2 Unix SMB/CIFS implementation.
3 Implementation of a reliable server_exists()
4 Copyright (C) Volker Lendecke 2010
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "system/filesys.h"
24 #include "dbwrap/dbwrap.h"
25 #include "dbwrap/dbwrap_open.h"
26 #include "lib/tdb_wrap/tdb_wrap.h"
27 #include "lib/param/param.h"
28 #include "ctdbd_conn.h"
37 struct serverid_data
{
42 bool serverid_parent_init(TALLOC_CTX
*mem_ctx
)
45 struct loadparm_context
*lp_ctx
;
47 lp_ctx
= loadparm_init_s3(mem_ctx
, loadparm_s3_helpers());
49 DEBUG(0, ("loadparm_init_s3 failed\n"));
54 * Open the tdb in the parent process (smbd) so that our
55 * CLEAR_IF_FIRST optimization in tdb_reopen_all can properly
59 db
= tdb_wrap_open(mem_ctx
, lock_path("serverid.tdb"),
60 0, TDB_DEFAULT
|TDB_CLEAR_IF_FIRST
|TDB_INCOMPATIBLE_HASH
, O_RDWR
|O_CREAT
,
62 talloc_unlink(mem_ctx
, lp_ctx
);
64 DEBUG(1, ("could not open serverid.tdb: %s\n",
71 static struct db_context
*serverid_db(void)
73 static struct db_context
*db
;
78 db
= db_open(NULL
, lock_path("serverid.tdb"), 0,
79 TDB_DEFAULT
|TDB_CLEAR_IF_FIRST
|TDB_INCOMPATIBLE_HASH
,
80 O_RDWR
|O_CREAT
, 0644, DBWRAP_LOCK_ORDER_2
,
85 static void serverid_fill_key(const struct server_id
*id
,
86 struct serverid_key
*key
)
90 key
->task_id
= id
->task_id
;
94 bool serverid_register(const struct server_id id
, uint32_t msg_flags
)
96 struct db_context
*db
;
97 struct serverid_key key
;
98 struct serverid_data data
;
99 struct db_record
*rec
;
100 TDB_DATA tdbkey
, tdbdata
;
109 serverid_fill_key(&id
, &key
);
110 tdbkey
= make_tdb_data((uint8_t *)&key
, sizeof(key
));
112 rec
= dbwrap_fetch_locked(db
, talloc_tos(), tdbkey
);
114 DEBUG(1, ("Could not fetch_lock serverid.tdb record\n"));
119 data
.unique_id
= id
.unique_id
;
120 data
.msg_flags
= msg_flags
;
122 tdbdata
= make_tdb_data((uint8_t *)&data
, sizeof(data
));
123 status
= dbwrap_record_store(rec
, tdbdata
, 0);
124 if (!NT_STATUS_IS_OK(status
)) {
125 DEBUG(1, ("Storing serverid.tdb record failed: %s\n",
129 #ifdef HAVE_CTDB_CONTROL_CHECK_SRVIDS_DECL
130 if (lp_clustering()) {
131 register_with_ctdbd(messaging_ctdbd_connection(), id
.unique_id
);
140 bool serverid_register_msg_flags(const struct server_id id
, bool do_reg
,
143 struct db_context
*db
;
144 struct serverid_key key
;
145 struct serverid_data
*data
;
146 struct db_record
*rec
;
157 serverid_fill_key(&id
, &key
);
158 tdbkey
= make_tdb_data((uint8_t *)&key
, sizeof(key
));
160 rec
= dbwrap_fetch_locked(db
, talloc_tos(), tdbkey
);
162 DEBUG(1, ("Could not fetch_lock serverid.tdb record\n"));
166 value
= dbwrap_record_get_value(rec
);
168 if (value
.dsize
!= sizeof(struct serverid_data
)) {
169 DEBUG(1, ("serverid record has unexpected size %d "
170 "(wanted %d)\n", (int)value
.dsize
,
171 (int)sizeof(struct serverid_data
)));
175 data
= (struct serverid_data
*)value
.dptr
;
178 data
->msg_flags
|= msg_flags
;
180 data
->msg_flags
&= ~msg_flags
;
183 status
= dbwrap_record_store(rec
, value
, 0);
