docs: insert meta data into password server parameter
[Samba/wip.git] / ctdb / server / ctdb_ltdb_server.c
blob234ecac5fcd624123d34f636acf0385587355b1c
1 /*
2 ctdb ltdb code - server side
4 Copyright (C) Andrew Tridgell 2007
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "tdb.h"
22 #include "system/network.h"
23 #include "system/filesys.h"
24 #include "system/dir.h"
25 #include "system/time.h"
26 #include "../include/ctdb_private.h"
27 #include "../common/rb_tree.h"
28 #include "db_wrap.h"
29 #include "lib/util/dlinklist.h"
30 #include <ctype.h>
32 #define PERSISTENT_HEALTH_TDB "persistent_health.tdb"
34 /**
35 * write a record to a normal database
37 * This is the server-variant of the ctdb_ltdb_store function.
38 * It contains logic to determine whether a record should be
39 * stored or deleted. It also sends SCHEDULE_FOR_DELETION
40 * controls to the local ctdb daemon if apporpriate.
42 static int ctdb_ltdb_store_server(struct ctdb_db_context *ctdb_db,
43 TDB_DATA key,
44 struct ctdb_ltdb_header *header,
45 TDB_DATA data)
47 struct ctdb_context *ctdb = ctdb_db->ctdb;
48 TDB_DATA rec;
49 int ret;
50 bool seqnum_suppressed = false;
51 bool keep = false;
52 bool schedule_for_deletion = false;
53 bool remove_from_delete_queue = false;
54 uint32_t lmaster;
56 if (ctdb->flags & CTDB_FLAG_TORTURE) {
57 struct ctdb_ltdb_header *h2;
58 rec = tdb_fetch(ctdb_db->ltdb->tdb, key);
59 h2 = (struct ctdb_ltdb_header *)rec.dptr;
60 if (rec.dptr && rec.dsize >= sizeof(h2) && h2->rsn > header->rsn) {
61 DEBUG(DEBUG_CRIT,("RSN regression! %llu %llu\n",
62 (unsigned long long)h2->rsn, (unsigned long long)header->rsn));
64 if (rec.dptr) free(rec.dptr);
67 if (ctdb->vnn_map == NULL) {
69 * Called from a client: always store the record
70 * Also don't call ctdb_lmaster since it uses the vnn_map!
72 keep = true;
73 goto store;
76 lmaster = ctdb_lmaster(ctdb_db->ctdb, &key);
79 * If we migrate an empty record off to another node
80 * and the record has not been migrated with data,
81 * delete the record instead of storing the empty record.
83 if (data.dsize != 0) {
84 keep = true;
85 } else if (header->flags & CTDB_REC_RO_FLAGS) {
86 keep = true;
87 } else if (ctdb_db->persistent) {
88 keep = true;
89 } else if (header->flags & CTDB_REC_FLAG_AUTOMATIC) {
91 * The record is not created by the client but
92 * automatically by the ctdb_ltdb_fetch logic that
93 * creates a record with an initial header in the
94 * ltdb before trying to migrate the record from
95 * the current lmaster. Keep it instead of trying
96 * to delete the non-existing record...
98 keep = true;
99 schedule_for_deletion = true;
100 } else if (header->flags & CTDB_REC_FLAG_MIGRATED_WITH_DATA) {
101 keep = true;
102 } else if (ctdb_db->ctdb->pnn == lmaster) {
104 * If we are lmaster, then we usually keep the record.
105 * But if we retrieve the dmaster role by a VACUUM_MIGRATE
106 * and the record is empty and has never been migrated
107 * with data, then we should delete it instead of storing it.
108 * This is part of the vacuuming process.
110 * The reason that we usually need to store even empty records
111 * on the lmaster is that a client operating directly on the
112 * lmaster (== dmaster) expects the local copy of the record to
113 * exist after successful ctdb migrate call. If the record does
114 * not exist, the client goes into a migrate loop and eventually
115 * fails. So storing the empty record makes sure that we do not
116 * need to change the client code.
118 if (!(header->flags & CTDB_REC_FLAG_VACUUM_MIGRATED)) {
119 keep = true;
120 } else if (ctdb_db->ctdb->pnn != header->dmaster) {
121 keep = true;
123 } else if (ctdb_db->ctdb->pnn == header->dmaster) {
124 keep = true;
127 if (keep) {
128 if (!ctdb_db->persistent &&
129 (ctdb_db->ctdb->pnn == header->dmaster) &&
130 !(header->flags & CTDB_REC_RO_FLAGS))
132 header->rsn++;
134 if (data.dsize == 0) {
135 schedule_for_deletion = true;
138 remove_from_delete_queue = !schedule_for_deletion;
141 store:
143 * The VACUUM_MIGRATED flag is only set temporarily for
144 * the above logic when the record was retrieved by a
145 * VACUUM_MIGRATE call and should not be stored in the
146 * database.
148 * The VACUUM_MIGRATE call is triggered by a vacuum fetch,
149 * and there are two cases in which the corresponding record
150 * is stored in the local database:
151 * 1. The record has been migrated with data in the past
152 * (the MIGRATED_WITH_DATA record flag is set).
153 * 2. The record has been filled with data again since it
154 * had been submitted in the VACUUM_FETCH message to the
155 * lmaster.
156 * For such records it is important to not store the
157 * VACUUM_MIGRATED flag in the database.
159 header->flags &= ~CTDB_REC_FLAG_VACUUM_MIGRATED;
162 * Similarly, clear the AUTOMATIC flag which should not enter
163 * the local database copy since this would require client
164 * modifications to clear the flag when the client stores
165 * the record.
