb_call *call;
241 struct timeval start_time;
245 complete a call from a client
247 static void daemon_call_from_client_callback(struct ctdb_call_state *state)
249 struct daemon_call_state *dstate = talloc_get_type(state->async.private_data,
250 struct daemon_call_state);
251 struct ctdb_reply_call *r;
254 struct ctdb_client *client = dstate->client;
255 struct ctdb_db_context *ctdb_db = state->ctdb_db;
257 talloc_steal(client, dstate);
258 talloc_steal(dstate, dstate->call);
260 res = ctdb_daemon_call_recv(state, dstate->call);
262 DEBUG(DEBUG_ERR, (__location__ " ctdbd_call_recv() returned error\n"));
263 if (client->ctdb->statistics.pending_calls > 0) {
264 client->ctdb->statistics.pending_calls--;
266 ctdb_latency(ctdb_db, "call_from_client_cb 1", &client->ctdb->statistics.max_call_latency, dstate->start_time);
270 length = offsetof(struct ctdb_reply_call, data) + dstate->call->reply_data.dsize;
271 r = ctdbd_allocate_pkt(client->ctdb, dstate, CTDB_REPLY_CALL,
272 length, struct ctdb_reply_call);
274 DEBUG(DEBUG_ERR, (__location__ " Failed to allocate reply_call in ctdb daemon\n"));
275 if (client->ctdb->statistics.pending_calls > 0) {
276 client->ctdb->statistics.pending_calls--;
278 ctdb_latency(ctdb_db, "call_from_client_cb 2", &client->ctdb->statistics.max_call_latency, dstate->start_time);
281 r->hdr.reqid = dstate->reqid;
282 r->datalen = dstate->call->reply_data.dsize;
283 memcpy(&r->data[0], dstate->call->reply_data.dptr, r->datalen);
285 res = daemon_queue_send(client, &r->hdr);
287 DEBUG(DEBUG_ERR, (__location__ " Failed to queue packet from daemon to client\n"));
289 ctdb_latency(ctdb_db, "call_from_client_cb 3", &client->ctdb->statistics.max_call_latency, dstate->start_time);
291 if (client->ctdb->statistics.pending_calls > 0) {
292 client->ctdb->statistics.pending_calls--;
296 struct ctdb_daemon_packet_wrap {
297 struct ctdb_context *ctdb;
302 a wrapper to catch disconnected clients
304 static void daemon_incoming_packet_wrap(void *p, struct ctdb_req_header *hdr)
306 struct ctdb_client *client;
307 struct ctdb_daemon_packet_wrap *w = talloc_get_type(p,
308 struct ctdb_daemon_packet_wrap);
310 DEBUG(DEBUG_CRIT,(__location__ " Bad packet type '%s'\n", talloc_get_name(p)));
314 client = ctdb_reqid_find(w->ctdb, w->client_id, struct ctdb_client);
315 if (client == NULL) {
316 DEBUG(DEBUG_ERR,(__location__ " Packet for disconnected client %u\n",
324 daemon_incoming_packet(client, hdr);
329 this is called when the ctdb daemon received a ctdb request call
330 from a local client over the unix domain socket
332 static void daemon_request_call_from_client(struct ctdb_client *client,
333 struct ctdb_req_call *c)
335 struct ctdb_call_state *state;
336 struct ctdb_db_context *ctdb_db;
337 struct daemon_call_state *dstate;
338 struct ctdb_call *call;
339 struct ctdb_ltdb_header header;
342 struct ctdb_context *ctdb = client->ctdb;
343 struct ctdb_daemon_packet_wrap *w;
345 ctdb->statistics.total_calls++;
346 if (client->ctdb->statistics.pending_calls > 0) {
347 ctdb->statistics.pending_calls++;
350 ctdb_db = find_ctdb_db(client->ctdb, c->db_id);
352 DEBUG(DEBUG_ERR, (__location__ " Unknown database in request. db_id==0x%08x",
354 if (client->ctdb->statistics.pending_calls > 0) {
355 ctdb->statistics.pending_calls--;