184 if (!NT_STATUS_IS_OK(status
)) {
185 DEBUG(1, ("Storing serverid.tdb record failed: %s\n",
195 bool serverid_deregister(struct server_id id
)
197 struct db_context
*db
;
198 struct serverid_key key
;
199 struct db_record
*rec
;
209 serverid_fill_key(&id
, &key
);
210 tdbkey
= make_tdb_data((uint8_t *)&key
, sizeof(key
));
212 rec
= dbwrap_fetch_locked(db
, talloc_tos(), tdbkey
);
214 DEBUG(1, ("Could not fetch_lock serverid.tdb record\n"));
218 status
= dbwrap_record_delete(rec
);
219 if (!NT_STATUS_IS_OK(status
)) {
220 DEBUG(1, ("Deleting serverid.tdb record failed: %s\n",
230 struct serverid_exists_state
{
231 const struct server_id
*id
;
235 static void server_exists_parse(TDB_DATA key
, TDB_DATA data
, void *priv
)
237 struct serverid_exists_state
*state
=
238 (struct serverid_exists_state
*)priv
;
240 if (data
.dsize
!= sizeof(struct serverid_data
)) {
241 state
->exists
= false;
246 * Use memcmp, not direct compare. data.dptr might not be
249 state
->exists
= (memcmp(&state
->id
->unique_id
, data
.dptr
,
250 sizeof(state
->id
->unique_id
)) == 0);
253 bool serverid_exists(const struct server_id
*id
)
258 ok
= serverids_exist(id
, 1, &result
);
266 bool serverids_exist(const struct server_id
*ids
, int num_ids
, bool *results
)
268 int *todo_idx
= NULL
;
269 struct server_id
*todo_ids
= NULL
;
270 bool *todo_results
= NULL
;
272 int *remote_idx
= NULL
;
274 int *verify_idx
= NULL
;
278 struct db_context
*db
;
285 todo_idx
= talloc_array(talloc_tos(), int, num_ids
);
286 if (todo_idx
== NULL
) {
289 todo_ids
= talloc_array(talloc_tos(), struct server_id
, num_ids
);
290 if (todo_ids
== NULL
) {
293 todo_results
= talloc_array(talloc_tos(), bool, num_ids
);
294 if (todo_results
== NULL
) {
298 remote_idx
= talloc_array(talloc_tos(), int, num_ids
);
299 if (remote_idx
== NULL
) {
302 verify_idx
= talloc_array(talloc_tos(), int, num_ids
);
303 if (verify_idx
== NULL
) {
307 for (idx
=0; idx
<num_ids
; idx
++) {
308 results
[idx
] = false;
310 if (server_id_is_disconnected(&ids
[idx
])) {
314 if (procid_is_me(&ids
[idx
])) {
319 if (procid_is_local(&ids
[idx
])) {
320 bool exists
= process_exists_by_pid(ids
[idx
].pid
);
326 if (ids
[idx
].unique_id
== SERVERID_UNIQUE_ID_NOT_TO_VERIFY
) {
331 verify_idx
[verify_num
] = idx
;
336 if (!lp_clustering()) {
340 remote_idx
[remote_num
] = idx
;
344 #ifdef HAVE_CTDB_CONTROL_CHECK_SRVIDS_DECL
345 if (remote_num
!= 0) {
346 int old_remote_num
= remote_num
;
351 for (t
=0; t
<old_remote_num
; t
++) {
354 if (ids
[idx
].unique_id
== SERVERID_UNIQUE_ID_NOT_TO_VERIFY
) {
355 remote_idx
[remote_num
] = idx
;
360 todo_idx
[todo_num
] = idx
;
361 todo_ids
[todo_num
] = ids
[idx
];
362 todo_results
[todo_num
] = false;
367 * Note: this only uses CTDB_CONTROL_CHECK_SRVIDS
368 * to verify that the server_id still exists,
369 * which means only the server_id.unique_id and
370 * server_id.vnn are verified, while server_id.pid
371 * is not verified at all.
373 * TODO: do we want to verify server_id.pid somehow?