167 header->flags &= ~CTDB_REC_FLAG_AUTOMATIC;
169 rec.dsize = sizeof(*header) + data.dsize;
170 rec.dptr = talloc_size(ctdb, rec.dsize);
171 CTDB_NO_MEMORY(ctdb, rec.dptr);
173 memcpy(rec.dptr, header, sizeof(*header));
174 memcpy(rec.dptr + sizeof(*header), data.dptr, data.dsize);
176 /* Databases with seqnum updates enabled only get their seqnum
177 changes when/if we modify the data */
178 if (ctdb_db->seqnum_update != NULL) {
179 TDB_DATA old;
180 old = tdb_fetch(ctdb_db->ltdb->tdb, key);
182 if ( (old.dsize == rec.dsize)
183 && !memcmp(old.dptr+sizeof(struct ctdb_ltdb_header),
184 rec.dptr+sizeof(struct ctdb_ltdb_header),
185 rec.dsize-sizeof(struct ctdb_ltdb_header)) ) {
186 tdb_remove_flags(ctdb_db->ltdb->tdb, TDB_SEQNUM);
187 seqnum_suppressed = true;
189 if (old.dptr) free(old.dptr);
192 DEBUG(DEBUG_DEBUG, (__location__ " db[%s]: %s record: hash[0x%08x]\n",
193 ctdb_db->db_name,
194 keep?"storing":"deleting",
195 ctdb_hash(&key)));
197 if (keep) {
198 ret = tdb_store(ctdb_db->ltdb->tdb, key, rec, TDB_REPLACE);
199 } else {
200 ret = tdb_delete(ctdb_db->ltdb->tdb, key);
203 if (ret != 0) {
204 int lvl = DEBUG_ERR;
206 if (keep == false &&
207 tdb_error(ctdb_db->ltdb->tdb) == TDB_ERR_NOEXIST)
209 lvl = DEBUG_DEBUG;
212 DEBUG(lvl, (__location__ " db[%s]: Failed to %s record: "
213 "%d - %s\n",
214 ctdb_db->db_name,
215 keep?"store":"delete", ret,
216 tdb_errorstr(ctdb_db->ltdb->tdb)));
218 schedule_for_deletion = false;
219 remove_from_delete_queue = false;
221 if (seqnum_suppressed) {
222 tdb_add_flags(ctdb_db->ltdb->tdb, TDB_SEQNUM);
225 talloc_free(rec.dptr);
227 if (schedule_for_deletion) {
228 int ret2;
229 ret2 = ctdb_local_schedule_for_deletion(ctdb_db, header, key);
230 if (ret2 != 0) {
231 DEBUG(DEBUG_ERR, (__location__ " ctdb_local_schedule_for_deletion failed.\n"));
235 if (remove_from_delete_queue) {
236 ctdb_local_remove_from_delete_queue(ctdb_db, header, key);
239 return ret;
242 struct lock_fetch_state {
243 struct ctdb_context *ctdb;
244 void (*recv_pkt)(void *, struct ctdb_req_header *);
245 void *recv_context;
246 struct ctdb_req_header *hdr;
247 uint32_t generation;
248 bool ignore_generation;
252 called when we should retry the operation
254 static void lock_fetch_callback(void *p, bool locked)
256 struct lock_fetch_state *state = talloc_get_type(p, struct lock_fetch_state);
257 if (!state->ignore_generation &&
258 state->generation != state->ctdb->vnn_map->generation) {
259 DEBUG(DEBUG_NOTICE,("Discarding previous generation lockwait packet\n"));
260 talloc_free(state->hdr);
261 return;
263 state->recv_pkt(state->recv_context, state->hdr);
264 DEBUG(DEBUG_INFO,(__location__ " PACKET REQUEUED\n"));
269 do a non-blocking ltdb_lock, deferring this ctdb request until we
270 have the chainlock
272 It does the following:
274 1) tries to get the chainlock. If it succeeds, then it returns 0
276 2) if it fails to get a chainlock immediately then it sets up a
277 non-blocking chainlock via ctdb_lock_record, and when it gets the
278 chainlock it re-submits this ctdb request to the main packet
279 receive function.
281 This effectively queues all ctdb requests that cannot be
282 immediately satisfied until it can get the lock. This means that
283 the main ctdb daemon will not block waiting for a chainlock held by
284 a client
286 There are 3 possible return values:
288 0: means that it got the lock immediately.
289 -1: means that it failed to get the lock, and won't retry
290 -2: means that it failed to get the lock immediately, but will retry
292 int ctdb_ltdb_lock_requeue(struct ctdb_db_context *ctdb_db,
293 TDB_DATA key, struct ctdb_req_header *hdr,
294 void (*recv_pkt)(void *, struct ctdb_req_header *),
295 void *recv_context, bool ignore_generation)
297 int ret;
298 struct tdb_context *tdb = ctdb_db->ltdb->tdb;
299 struct lock_request *lreq;
300 struct lock_fetch_state *state;
302 ret = tdb_chainlock_nonblock(tdb, key);
304 if (ret != 0 &&
305 !(errno == EACCES || errno == EAGAIN || errno == EDEADLK)) {
306 /* a hard failure - don't try again */
307 return -1;
310 /* when torturing, ensure we test the contended path */
311 if ((ctdb_db->ctdb->flags & CTDB_FLAG_TORTURE) &&
312 random() % 5 == 0) {
313 ret = -1;
314 tdb_chainunlock(tdb, key);
317 /* first the non-contended path */
318 if (ret == 0) {
319 return 0;
322 state = talloc(hdr, struct lock_fetch_state);
323 state->ctdb = ctdb_db->ctdb;
324 state->hdr = hdr;
325 state->recv_pkt = recv_pkt;
326 state->recv_context = recv_context;
327 state->generation = ctdb_db->ctdb->vnn_map->generation;
328 state->ignore_generation = ignore_generation;
330 /* now the contended path */
331 lreq = ctdb_lock_record(ctdb_db, key, true, lock_fetch_callback, state);
332 if (lreq == NULL) {
333 return -1;
336 /* we need to move the packet off the temporary context in ctdb_input_pkt(),
337 so it won't be freed yet */
338 talloc_steal(state, hdr);
340 /* now tell the caller than we will retry asynchronously */
341 return -2;
345 a varient of ctdb_ltdb_lock_requeue that also fetches the record
347 int ctdb_ltdb_lock_fetch_requeue(struct ctdb_db_context *ctdb_db,
348 TDB_DATA key, struct ctdb_ltdb_header *header,
349 struct ctdb_req_header *hdr, TDB_DATA *data,