361 key.dsize = c->keylen;
363 w = talloc(ctdb, struct ctdb_daemon_packet_wrap);
364 CTDB_NO_MEMORY_VOID(ctdb, w);
367 w->client_id = client->client_id;
369 ret = ctdb_ltdb_lock_fetch_requeue(ctdb_db, key, &header,
370 (struct ctdb_req_header *)c, &data,
371 daemon_incoming_packet_wrap, w, True);
373 /* will retry later */
374 if (client->ctdb->statistics.pending_calls > 0) {
375 ctdb->statistics.pending_calls--;
383 DEBUG(DEBUG_ERR,(__location__ " Unable to fetch record\n"));
384 if (client->ctdb->statistics.pending_calls > 0) {
385 ctdb->statistics.pending_calls--;
390 dstate = talloc(client, struct daemon_call_state);
391 if (dstate == NULL) {
392 ctdb_ltdb_unlock(ctdb_db, key);
393 DEBUG(DEBUG_ERR,(__location__ " Unable to allocate dstate\n"));
394 if (client->ctdb->statistics.pending_calls > 0) {
395 ctdb->statistics.pending_calls--;
399 dstate->start_time = timeval_current();
400 dstate->client = client;
401 dstate->reqid = c->hdr.reqid;
402 talloc_steal(dstate, data.dptr);
404 call = dstate->call = talloc_zero(dstate, struct ctdb_call);
406 ctdb_ltdb_unlock(ctdb_db, key);
407 DEBUG(DEBUG_ERR,(__location__ " Unable to allocate call\n"));
408 if (client->ctdb->statistics.pending_calls > 0) {
409 ctdb->statistics.pending_calls--;
411 ctdb_latency(ctdb_db, "call_from_client 1", &ctdb->statistics.max_call_latency, dstate->start_time);
415 call->call_id = c->callid;
417 call->call_data.dptr = c->data + c->keylen;
418 call->call_data.dsize = c->calldatalen;
419 call->flags = c->flags;
421 if (header.dmaster == ctdb->pnn) {
422 state = ctdb_call_local_send(ctdb_db, call, &header, &data);
424 state = ctdb_daemon_call_send_remote(ctdb_db, call, &header);
427 ctdb_ltdb_unlock(ctdb_db, key);
430 DEBUG(DEBUG_ERR,(__location__ " Unable to setup call send\n"));
431 if (client->ctdb->statistics.pending_calls > 0) {
432 ctdb->statistics.pending_calls--;
434 ctdb_latency(ctdb_db, "call_from_client 2", &ctdb->statistics.max_call_latency, dstate->start_time);
437 talloc_steal(state, dstate);
438 talloc_steal(client, state);
440 state->async.fn = daemon_call_from_client_callback;
441 state->async.private_data = dstate;
445 static void daemon_request_control_from_client(struct ctdb_client *client,
446 struct ctdb_req_control *c);
448 /* data contains a packet from the client */
449 static void daemon_incoming_packet(void *p, struct ctdb_req_header *hdr)
451 struct ctdb_client *client = talloc_get_type(p, struct ctdb_client);
453 struct ctdb_context *ctdb = client->ctdb;
455 /* place the packet as a child of a tmp_ctx. We then use
456 talloc_free() below to free it. If any of the calls want
457 to keep it, then they will steal it somewhere else, and the
458 talloc_free() will be a no-op */
459 tmp_ctx = talloc_new(client);
460 talloc_steal(tmp_ctx, hdr);
462 if (hdr->ctdb_magic != CTDB_MAGIC) {
463 ctdb_set_error(client->ctdb, "Non CTDB packet rejected in daemon\n");
467 if (hdr->ctdb_version != CTDB_VERSION) {
468 ctdb_set_error(client->ctdb, "Bad CTDB version 0x%x rejected in daemon\n", hdr->ctdb_version);
472 switch (hdr->operation) {
474 ctdb->statistics.client.req_call++;
475 daemon_request_call_from_client(client, (struct ctdb_req_call *)hdr);
478 case CTDB_REQ_MESSAGE:
479 ctdb->statistics.client.req_message++;