375 if (!ctdb_serverids_exist(messaging_ctdbd_connection(),
376 todo_ids
, todo_num
, todo_results
))
381 for (t
=0; t
<todo_num
; t
++) {
384 results
[idx
] = todo_results
[t
];
389 if (remote_num
!= 0) {
392 for (t
=0; t
<remote_num
; t
++) {
394 todo_idx
[todo_num
] = idx
;
395 todo_ids
[todo_num
] = ids
[idx
];
396 todo_results
[todo_num
] = false;
400 #ifdef CLUSTER_SUPPORT
401 if (!ctdb_processes_exist(messaging_ctdbd_connection(),
408 for (t
=0; t
<todo_num
; t
++) {
411 if (!todo_results
[t
]) {
415 if (ids
[idx
].unique_id
== SERVERID_UNIQUE_ID_NOT_TO_VERIFY
) {
420 verify_idx
[verify_num
] = idx
;
425 for (t
=0; t
<verify_num
; t
++) {
426 struct serverid_exists_state state
;
427 struct serverid_key key
;
433 serverid_fill_key(&ids
[idx
], &key
);
434 tdbkey
= make_tdb_data((uint8_t *)&key
, sizeof(key
));
436 state
.id
= &ids
[idx
];
437 state
.exists
= false;
438 status
= dbwrap_parse_record(db
, tdbkey
, server_exists_parse
, &state
);
439 if (!NT_STATUS_IS_OK(status
)) {
440 results
[idx
] = false;
443 results
[idx
] = state
.exists
;
448 TALLOC_FREE(verify_idx
);
449 TALLOC_FREE(remote_idx
);
450 TALLOC_FREE(todo_results
);
451 TALLOC_FREE(todo_ids
);
452 TALLOC_FREE(todo_idx
);
456 static bool serverid_rec_parse(const struct db_record
*rec
,
457 struct server_id
*id
, uint32_t *msg_flags
)
459 struct serverid_key key
;
460 struct serverid_data data
;
464 tdbkey
= dbwrap_record_get_key(rec
);
465 tdbdata
= dbwrap_record_get_value(rec
);
467 if (tdbkey
.dsize
!= sizeof(key
)) {
468 DEBUG(1, ("Found invalid key length %d in serverid.tdb\n",
472 if (tdbdata
.dsize
!= sizeof(data
)) {
473 DEBUG(1, ("Found invalid value length %d in serverid.tdb\n",
474 (int)tdbdata
.dsize
));
478 memcpy(&key
, tdbkey
.dptr
, sizeof(key
));
479 memcpy(&data
, tdbdata
.dptr
, sizeof(data
));
482 id
->task_id
= key
.task_id
;
484 id
->unique_id
= data
.unique_id
;
485 *msg_flags
= data
.msg_flags
;
489 struct serverid_traverse_read_state
{
490 int (*fn
)(const struct server_id
*id
, uint32_t msg_flags
,
495 static int serverid_traverse_read_fn(struct db_record
*rec
, void *private_data
)
497 struct serverid_traverse_read_state
*state
=
498 (struct serverid_traverse_read_state
*)private_data
;
502 if (!serverid_rec_parse(rec
, &id
, &msg_flags
)) {
505 return state
->fn(&id
, msg_flags
,state
->private_data
);
508 bool serverid_traverse_read(int (*fn
)(const struct server_id
*id
,
509 uint32_t msg_flags
, void *private_data
),
512 struct db_context
*db
;
513 struct serverid_traverse_read_state state
;
521 state
.private_data
= private_data
;
523 status
= dbwrap_traverse_read(db
, serverid_traverse_read_fn
, &state
,
525 return NT_STATUS_IS_OK(status
);
528 struct serverid_traverse_state
{
529 int (*fn
)(struct db_record
*rec
, const struct server_id
*id
,
530 uint32_t msg_flags
, void *private_data
);
534 static int serverid_traverse_fn(struct db_record
*rec
, void *private_data
)
536 struct serverid_traverse_state
*state
=
537 (struct serverid_traverse_state
*)private_data
;
541 if (!serverid_rec_parse(rec
, &id
, &msg_flags
)) {
544 return state
->fn(rec
, &id
, msg_flags
, state
->private_data
);
547 bool serverid_traverse(int (*fn
)(struct db_record
*rec
,
548 const struct server_id
*id
,
549 uint32_t msg_flags
, void *private_data
),
552 struct db_context
*db
;
553 struct serverid_traverse_state state
;
561 state
.private_data
= private_data
;
563 status
= dbwrap_traverse(db
, serverid_traverse_fn
, &state
, NULL
);
564 return NT_STATUS_IS_OK(status
);
567 uint64_t serverid_get_random_unique_id(void)
569 uint64_t unique_id
= SERVERID_UNIQUE_ID_NOT_TO_VERIFY
;
571 while (unique_id
== SERVERID_UNIQUE_ID_NOT_TO_VERIFY
) {
572 generate_random_buffer((uint8_t *)&unique_id
,