350 void (*recv_pkt)(void *, struct ctdb_req_header *),
351 void *recv_context, bool ignore_generation)
353 int ret;
355 ret = ctdb_ltdb_lock_requeue(ctdb_db, key, hdr, recv_pkt,
356 recv_context, ignore_generation);
357 if (ret == 0) {
358 ret = ctdb_ltdb_fetch(ctdb_db, key, header, hdr, data);
359 if (ret != 0) {
360 int uret;
361 uret = ctdb_ltdb_unlock(ctdb_db, key);
362 if (uret != 0) {
363 DEBUG(DEBUG_ERR,(__location__ " ctdb_ltdb_unlock() failed with error %d\n", uret));
367 return ret;
372 paraoid check to see if the db is empty
374 static void ctdb_check_db_empty(struct ctdb_db_context *ctdb_db)
376 struct tdb_context *tdb = ctdb_db->ltdb->tdb;
377 int count = tdb_traverse_read(tdb, NULL, NULL);
378 if (count != 0) {
379 DEBUG(DEBUG_ALERT,(__location__ " tdb '%s' not empty on attach! aborting\n",
380 ctdb_db->db_path));
381 ctdb_fatal(ctdb_db->ctdb, "database not empty on attach");
385 int ctdb_load_persistent_health(struct ctdb_context *ctdb,
386 struct ctdb_db_context *ctdb_db)
388 struct tdb_context *tdb = ctdb->db_persistent_health->tdb;
389 char *old;
390 char *reason = NULL;
391 TDB_DATA key;
392 TDB_DATA val;
394 key.dptr = discard_const_p(uint8_t, ctdb_db->db_name);
395 key.dsize = strlen(ctdb_db->db_name);
397 old = ctdb_db->unhealthy_reason;
398 ctdb_db->unhealthy_reason = NULL;
400 val = tdb_fetch(tdb, key);
401 if (val.dsize > 0) {
402 reason = talloc_strndup(ctdb_db,
403 (const char *)val.dptr,
404 val.dsize);
405 if (reason == NULL) {
406 DEBUG(DEBUG_ALERT,(__location__ " talloc_strndup(%d) failed\n",
407 (int)val.dsize));
408 ctdb_db->unhealthy_reason = old;
409 free(val.dptr);
410 return -1;
414 if (val.dptr) {
415 free(val.dptr);
418 talloc_free(old);
419 ctdb_db->unhealthy_reason = reason;
420 return 0;
423 int ctdb_update_persistent_health(struct ctdb_context *ctdb,
424 struct ctdb_db_context *ctdb_db,
425 const char *given_reason,/* NULL means healthy */
426 int num_healthy_nodes)
428 struct tdb_context *tdb = ctdb->db_persistent_health->tdb;
429 int ret;
430 TDB_DATA key;
431 TDB_DATA val;
432 char *new_reason = NULL;
433 char *old_reason = NULL;
435 ret = tdb_transaction_start(tdb);
436 if (ret != 0) {
437 DEBUG(DEBUG_ALERT,(__location__ " tdb_transaction_start('%s') failed: %d - %s\n",
438 tdb_name(tdb), ret, tdb_errorstr(tdb)));
439 return -1;
442 ret = ctdb_load_persistent_health(ctdb, ctdb_db);
443 if (ret != 0) {
444 DEBUG(DEBUG_ALERT,(__location__ " ctdb_load_persistent_health('%s') failed: %d\n",
445 ctdb_db->db_name, ret));
446 return -1;
448 old_reason = ctdb_db->unhealthy_reason;
450 key.dptr = discard_const_p(uint8_t, ctdb_db->db_name);
451 key.dsize = strlen(ctdb_db->db_name);
453 if (given_reason) {
454 new_reason = talloc_strdup(ctdb_db, given_reason);
455 if (new_reason == NULL) {
456 DEBUG(DEBUG_ALERT,(__location__ " talloc_strdup(%s) failed\n",
457 given_reason));
458 return -1;
460 } else if (old_reason && num_healthy_nodes == 0) {
462 * If the reason indicates ok, but there where no healthy nodes
463 * available, that it means, we have not recovered valid content
464 * of the db. So if there's an old reason, prefix it with
465 * "NO-HEALTHY-NODES - "
467 const char *prefix;
469 #define _TMP_PREFIX "NO-HEALTHY-NODES - "
470 ret = strncmp(_TMP_PREFIX, old_reason, strlen(_TMP_PREFIX));
471 if (ret != 0) {
472 prefix = _TMP_PREFIX;
473 } else {
474 prefix = "";
476 new_reason = talloc_asprintf(ctdb_db, "%s%s",
477 prefix, old_reason);
478 if (new_reason == NULL) {
479 DEBUG(DEBUG_ALERT,(__location__ " talloc_asprintf(%s%s) failed\n",
480 prefix, old_reason));
481 return -1;
483 #undef _TMP_PREFIX
486 if (new_reason) {
487 val.dptr = discard_const_p(uint8_t, new_reason);
488 val.dsize = strlen(new_reason);
490 ret = tdb_store(tdb, key, val, TDB_REPLACE);
491 if (ret != 0) {
492 tdb_transaction_cancel(tdb);
493 DEBUG(DEBUG_ALERT,(__location__ " tdb_store('%s', %s, %s) failed: %d - %s\n",
494 tdb_name(tdb), ctdb_db->db_name, new_reason,
495 ret, tdb_errorstr(tdb)));
496 talloc_free(new_reason);
497 return -1;
499 DEBUG(DEBUG_ALERT,("Updated db health for db(%s) to: %s\n",
500 ctdb_db->db_name, new_reason));
501 } else if (old_reason) {
502 ret = tdb_delete(tdb, key);
503 if (ret != 0) {
504 tdb_transaction_cancel(tdb);
505 DEBUG(DEBUG_ALERT,(__location__ " tdb_delete('%s', %s) failed: %d - %s\n",
506 tdb_name(tdb), ctdb_db->db_name,
507 ret, tdb_errorstr(tdb)));
508 talloc_free(new_reason);
509 return -1;
511 DEBUG(DEBUG_NOTICE,("Updated db health for db(%s): OK\n",
512 ctdb_db->db_name));
515 ret = tdb_transaction_commit(tdb);
516 if (ret != TDB_SUCCESS) {
517 DEBUG(DEBUG_ALERT,(__location__ " tdb_transaction_commit('%s') failed: %d - %s\n",
518 tdb_name(tdb), ret, tdb_errorstr(tdb)));
519 talloc_free(new_reason);
520 return -1;
523 talloc_free(old_reason);
524 ctdb_db->unhealthy_reason = new_reason;
526 return 0;
529 static int ctdb_backup_corrupted_tdb(struct ctdb_context *ctdb,
530 struct ctdb_db_context *ctdb_db)
532 time_t now = time(NULL);
533 char *new_path;
534 char *new_reason;
535 int ret;
536 struct tm *tm;
538 tm = gmtime(&now);
540 /* formatted like: foo.tdb.0.corrupted.20091204160825.0Z */
541 new_path = talloc_asprintf(ctdb_db, "%s.corrupted."