480 daemon_request_message_from_client(client, (struct ctdb_req_message *)hdr);
483 case CTDB_REQ_CONTROL:
484 ctdb->statistics.client.req_control++;
485 daemon_request_control_from_client(client, (struct ctdb_req_control *)hdr);
489 DEBUG(DEBUG_CRIT,(__location__ " daemon: unrecognized operation %u\n",
494 talloc_free(tmp_ctx);
498 called when the daemon gets a incoming packet
500 static void ctdb_daemon_read_cb(uint8_t *data, size_t cnt, void *args)
502 struct ctdb_client *client = talloc_get_type(args, struct ctdb_client);
503 struct ctdb_req_header *hdr;
510 client->ctdb->statistics.client_packets_recv++;
512 if (cnt < sizeof(*hdr)) {
513 ctdb_set_error(client->ctdb, "Bad packet length %u in daemon\n",
517 hdr = (struct ctdb_req_header *)data;
518 if (cnt != hdr->length) {
519 ctdb_set_error(client->ctdb, "Bad header length %u expected %u\n in daemon",
520 (unsigned)hdr->length, (unsigned)cnt);
524 if (hdr->ctdb_magic != CTDB_MAGIC) {
525 ctdb_set_error(client->ctdb, "Non CTDB packet rejected\n");
529 if (hdr->ctdb_version != CTDB_VERSION) {
530 ctdb_set_error(client->ctdb, "Bad CTDB version 0x%x rejected in daemon\n", hdr->ctdb_version);
534 DEBUG(DEBUG_DEBUG,(__location__ " client request %u of type %u length %u from "
535 "node %u to %u\n", hdr->reqid, hdr->operation, hdr->length,
536 hdr->srcnode, hdr->destnode));
538 /* it is the responsibility of the incoming packet function to free 'data' */
539 daemon_incoming_packet(client, hdr);
542 static void ctdb_accept_client(struct event_context *ev, struct fd_event *fde,
543 uint16_t flags, void *private_data)
545 struct sockaddr_un addr;
548 struct ctdb_context *ctdb = talloc_get_type(private_data, struct ctdb_context);
549 struct ctdb_client *client;
551 struct peercred_struct cr;
552 socklen_t crl = sizeof(struct peercred_struct);
555 socklen_t crl = sizeof(struct ucred);
558 memset(&addr, 0, sizeof(addr));
560 fd = accept(ctdb->daemon.sd, (struct sockaddr *)&addr, &len);
566 set_close_on_exec(fd);
568 DEBUG(DEBUG_DEBUG,(__location__ " Created SOCKET FD:%d to connected child\n", fd));
570 client = talloc_zero(ctdb, struct ctdb_client);
572 if (getsockopt(fd, SOL_SOCKET, SO_PEERID, &cr, &crl) == 0) {
574 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &cr, &crl) == 0) {
576 talloc_asprintf(client, "struct ctdb_client: pid:%u", (unsigned)cr.pid);
581 client->client_id = ctdb_reqid_new(ctdb, client);
582 ctdb->statistics.num_clients++;
584 client->queue = ctdb_queue_setup(ctdb, client, fd, CTDB_DS_ALIGNMENT,
585 ctdb_daemon_read_cb, client);
587 talloc_set_destructor(client, ctdb_client_destructor);
593 create a unix domain socket and bind it
594 return a file descriptor open on the socket
596 static int ux_socket_bind(struct ctdb_context *ctdb)
598 struct sockaddr_un addr;
600 ctdb->daemon.sd = socket(AF_UNIX, SOCK_STREAM, 0);
601 if (ctdb->daemon.sd == -1) {
605 set_close_on_exec(ctdb->daemon.sd);
606 set_nonblocking(ctdb->daemon.sd);
608 memset(&addr, 0, sizeof(addr));
609 addr.sun_family = AF_UNIX;
610 strncpy(addr.sun_path, ctdb->daemon.name, sizeof(addr.sun_path));
612 if (bind(ctdb->daemon.sd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
613 DEBUG(DEBUG_CRIT,("Unable to bind on ctdb socket '%s'\n", ctdb->daemon.name));
617 if (chown(ctdb->daemon.name, geteuid(), getegid()) != 0 ||