542 "%04u%02u%02u%02u%02u%02u.0Z",
543 ctdb_db->db_path,
544 tm->tm_year+1900, tm->tm_mon+1,
545 tm->tm_mday, tm->tm_hour, tm->tm_min,
546 tm->tm_sec);
547 if (new_path == NULL) {
548 DEBUG(DEBUG_CRIT,(__location__ " talloc_asprintf() failed\n"));
549 return -1;
552 new_reason = talloc_asprintf(ctdb_db,
553 "ERROR - Backup of corrupted TDB in '%s'",
554 new_path);
555 if (new_reason == NULL) {
556 DEBUG(DEBUG_CRIT,(__location__ " talloc_asprintf() failed\n"));
557 return -1;
559 ret = ctdb_update_persistent_health(ctdb, ctdb_db, new_reason, 0);
560 talloc_free(new_reason);
561 if (ret != 0) {
562 DEBUG(DEBUG_CRIT,(__location__
563 ": ctdb_backup_corrupted_tdb(%s) not implemented yet\n",
564 ctdb_db->db_path));
565 return -1;
568 ret = rename(ctdb_db->db_path, new_path);
569 if (ret != 0) {
570 DEBUG(DEBUG_CRIT,(__location__
571 ": ctdb_backup_corrupted_tdb(%s) rename to %s failed: %d - %s\n",
572 ctdb_db->db_path, new_path,
573 errno, strerror(errno)));
574 talloc_free(new_path);
575 return -1;
578 DEBUG(DEBUG_CRIT,(__location__
579 ": ctdb_backup_corrupted_tdb(%s) renamed to %s\n",
580 ctdb_db->db_path, new_path));
581 talloc_free(new_path);
582 return 0;
585 int ctdb_recheck_persistent_health(struct ctdb_context *ctdb)
587 struct ctdb_db_context *ctdb_db;
588 int ret;
589 int ok = 0;
590 int fail = 0;
592 for (ctdb_db = ctdb->db_list; ctdb_db; ctdb_db = ctdb_db->next) {
593 if (!ctdb_db->persistent) {
594 continue;
597 ret = ctdb_load_persistent_health(ctdb, ctdb_db);
598 if (ret != 0) {
599 DEBUG(DEBUG_ALERT,(__location__
600 " load persistent health for '%s' failed\n",
601 ctdb_db->db_path));
602 return -1;
605 if (ctdb_db->unhealthy_reason == NULL) {
606 ok++;
607 DEBUG(DEBUG_INFO,(__location__
608 " persistent db '%s' healthy\n",
609 ctdb_db->db_path));
610 continue;
613 fail++;
614 DEBUG(DEBUG_ALERT,(__location__
615 " persistent db '%s' unhealthy: %s\n",
616 ctdb_db->db_path,
617 ctdb_db->unhealthy_reason));
619 DEBUG((fail!=0)?DEBUG_ALERT:DEBUG_NOTICE,
620 ("ctdb_recheck_presistent_health: OK[%d] FAIL[%d]\n",
621 ok, fail));
623 if (fail != 0) {
624 return -1;
627 return 0;
632 mark a database - as healthy
634 int32_t ctdb_control_db_set_healthy(struct ctdb_context *ctdb, TDB_DATA indata)
636 uint32_t db_id = *(uint32_t *)indata.dptr;
637 struct ctdb_db_context *ctdb_db;
638 int ret;
639 bool may_recover = false;
641 ctdb_db = find_ctdb_db(ctdb, db_id);
642 if (!ctdb_db) {
643 DEBUG(DEBUG_ERR,(__location__ " Unknown db 0x%x\n", db_id));
644 return -1;
647 if (ctdb_db->unhealthy_reason) {
648 may_recover = true;
651 ret = ctdb_update_persistent_health(ctdb, ctdb_db, NULL, 1);
652 if (ret != 0) {
653 DEBUG(DEBUG_ERR,(__location__
654 " ctdb_update_persistent_health(%s) failed\n",
655 ctdb_db->db_name));
656 return -1;
659 if (may_recover && ctdb->runstate == CTDB_RUNSTATE_STARTUP) {
660 DEBUG(DEBUG_ERR, (__location__ " db %s become healthy - force recovery for startup\n",
661 ctdb_db->db_name));
662 ctdb->recovery_mode = CTDB_RECOVERY_ACTIVE;
665 return 0;
668 int32_t ctdb_control_db_get_health(struct ctdb_context *ctdb,
669 TDB_DATA indata,
670 TDB_DATA *outdata)
672 uint32_t db_id = *(uint32_t *)indata.dptr;
673 struct ctdb_db_context *ctdb_db;
674 int ret;
676 ctdb_db = find_ctdb_db(ctdb, db_id);
677 if (!ctdb_db) {
678 DEBUG(DEBUG_ERR,(__location__ " Unknown db 0x%x\n", db_id));
679 return -1;
682 ret = ctdb_load_persistent_health(ctdb, ctdb_db);
683 if (ret != 0) {
684 DEBUG(DEBUG_ERR,(__location__
685 " ctdb_load_persistent_health(%s) failed\n",
686 ctdb_db->db_name));
687 return -1;
690 *outdata = tdb_null;
691 if (ctdb_db->unhealthy_reason) {
692 outdata->dptr = (uint8_t *)ctdb_db->unhealthy_reason;
693 outdata->dsize = strlen(ctdb_db->unhealthy_reason)+1;
696 return 0;
700 int ctdb_set_db_readonly(struct ctdb_context *ctdb, struct ctdb_db_context *ctdb_db)
702 char *ropath;
704 if (ctdb_db->readonly) {
705 return 0;
708 if (ctdb_db->persistent) {
709 DEBUG(DEBUG_ERR,("Persistent databases do not support readonly property\n"));
710 return -1;
713 ropath = talloc_asprintf(ctdb_db, "%s.RO", ctdb_db->db_path);
714 if (ropath == NULL) {
715 DEBUG(DEBUG_CRIT,("Failed to asprintf the tracking database\n"));
716 return -1;
718 ctdb_db->rottdb = tdb_open(ropath,
719 ctdb->tunable.database_hash_size,
720 TDB_NOLOCK|TDB_CLEAR_IF_FIRST|TDB_NOSYNC,
721 O_CREAT|O_RDWR, 0);
722 if (ctdb_db->rottdb == NULL) {
723 DEBUG(DEBUG_CRIT,("Failed to open/create the tracking database '%s'\n", ropath));
724 talloc_free(ropath);
725 return -1;
728 DEBUG(DEBUG_NOTICE,("OPENED tracking database : '%s'\n", ropath));
730 ctdb_db->readonly = true;
732 DEBUG(DEBUG_NOTICE, ("Readonly property set on DB %s\n", ctdb_db->db_name));
734 talloc_free(ropath);
735 return 0;
739 attach to a database, handling both persistent and non-persistent databases
740 return 0 on success, -1 on failure
742 static int ctdb_local_attach(struct ctdb_context *ctdb, const char *db_name,
743 bool persistent, const char *unhealthy_reason,
744 bool jenkinshash)
746 struct ctdb_db_context *ctdb_db, *tmp_db;
747 int ret;
748 struct TDB_DATA key;
749 unsigned tdb_flags;
750 int mode = 0600;
751 int remaining_tries = 0;
753 ctdb_db = talloc_zero(ctdb, struct ctdb_db_context);
754 CTDB_NO_MEMORY(ctdb, ctdb_db);
756 ctdb_db->priority = 1;
757 ctdb_db->ctdb = ctdb;
758 ctdb_db->db_name = talloc_strdup(ctdb_db, db_name);
759 CTDB_NO_MEMORY(ctdb, ctdb_db->db_name);
761 key.dsize = strlen(db_name)+1;
762 key.dptr = discard_const(db_name);
763 ctdb_db->db_id = ctdb_hash(&key);
764 ctdb_db->persistent = persistent;
766 if (!ctdb_db->persistent) {
767 ctdb_db->delete_queue = trbt_create(ctdb_db, 0);
768 if (ctdb_db->delete_queue == NULL) {
769 CTDB_NO_MEMORY(ctdb, ctdb_db->delete_queue);
772 ctdb_db->ctdb_ltdb_store_fn = ctdb_ltdb_store_server;
775 /* check for hash collisions */
776 for (tmp_db=ctdb->db_list;tmp_db;tmp_db=tmp_db->next) {
777 if (tmp_db->db_id == ctdb_db->db_id) {
778 DEBUG(DEBUG_CRIT,("db_id 0x%x hash collision. name1='%s' name2='%s'\n",
779 tmp_db->db_id, db_name, tmp_db->db_name));
780 talloc_free(ctdb_db);
781 return -1;
785 if (persistent) {
786 if (unhealthy_reason) {
787 ret = ctdb_update_persistent_health(ctdb, ctdb_db,
788 unhealthy_reason, 0);
789 if (ret != 0) {
790 DEBUG(DEBUG_ALERT,(__location__ " ctdb_update_persistent_health('%s','%s') failed: %d\n",
791 ctdb_db->db_name, unhealthy_reason, ret));
792 talloc_free(ctdb_db);
793 return -1;
797 if (ctdb->max_persistent_check_errors > 0) {
798 remaining_tries = 1;
800 if (ctdb->runstate == CTDB_RUNSTATE_RUNNING) {
801 remaining_tries = 0;
804 ret = ctdb_load_persistent_health(ctdb, ctdb_db);
805 if (ret != 0) {
806 DEBUG(DEBUG_ALERT,(__location__ " ctdb_load_persistent_health('%s') failed: %d\n",
807 ctdb_db->db_name, ret));
808 talloc_free(ctdb_db);
809 return -1;
813 if (ctdb_db->unhealthy_reason && remaining_tries == 0) {
814 DEBUG(DEBUG_ALERT,(__location__ "ERROR: tdb %s is marked as unhealthy: %s\n",
815 ctdb_db->db_name, ctdb_db->unhealthy_reason));
816 talloc_free(ctdb_db);
817 return -1;
820 if (ctdb_db->unhealthy_reason) {
821 /* this is just a warning, but we want that in the log file! */
822 DEBUG(DEBUG_ALERT,(__location__ "Warning: tdb %s is marked as unhealthy: %s\n",
823 ctdb_db->db_name, ctdb_db->unhealthy_reason));
826 /* open the database */
827 ctdb_db->db_path = talloc_asprintf(ctdb_db, "%s/%s.%u",
828 persistent?ctdb->db_directory_persistent:ctdb->db_directory,
829 db_name, ctdb->pnn);
831 tdb_flags = persistent? TDB_DEFAULT : TDB_CLEAR_IF_FIRST | TDB_NOSYNC;
832 if (ctdb->valgrinding) {
833 tdb_flags |= TDB_NOMMAP;
835 tdb_flags |= TDB_DISALLOW_NESTING;
836 if (jenkinshash) {
837 tdb_flags |= TDB_INCOMPATIBLE_HASH;
840 again:
841 ctdb_db->ltdb = tdb_wrap_open(ctdb, ctdb_db->db_path,
842 ctdb->tunable.database_hash_size,
843 tdb_flags,
844 O_CREAT|O_RDWR, mode);
845 if (ctdb_db->ltdb == NULL) {
846 struct stat st;
847 int saved_errno = errno;
849 if (!persistent) {
850 DEBUG(DEBUG_CRIT,("Failed to open tdb '%s': %d - %s\n",
851 ctdb_db->db_path,
852 saved_errno,
853 strerror(saved_errno)));
854 talloc_free(ctdb_db);
855 return -1;
858 if (remaining_tries == 0) {
859 DEBUG(DEBUG_CRIT,(__location__
860 "Failed to open persistent tdb '%s': %d - %s\n",
861 ctdb_db->db_path,
862 saved_errno,
863 strerror(saved_errno)));
864 talloc_free(ctdb_db);
865 return -1;
868 ret = stat(ctdb_db->db_path, &st);
869 if (ret != 0) {
870 DEBUG(DEBUG_CRIT,(__location__
871 "Failed to open persistent tdb '%s': %d - %s\n",
872 ctdb_db->db_path,
873 saved_errno,
874 strerror(saved_errno)));
875 talloc_free(ctdb_db);
876 return -1;
879 ret = ctdb_backup_corrupted_tdb(ctdb, ctdb_db);
880 if (ret != 0) {
881 DEBUG(DEBUG_CRIT,(__location__
882 "Failed to open persistent tdb '%s': %d - %s\n",
883 ctdb_db->db_path,
884 saved_errno,
885 strerror(saved_errno)));
886 talloc_free(ctdb_db);
887 return -1;
890 remaining_tries--;
891 mode = st.st_mode;
892 goto again;
895 if (!persistent) {
896 ctdb_check_db_empty(ctdb_db);
897 } else {
898 ret = tdb_check(ctdb_db->ltdb->tdb, NULL, NULL);
899 if (ret != 0) {
900 int fd;
901 struct stat st;
903 DEBUG(DEBUG_CRIT,("tdb_check(%s) failed: %d - %s\n",
904 ctdb_db->db_path, ret,
905 tdb_errorstr(ctdb_db->ltdb->tdb)));
906 if (remaining_tries == 0) {
907 talloc_free(ctdb_db);
908 return -1;
911 fd = tdb_fd(ctdb_db->ltdb->tdb);
912 ret = fstat(fd, &st);
913 if (ret != 0) {
914 DEBUG(DEBUG_CRIT,(__location__
915 "Failed to fstat() persistent tdb '%s': %d - %s\n",
916 ctdb_db->db_path,
917 errno,
918 strerror(errno)));
919 talloc_free(ctdb_db);
920 return -1;
923 /* close the TDB */
924 talloc_free(ctdb_db->ltdb);
925 ctdb_db->ltdb = NULL;
927 ret = ctdb_backup_corrupted_tdb(ctdb, ctdb_db);
928 if (ret != 0) {
929 DEBUG(DEBUG_CRIT,("Failed to backup corrupted tdb '%s'\n",
930 ctdb_db->db_path));
931 talloc_free(ctdb_db);
932 return -1;
935 remaining_tries--;
936 mode = st.st_mode;
937 goto again;
941 /* set up a rb tree we can use to track which records we have a
942 fetch-lock in-flight for so we can defer any additional calls
943 for the same record.