618 chmod(ctdb->daemon.name, 0700) != 0) {
619 DEBUG(DEBUG_CRIT,("Unable to secure ctdb socket '%s', ctdb->daemon.name\n", ctdb->daemon.name));
624 if (listen(ctdb->daemon.sd, 100) != 0) {
625 DEBUG(DEBUG_CRIT,("Unable to listen on ctdb socket '%s'\n", ctdb->daemon.name));
632 close(ctdb->daemon.sd);
633 ctdb->daemon.sd = -1;
637 static void sig_child_handler(struct event_context *ev,
638 struct signal_event *se, int signum, int count,
642 // struct ctdb_context *ctdb = talloc_get_type(private_data, struct ctdb_context);
647 pid = waitpid(-1, &status, WNOHANG);
649 DEBUG(DEBUG_ERR, (__location__ " waitpid() returned error. errno:%d\n", errno));
653 DEBUG(DEBUG_DEBUG, ("SIGCHLD from %d\n", (int)pid));
659 start the protocol going as a daemon
661 int ctdb_start_daemon(struct ctdb_context *ctdb, bool do_fork)
664 struct fd_event *fde;
665 const char *domain_socket_name;
666 struct signal_event *se;
668 /* get rid of any old sockets */
669 unlink(ctdb->daemon.name);
671 /* create a unix domain stream socket to listen to */
672 res = ux_socket_bind(ctdb);
674 DEBUG(DEBUG_ALERT,(__location__ " Failed to open CTDB unix domain socket\n"));
678 if (do_fork && fork()) {
682 tdb_reopen_all(False);
687 if (open("/dev/null", O_RDONLY) != 0) {
688 DEBUG(DEBUG_ALERT,(__location__ " Failed to setup stdin on /dev/null\n"));
692 block_signal(SIGPIPE);
694 if (ctdb->do_setsched) {
695 /* try to set us up as realtime */
696 ctdb_set_scheduler(ctdb);
699 /* ensure the socket is deleted on exit of the daemon */
700 domain_socket_name = talloc_strdup(talloc_autofree_context(), ctdb->daemon.name);
701 if (domain_socket_name == NULL) {
702 DEBUG(DEBUG_ALERT,(__location__ " talloc_strdup failed.\n"));
706 ctdb->ev = event_context_init(NULL);
708 ctdb_set_child_logging(ctdb);
710 /* force initial recovery for election */
711 ctdb->recovery_mode = CTDB_RECOVERY_ACTIVE;
713 if (strcmp(ctdb->transport, "tcp") == 0) {
714 int ctdb_tcp_init(struct ctdb_context *);
715 ret = ctdb_tcp_init(ctdb);
717 #ifdef USE_INFINIBAND
718 if (strcmp(ctdb->transport, "ib") == 0) {
719 int ctdb_ibw_init(struct ctdb_context *);
720 ret = ctdb_ibw_init(ctdb);
724 DEBUG(DEBUG_ERR,("Failed to initialise transport '%s'\n", ctdb->transport));
728 if (ctdb->methods == NULL) {
729 DEBUG(DEBUG_ALERT,(__location__ " Can not initialize transport. ctdb->methods is NULL\n"));
730 ctdb_fatal(ctdb, "transport is unavailable. can not initialize.");
733 /* initialise the transport */
734 if (ctdb->methods->initialise(ctdb) != 0) {
735 ctdb_fatal(ctdb, "transport failed to initialise");
738 /* attach to any existing persistent databases */
739 if (ctdb_attach_persistent(ctdb) != 0) {
740 ctdb_fatal(ctdb, "Failed to attach to persistent databases\n");
743 /* start frozen, then let the first election sort things out */
744 if (ctdb_blocking_freeze(ctdb)) {
745 ctdb_fatal(ctdb, "Failed to get initial freeze\n");
748 /* now start accepting clients, only can do this once frozen */
749 fde = event_add_fd(ctdb->ev, ctdb, ctdb->daemon.sd,
750 EVENT_FD_READ|EVENT_FD_AUTOCLOSE,
751 ctdb_accept_client, ctdb);
753 /* tell all other nodes we've just started up */
754 ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_ALL,
755 0, CTDB_CONTROL_STARTUP, 0,
756 CTDB_CTRL_FLAG_NOREPLY,
757 tdb_null, NULL, NULL);