945 ctdb_db->deferred_fetch = trbt_create(ctdb_db, 0);
946 if (ctdb_db->deferred_fetch == NULL) {
947 DEBUG(DEBUG_ERR,("Failed to create deferred fetch rb tree for ctdb database\n"));
948 talloc_free(ctdb_db);
949 return -1;
952 DLIST_ADD(ctdb->db_list, ctdb_db);
954 /* setting this can help some high churn databases */
955 tdb_set_max_dead(ctdb_db->ltdb->tdb, ctdb->tunable.database_max_dead);
958 all databases support the "null" function. we need this in
959 order to do forced migration of records
961 ret = ctdb_daemon_set_call(ctdb, ctdb_db->db_id, ctdb_null_func, CTDB_NULL_FUNC);
962 if (ret != 0) {
963 DEBUG(DEBUG_CRIT,("Failed to setup null function for '%s'\n", ctdb_db->db_name));
964 talloc_free(ctdb_db);
965 return -1;
969 all databases support the "fetch" function. we need this
970 for efficient Samba3 ctdb fetch
972 ret = ctdb_daemon_set_call(ctdb, ctdb_db->db_id, ctdb_fetch_func, CTDB_FETCH_FUNC);
973 if (ret != 0) {
974 DEBUG(DEBUG_CRIT,("Failed to setup fetch function for '%s'\n", ctdb_db->db_name));
975 talloc_free(ctdb_db);
976 return -1;
980 all databases support the "fetch_with_header" function. we need this
981 for efficient readonly record fetches
983 ret = ctdb_daemon_set_call(ctdb, ctdb_db->db_id, ctdb_fetch_with_header_func, CTDB_FETCH_WITH_HEADER_FUNC);
984 if (ret != 0) {
985 DEBUG(DEBUG_CRIT,("Failed to setup fetch function for '%s'\n", ctdb_db->db_name));
986 talloc_free(ctdb_db);
987 return -1;
990 ret = ctdb_vacuum_init(ctdb_db);
991 if (ret != 0) {
992 DEBUG(DEBUG_CRIT,("Failed to setup vacuuming for "
993 "database '%s'\n", ctdb_db->db_name));
994 talloc_free(ctdb_db);
995 return -1;
999 DEBUG(DEBUG_NOTICE,("Attached to database '%s' with flags 0x%x\n",
1000 ctdb_db->db_path, tdb_flags));
1002 /* success */
1003 return 0;
1007 struct ctdb_deferred_attach_context {
1008 struct ctdb_deferred_attach_context *next, *prev;
1009 struct ctdb_context *ctdb;
1010 struct ctdb_req_control *c;
1014 static int ctdb_deferred_attach_destructor(struct ctdb_deferred_attach_context *da_ctx)
1016 DLIST_REMOVE(da_ctx->ctdb->deferred_attach, da_ctx);
1018 return 0;
1021 static void ctdb_deferred_attach_timeout(struct event_context *ev, struct timed_event *te, struct timeval t, void *private_data)
1023 struct ctdb_deferred_attach_context *da_ctx = talloc_get_type(private_data, struct ctdb_deferred_attach_context);
1024 struct ctdb_context *ctdb = da_ctx->ctdb;
1026 ctdb_request_control_reply(ctdb, da_ctx->c, NULL, -1, NULL);
1027 talloc_free(da_ctx);
1030 static void ctdb_deferred_attach_callback(struct event_context *ev, struct timed_event *te, struct timeval t, void *private_data)
1032 struct ctdb_deferred_attach_context *da_ctx = talloc_get_type(private_data, struct ctdb_deferred_attach_context);
1033 struct ctdb_context *ctdb = da_ctx->ctdb;
1035 /* This talloc-steals the packet ->c */
1036 ctdb_input_pkt(ctdb, (struct ctdb_req_header *)da_ctx->c);
1037 talloc_free(da_ctx);
1040 int ctdb_process_deferred_attach(struct ctdb_context *ctdb)
1042 struct ctdb_deferred_attach_context *da_ctx;
1044 /* call it from the main event loop as soon as the current event
1045 finishes.
1047 while ((da_ctx = ctdb->deferred_attach) != NULL) {
1048 DLIST_REMOVE(ctdb->deferred_attach, da_ctx);
1049 event_add_timed(ctdb->ev, da_ctx, timeval_current_ofs(1,0), ctdb_deferred_attach_callback, da_ctx);
1052 return 0;
1056 a client has asked to attach a new database
1058 int32_t ctdb_control_db_attach(struct ctdb_context *ctdb, TDB_DATA indata,
1059 TDB_DATA *outdata, uint64_t tdb_flags,
1060 bool persistent, uint32_t client_id,
1061 struct ctdb_req_control *c,
1062 bool *async_reply)
1064 const char *db_name = (const char *)indata.dptr;
1065 struct ctdb_db_context *db;
1066 struct ctdb_node *node = ctdb->nodes[ctdb->pnn];
1067 struct ctdb_client *client = NULL;
1069 if (ctdb->tunable.allow_client_db_attach == 0) {
1070 DEBUG(DEBUG_ERR, ("DB Attach to database %s denied by tunable "
1071 "AllowClientDBAccess == 0\n", db_name));
1072 return -1;
1075 /* dont allow any local clients to attach while we are in recovery mode
1076 * except for the recovery daemon.
1077 * allow all attach from the network since these are always from remote
1078 * recovery daemons.
1080 if (client_id != 0) {
1081 client = ctdb_reqid_find(ctdb, client_id, struct ctdb_client);
1083 if (client != NULL) {
1084 /* If the node is inactive it is not part of the cluster
1085 and we should not allow clients to attach to any
1086 databases
1088 if (node->flags & NODE_FLAGS_INACTIVE) {
1089 DEBUG(DEBUG_ERR,("DB Attach to database %s refused since node is inactive (flags=0x%x)\n", db_name, node->flags));
1090 return -1;
1093 if (ctdb->recovery_mode == CTDB_RECOVERY_ACTIVE &&
1094 client->pid != ctdb->recoverd_pid &&
1095 ctdb->runstate < CTDB_RUNSTATE_RUNNING) {
1096 struct ctdb_deferred_attach_context *da_ctx = talloc(client, struct ctdb_deferred_attach_context);
1098 if (da_ctx == NULL) {
1099 DEBUG(DEBUG_ERR,("DB Attach to database %s deferral for client with pid:%d failed due to OOM.\n", db_name, client->pid));
1100 return -1;
1103 da_ctx->ctdb = ctdb;
1104 da_ctx->c = talloc_steal(da_ctx, c);
1105 talloc_set_destructor(da_ctx, ctdb_deferred_attach_destructor);
1106 DLIST_ADD(ctdb->deferred_attach, da_ctx);
1108 event_add_timed(ctdb->ev, da_ctx, timeval_current_ofs(ctdb->tunable.deferred_attach_timeout, 0), ctdb_deferred_attach_timeout, da_ctx);
1110 DEBUG(DEBUG_ERR,("DB Attach to database %s deferred for client with pid:%d since node is in recovery mode.\n", db_name, client->pid));
1111 *async_reply = true;
1112 return 0;
1116 /* the client can optionally pass additional tdb flags, but we
1117 only allow a subset of those on the database in ctdb. Note
1118 that tdb_flags is passed in via the (otherwise unused)
1119 srvid to the attach control */
1120 tdb_flags &= (TDB_NOSYNC|TDB_INCOMPATIBLE_HASH);
1122 /* see if we already have this name */
1123 db = ctdb_db_handle(ctdb, db_name);
1124 if (db) {
1125 if (db->persistent != persistent) {
1126 DEBUG(DEBUG_ERR, ("ERROR: DB Attach %spersistent to %spersistent "
1127 "database %s\n", persistent ? "" : "non-",
1128 db-> persistent ? "" : "non-", db_name));
1129 return -1;
1131 outdata->dptr = (uint8_t *)&db->db_id;
1132 outdata->dsize = sizeof(db->db_id);
1133 tdb_add_flags(db->ltdb->tdb, tdb_flags);
1134 return 0;
1137 if (ctdb_local_attach(ctdb, db_name, persistent, NULL, (tdb_flags&TDB_INCOMPATIBLE_HASH)?true:false) != 0) {
1138 return -1;
1141 db = ctdb_db_handle(ctdb, db_name);
1142 if (!db) {
1143 DEBUG(DEBUG_ERR,("Failed to find db handle for name '%s'\n", db_name));
1144 return -1;
1147 /* remember the flags the client has specified */
1148 tdb_add_flags(db->ltdb->tdb, tdb_flags);
1150 outdata->dptr = (uint8_t *)&db->db_id;
1151 outdata->dsize = sizeof(db->db_id);
1153 /* Try to ensure it's locked in mem */
1154 ctdb_lockdown_memory(ctdb);
1156 /* tell all the other nodes about this database */
1157 ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_ALL, tdb_flags,
1158 persistent?CTDB_CONTROL_DB_ATTACH_PERSISTENT:
1159 CTDB_CONTROL_DB_ATTACH,
1160 0, CTDB_CTRL_FLAG_NOREPLY,
1161 indata, NULL, NULL);
1163 /* success */
1164 return 0;
1169 attach to all existing persistent databases
1171 static int ctdb_attach_persistent(struct ctdb_context *ctdb,
1172 const char *unhealthy_reason)
1174 DIR *d;
1175 struct dirent *de;
1177 /* open the persistent db directory and scan it for files */
1178 d = opendir(ctdb->db_directory_persistent);
1179 if (d == NULL) {
1180 return 0;
1183 while ((de=readdir(d))) {
1184 char *p, *s, *q;
1185 size_t len = strlen(de->d_name);
1186 uint32_t node;
1187 int invalid_name = 0;
1189 s = talloc_strdup(ctdb, de->d_name);
1190 if (s == NULL) {
1191 closedir(d);
1192 CTDB_NO_MEMORY(ctdb, s);
1195 /* only accept names ending in .tdb */
1196 p = strstr(s, ".tdb.");
1197 if (len < 7 || p == NULL) {
1198 talloc_free(s);
1199 continue;
1202 /* only accept names ending with .tdb. and any number of digits */
1203 q = p+5;
1204 while (*q != 0 && invalid_name == 0) {
1205 if (!isdigit(*q++)) {
1206 invalid_name = 1;
1209 if (invalid_name == 1 || sscanf(p+5, "%u", &node) != 1 || node != ctdb->pnn) {
1210 DEBUG(DEBUG_ERR,("Ignoring persistent database '%s'\n", de->d_name));
1211 talloc_free(s);
1212 continue;
1214 p[4] = 0;
1216 if (ctdb_local_attach(ctdb, s, true, unhealthy_reason, 0) != 0) {
1217 DEBUG(DEBUG_ERR,("Failed to attach to persistent database '%s'\n", de->d_name));
1218 closedir(d);
1219 talloc_free(s);
1220 return -1;
1223 DEBUG(DEBUG_INFO,("Attached to persistent database %s\n", s));
1225 talloc_free(s);
1227 closedir(d);
1228 return 0;
1231 int ctdb_attach_databases(struct ctdb_context *ctdb)
1233 int ret;
1234 char *persistent_health_path = NULL;
1235 char *unhealthy_reason = NULL;
1236 bool first_try = true;
1238 persistent_health_path = talloc_asprintf(ctdb, "%s/%s.%u",
1239 ctdb->db_directory_state,
1240 PERSISTENT_HEALTH_TDB,
1241 ctdb->pnn);
1242 if (persistent_health_path == NULL) {
1243 DEBUG(DEBUG_CRIT,(__location__ " talloc_asprintf() failed\n"));
1244 return -1;
1247 again:
1249 ctdb->db_persistent_health = tdb_wrap_open(ctdb, persistent_health_path,
1250 0, TDB_DISALLOW_NESTING,
1251 O_CREAT | O_RDWR, 0600);
1252 if (ctdb->db_persistent_health == NULL) {
1253 struct tdb_wrap *tdb;
1255 if (!first_try) {
1256 DEBUG(DEBUG_CRIT,("Failed to open tdb '%s': %d - %s\n",
1257 persistent_health_path,
1258 errno,
1259 strerror(errno)));
1260 talloc_free(persistent_health_path);
1261 talloc_free(unhealthy_reason);
1262 return -1;
1264 first_try = false;
1266 unhealthy_reason = talloc_asprintf(ctdb, "WARNING - '%s' %s - %s",
1267 persistent_health_path,
1268 "was cleared after a failure",
1269 "manual verification needed");
1270 if (unhealthy_reason == NULL) {
1271 DEBUG(DEBUG_CRIT,(__location__ " talloc_asprintf() failed\n"));
1272 talloc_free(persistent_health_path);
1273 return -1;
1276 DEBUG(DEBUG_CRIT,("Failed to open tdb '%s' - retrying after CLEAR_IF_FIRST\n",
1277 persistent_health_path));
1278 tdb = tdb_wrap_open(ctdb, persistent_health_path,
1279 0, TDB_CLEAR_IF_FIRST | TDB_DISALLOW_NESTING,
1280 O_CREAT | O_RDWR, 0600);
1281 if (tdb) {
1282 DEBUG(DEBUG_CRIT,("Failed to open tdb '%s' - with CLEAR_IF_FIRST: %d - %s\n",
1283 persistent_health_path,
1284 errno,
1285 strerror(errno)));
1286 talloc_free(persistent_health_path);
1287 talloc_free(unhealthy_reason);
1288 return -1;
1291 talloc_free(tdb);
1292 goto again;
1294 ret = tdb_check(ctdb->db_persistent_health->tdb, NULL, NULL);
1295 if (ret != 0) {
1296 struct tdb_wrap *tdb;
1298 talloc_free(ctdb->db_persistent_health);
1299 ctdb->db_persistent_health = NULL;
1301 if (!first_try) {
1302 DEBUG(DEBUG_CRIT,("tdb_check('%s') failed\n",
1303 persistent_health_path));
1304 talloc_free(persistent_health_path);
1305 talloc_free(unhealthy_reason);
1306 return -1;
1308 first_try = false;
1310 unhealthy_reason = talloc_asprintf(ctdb, "WARNING - '%s' %s - %s",
1311 persistent_health_path,
1312 "was cleared after a failure",
1313 "manual verification needed");
1314 if (unhealthy_reason == NULL) {