759 /* release any IPs we hold from previous runs of the daemon */
760 ctdb_release_all_ips(ctdb);
762 /* start the transport going */
763 ctdb_start_transport(ctdb);
765 /* set up a handler to pick up sigchld */
766 se = event_add_signal(ctdb->ev, ctdb,
771 DEBUG(DEBUG_CRIT,("Failed to set up signal handler for SIGCHLD\n"));
775 /* go into a wait loop to allow other nodes to complete */
776 event_loop_wait(ctdb->ev);
778 DEBUG(DEBUG_CRIT,("event_loop_wait() returned. this should not happen\n"));
783 allocate a packet for use in daemon<->daemon communication
785 struct ctdb_req_header *_ctdb_transport_allocate(struct ctdb_context *ctdb,
787 enum ctdb_operation operation,
788 size_t length, size_t slength,
792 struct ctdb_req_header *hdr;
794 length = MAX(length, slength);
795 size = (length+(CTDB_DS_ALIGNMENT-1)) & ~(CTDB_DS_ALIGNMENT-1);
797 if (ctdb->methods == NULL) {
798 DEBUG(DEBUG_ERR,(__location__ " Unable to allocate transport packet for operation %u of length %u. Transport is DOWN.\n",
799 operation, (unsigned)length));
803 hdr = (struct ctdb_req_header *)ctdb->methods->allocate_pkt(mem_ctx, size);
805 DEBUG(DEBUG_ERR,("Unable to allocate transport packet for operation %u of length %u\n",
806 operation, (unsigned)length));
809 talloc_set_name_const(hdr, type);
810 memset(hdr, 0, slength);
811 hdr->length = length;
812 hdr->operation = operation;
813 hdr->ctdb_magic = CTDB_MAGIC;
814 hdr->ctdb_version = CTDB_VERSION;
815 hdr->generation = ctdb->vnn_map->generation;
816 hdr->srcnode = ctdb->pnn;
821 struct daemon_control_state {
822 struct daemon_control_state *next, *prev;
823 struct ctdb_client *client;
824 struct ctdb_req_control *c;
826 struct ctdb_node *node;
830 callback when a control reply comes in
832 static void daemon_control_callback(struct ctdb_context *ctdb,
833 int32_t status, TDB_DATA data,
834 const char *errormsg,
837 struct daemon_control_state *state = talloc_get_type(private_data,
838 struct daemon_control_state);
839 struct ctdb_client *client = state->client;
840 struct ctdb_reply_control *r;
843 /* construct a message to send to the client containing the data */
844 len = offsetof(struct ctdb_reply_control, data) + data.dsize;
846 len += strlen(errormsg);
848 r = ctdbd_allocate_pkt(ctdb, state, CTDB_REPLY_CONTROL, len,
849 struct ctdb_reply_control);
850 CTDB_NO_MEMORY_VOID(ctdb, r);
852 r->hdr.reqid = state->reqid;
854 r->datalen = data.dsize;
856 memcpy(&r->data[0], data.dptr, data.dsize);
858 r->errorlen = strlen(errormsg);
859 memcpy(&r->data[r->datalen], errormsg, r->errorlen);
862 daemon_queue_send(client, &r->hdr);
868 fail all pending controls to a disconnected node
870 void ctdb_daemon_cancel_controls(struct ctdb_context *ctdb, struct ctdb_node *node)
872 struct daemon_control_state *state;
873 while ((state = node->pending_controls)) {
874 DLIST_REMOVE(node->pending_controls, state);
875 daemon_control_callback(ctdb, (uint32_t)-1, tdb_null,
876 "node is disconnected", state);
881 destroy a daemon_control_state
883 static int daemon_control_destructor(struct daemon_control_state *state)
886 DLIST_REMOVE(state->node->pending_controls, state);
892 this is called when the ctdb daemon received a ctdb request control
893 from a local client over the unix domain socket