1315 DEBUG(DEBUG_CRIT,(__location__ " talloc_asprintf() failed\n"));
1316 talloc_free(persistent_health_path);
1317 return -1;
1320 DEBUG(DEBUG_CRIT,("tdb_check('%s') failed - retrying after CLEAR_IF_FIRST\n",
1321 persistent_health_path));
1322 tdb = tdb_wrap_open(ctdb, persistent_health_path,
1323 0, TDB_CLEAR_IF_FIRST | TDB_DISALLOW_NESTING,
1324 O_CREAT | O_RDWR, 0600);
1325 if (tdb) {
1326 DEBUG(DEBUG_CRIT,("Failed to open tdb '%s' - with CLEAR_IF_FIRST: %d - %s\n",
1327 persistent_health_path,
1328 errno,
1329 strerror(errno)));
1330 talloc_free(persistent_health_path);
1331 talloc_free(unhealthy_reason);
1332 return -1;
1335 talloc_free(tdb);
1336 goto again;
1338 talloc_free(persistent_health_path);
1340 ret = ctdb_attach_persistent(ctdb, unhealthy_reason);
1341 talloc_free(unhealthy_reason);
1342 if (ret != 0) {
1343 return ret;
1346 return 0;
1350 called when a broadcast seqnum update comes in
1352 int32_t ctdb_ltdb_update_seqnum(struct ctdb_context *ctdb, uint32_t db_id, uint32_t srcnode)
1354 struct ctdb_db_context *ctdb_db;
1355 if (srcnode == ctdb->pnn) {
1356 /* don't update ourselves! */
1357 return 0;
1360 ctdb_db = find_ctdb_db(ctdb, db_id);
1361 if (!ctdb_db) {
1362 DEBUG(DEBUG_ERR,("Unknown db_id 0x%x in ctdb_ltdb_update_seqnum\n", db_id));
1363 return -1;
1366 if (ctdb_db->unhealthy_reason) {
1367 DEBUG(DEBUG_ERR,("db(%s) unhealty in ctdb_ltdb_update_seqnum: %s\n",
1368 ctdb_db->db_name, ctdb_db->unhealthy_reason));
1369 return -1;
1372 tdb_increment_seqnum_nonblock(ctdb_db->ltdb->tdb);
1373 ctdb_db->seqnum = tdb_get_seqnum(ctdb_db->ltdb->tdb);
1374 return 0;
1378 timer to check for seqnum changes in a ltdb and propogate them
1380 static void ctdb_ltdb_seqnum_check(struct event_context *ev, struct timed_event *te,
1381 struct timeval t, void *p)
1383 struct ctdb_db_context *ctdb_db = talloc_get_type(p, struct ctdb_db_context);
1384 struct ctdb_context *ctdb = ctdb_db->ctdb;
1385 uint32_t new_seqnum = tdb_get_seqnum(ctdb_db->ltdb->tdb);
1386 if (new_seqnum != ctdb_db->seqnum) {
1387 /* something has changed - propogate it */
1388 TDB_DATA data;
1389 data.dptr = (uint8_t *)&ctdb_db->db_id;
1390 data.dsize = sizeof(uint32_t);
1391 ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_VNNMAP, 0,
1392 CTDB_CONTROL_UPDATE_SEQNUM, 0, CTDB_CTRL_FLAG_NOREPLY,
1393 data, NULL, NULL);
1395 ctdb_db->seqnum = new_seqnum;
1397 /* setup a new timer */
1398 ctdb_db->seqnum_update =
1399 event_add_timed(ctdb->ev, ctdb_db,
1400 timeval_current_ofs(ctdb->tunable.seqnum_interval/1000, (ctdb->tunable.seqnum_interval%1000)*1000),
1401 ctdb_ltdb_seqnum_check, ctdb_db);
1405 enable seqnum handling on this db
1407 int32_t ctdb_ltdb_enable_seqnum(struct ctdb_context *ctdb, uint32_t db_id)
1409 struct ctdb_db_context *ctdb_db;
1410 ctdb_db = find_ctdb_db(ctdb, db_id);
1411 if (!ctdb_db) {
1412 DEBUG(DEBUG_ERR,("Unknown db_id 0x%x in ctdb_ltdb_enable_seqnum\n", db_id));
1413 return -1;
1416 if (ctdb_db->seqnum_update == NULL) {
1417 ctdb_db->seqnum_update =
1418 event_add_timed(ctdb->ev, ctdb_db,
1419 timeval_current_ofs(ctdb->tunable.seqnum_interval/1000, (ctdb->tunable.seqnum_interval%1000)*1000),
1420 ctdb_ltdb_seqnum_check, ctdb_db);
1423 tdb_enable_seqnum(ctdb_db->ltdb->tdb);
1424 ctdb_db->seqnum = tdb_get_seqnum(ctdb_db->ltdb->tdb);
1425 return 0;
1428 int32_t ctdb_control_set_db_priority(struct ctdb_context *ctdb, TDB_DATA indata)
1430 struct ctdb_db_priority *db_prio = (struct ctdb_db_priority *)indata.dptr;
1431 struct ctdb_db_context *ctdb_db;
1433 ctdb_db = find_ctdb_db(ctdb, db_prio->db_id);
1434 if (!ctdb_db) {
1435 DEBUG(DEBUG_ERR,("Unknown db_id 0x%x in ctdb_set_db_priority\n", db_prio->db_id));
1436 return 0;
1439 if ((db_prio->priority<1) || (db_prio->priority>NUM_DB_PRIORITIES)) {
1440 DEBUG(DEBUG_ERR,("Trying to set invalid priority : %u\n", db_prio->priority));
1441 return 0;
1444 ctdb_db->priority = db_prio->priority;
1445 DEBUG(DEBUG_INFO,("Setting DB priority to %u for db 0x%08x\n", db_prio->priority, db_prio->db_id));
1447 return 0;
1451 int ctdb_set_db_sticky(struct ctdb_context *ctdb, struct ctdb_db_context *ctdb_db)
1453 if (ctdb_db->sticky) {
1454 return 0;
1457 if (ctdb_db->persistent) {
1458 DEBUG(DEBUG_ERR,("Trying to set persistent database with sticky property\n"));
1459 return -1;
1462 ctdb_db->sticky_records = trbt_create(ctdb_db, 0);
1464 ctdb_db->sticky = true;
1466 DEBUG(DEBUG_NOTICE,("set db sticky %s\n", ctdb_db->db_name));
1468 return 0;
1471 int32_t ctdb_control_get_db_statistics(struct ctdb_context *ctdb,
1472 uint32_t db_id,
1473 TDB_DATA *outdata)
1475 struct ctdb_db_context *ctdb_db;
1476 struct ctdb_db_statistics *stats;
1477 int i;
1478 int len;
1479 char *ptr;
1481 ctdb_db = find_ctdb_db(ctdb, db_id);
1482 if (!ctdb_db) {
1483 DEBUG(DEBUG_ERR,("Unknown db_id 0x%x in get_db_statistics\n", db_id));
1484 return -1;
1487 len = offsetof(struct ctdb_db_statistics, hot_keys_wire);
1488 for (i = 0; i < MAX_HOT_KEYS; i++) {
1489 len += ctdb_db->statistics.hot_keys[i].key.dsize;
1492 stats = talloc_size(outdata, len);
1493 if (stats == NULL) {
1494 DEBUG(DEBUG_ERR,("Failed to allocate db statistics structure\n"));
1495 return -1;
1498 *stats = ctdb_db->statistics;
1500 stats->num_hot_keys = MAX_HOT_KEYS;
1502 ptr = &stats->hot_keys_wire[0];
1503 for (i = 0; i < MAX_HOT_KEYS; i++) {
1504 memcpy(ptr, ctdb_db->statistics.hot_keys[i].key.dptr,
1505 ctdb_db->statistics.hot_keys[i].key.dsize);
1506 ptr += ctdb_db->statistics.hot_keys[i].key.dsize;
1509 outdata->dptr = (uint8_t *)stats;
1510 outdata->dsize = len;
1512 return 0;