895 static void daemon_request_control_from_client(struct ctdb_client *client,
896 struct ctdb_req_control *c)
900 struct daemon_control_state *state;
901 TALLOC_CTX *tmp_ctx = talloc_new(client);
903 if (c->hdr.destnode == CTDB_CURRENT_NODE) {
904 c->hdr.destnode = client->ctdb->pnn;
907 state = talloc(client, struct daemon_control_state);
908 CTDB_NO_MEMORY_VOID(client->ctdb, state);
910 state->client = client;
911 state->c = talloc_steal(state, c);
912 state->reqid = c->hdr.reqid;
913 if (ctdb_validate_pnn(client->ctdb, c->hdr.destnode)) {
914 state->node = client->ctdb->nodes[c->hdr.destnode];
915 DLIST_ADD(state->node->pending_controls, state);
920 talloc_set_destructor(state, daemon_control_destructor);
922 if (c->flags & CTDB_CTRL_FLAG_NOREPLY) {
923 talloc_steal(tmp_ctx, state);
926 data.dptr = &c->data[0];
927 data.dsize = c->datalen;
928 res = ctdb_daemon_send_control(client->ctdb, c->hdr.destnode,
929 c->srvid, c->opcode, client->client_id,
931 data, daemon_control_callback,
934 DEBUG(DEBUG_ERR,(__location__ " Failed to send control to remote node %u\n",
938 talloc_free(tmp_ctx);
942 register a call function
944 int ctdb_daemon_set_call(struct ctdb_context *ctdb, uint32_t db_id,
945 ctdb_fn_t fn, int id)
947 struct ctdb_registered_call *call;
948 struct ctdb_db_context *ctdb_db;
950 ctdb_db = find_ctdb_db(ctdb, db_id);
951 if (ctdb_db == NULL) {
955 call = talloc(ctdb_db, struct ctdb_registered_call);
959 DLIST_ADD(ctdb_db->calls, call);
966 this local messaging handler is ugly, but is needed to prevent
967 recursion in ctdb_send_message() when the destination node is the
968 same as the source node
970 struct ctdb_local_message {
971 struct ctdb_context *ctdb;
976 static void ctdb_local_message_trigger(struct event_context *ev, struct timed_event *te,
977 struct timeval t, void *private_data)
979 struct ctdb_local_message *m = talloc_get_type(private_data,
980 struct ctdb_local_message);
983 res = ctdb_dispatch_message(m->ctdb, m->srvid, m->data);
985 DEBUG(DEBUG_ERR, (__location__ " Failed to dispatch message for srvid=%llu\n",
986 (unsigned long long)m->srvid));
991 static int ctdb_local_message(struct ctdb_context *ctdb, uint64_t srvid, TDB_DATA data)
993 struct ctdb_local_message *m;
994 m = talloc(ctdb, struct ctdb_local_message);
995 CTDB_NO_MEMORY(ctdb, m);
1000 m->data.dptr = talloc_memdup(m, m->data.dptr, m->data.dsize);
1001 if (m->data.dptr == NULL) {
1006 /* this needs to be done as an event to prevent recursion */
1007 event_add_timed(ctdb->ev, m, timeval_zero(), ctdb_local_message_trigger, m);
1014 int ctdb_daemon_send_message(struct ctdb_context *ctdb, uint32_t pnn,
1015 uint64_t srvid, TDB_DATA data)
1017 struct ctdb_req_message *r;
1020 if (ctdb->methods == NULL) {
1021 DEBUG(DEBUG_ERR,(__location__ " Failed to send message. Transport is DOWN\n"));
1025 /* see if this is a message to ourselves */
1026 if (pnn == ctdb->pnn) {
1027 return ctdb_local_message(ctdb, srvid, data);
1030 len = offsetof(struct ctdb_req_message, data) + data.dsize;
1031 r = ctdb_transport_allocate(ctdb, ctdb, CTDB_REQ_MESSAGE, len,
1032 struct ctdb_req_message);
1033 CTDB_NO_MEMORY(ctdb, r);
1035 r->hdr.destnode = pnn;
1037 r->datalen = data.dsize;
1038 memcpy(&r->data[0], data.dptr, data.dsize);
1040 ctdb_queue_packet(ctdb, &r->hdr);