Lock consumer data before fd check during destroy
[lttng-tools.git] / src / bin / lttng-sessiond / consumer.c
CommitLineData
00e2e675
DG
1/*
2 * Copyright (C) 2012 - David Goulet <dgoulet@efficios.com>
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License, version 2 only, as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 51
15 * Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
16 */
17
18#define _GNU_SOURCE
19#include <assert.h>
20#include <stdio.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/stat.h>
24#include <sys/types.h>
25#include <unistd.h>
d88aee68 26#include <inttypes.h>
00e2e675
DG
27
28#include <common/common.h>
29#include <common/defaults.h>
30#include <common/uri.h>
31
32#include "consumer.h"
7972aab2
DG
33#include "health.h"
34#include "ust-app.h"
0b2dc8df 35#include "utils.h"
00e2e675 36
52898cb1
DG
37/*
38 * Send a data payload using a given consumer socket of size len.
39 *
40 * The consumer socket lock MUST be acquired before calling this since this
41 * function can change the fd value.
42 *
43 * Return 0 on success else a negative value on error.
44 */
45int consumer_socket_send(struct consumer_socket *socket, void *msg, size_t len)
46{
47 int fd;
48 ssize_t size;
49
50 assert(socket);
51 assert(socket->fd);
52 assert(msg);
53
54 /* Consumer socket is invalid. Stopping. */
55 fd = *socket->fd;
56 if (fd < 0) {
57 goto error;
58 }
59
60 size = lttcomm_send_unix_sock(fd, msg, len);
61 if (size < 0) {
62 /* The above call will print a PERROR on error. */
63 DBG("Error when sending data to consumer on sock %d", fd);
64 /*
65 * At this point, the socket is not usable anymore thus flagging it
66 * invalid and closing it.
67 */
68
69 /* This call will PERROR on error. */
70 (void) lttcomm_close_unix_sock(fd);
71 *socket->fd = -1;
72 goto error;
73 }
74
75 return 0;
76
77error:
78 return -1;
79}
80
81/*
82 * Receive a data payload using a given consumer socket of size len.
83 *
84 * The consumer socket lock MUST be acquired before calling this since this
85 * function can change the fd value.
86 *
87 * Return 0 on success else a negative value on error.
88 */
89int consumer_socket_recv(struct consumer_socket *socket, void *msg, size_t len)
90{
91 int fd;
92 ssize_t size;
93
94 assert(socket);
95 assert(socket->fd);
96 assert(msg);
97
98 /* Consumer socket is invalid. Stopping. */
99 fd = *socket->fd;
100 if (fd < 0) {
101 goto error;
102 }
103
104 size = lttcomm_recv_unix_sock(fd, msg, len);
105 if (size <= 0) {
106 /* The above call will print a PERROR on error. */
107 DBG("Error when receiving data from the consumer socket %d", fd);
108 /*
109 * At this point, the socket is not usable anymore thus flagging it
110 * invalid and closing it.
111 */
112
113 /* This call will PERROR on error. */
114 (void) lttcomm_close_unix_sock(fd);
115 *socket->fd = -1;
116 goto error;
117 }
118
119 return 0;
120
121error:
122 return -1;
123}
124
f50f23d9
DG
125/*
126 * Receive a reply command status message from the consumer. Consumer socket
127 * lock MUST be acquired before calling this function.
128 *
129 * Return 0 on success, -1 on recv error or a negative lttng error code which
130 * was possibly returned by the consumer.
131 */
132int consumer_recv_status_reply(struct consumer_socket *sock)
133{
134 int ret;
135 struct lttcomm_consumer_status_msg reply;
136
137 assert(sock);
138
52898cb1
DG
139 ret = consumer_socket_recv(sock, &reply, sizeof(reply));
140 if (ret < 0) {
f50f23d9
DG
141 goto end;
142 }
143
144 if (reply.ret_code == LTTNG_OK) {
145 /* All good. */
146 ret = 0;
147 } else {
148 ret = -reply.ret_code;
ffe60014 149 DBG("Consumer ret code %d", ret);
f50f23d9
DG
150 }
151
152end:
153 return ret;
154}
155
ffe60014
DG
156/*
157 * Once the ASK_CHANNEL command is sent to the consumer, the channel
158 * information are sent back. This call receives that data and populates key
159 * and stream_count.
160 *
161 * On success return 0 and both key and stream_count are set. On error, a
162 * negative value is sent back and both parameters are untouched.
163 */
164int consumer_recv_status_channel(struct consumer_socket *sock,
d88aee68 165 uint64_t *key, unsigned int *stream_count)
ffe60014
DG
166{
167 int ret;
168 struct lttcomm_consumer_status_channel reply;
169
170 assert(sock);
171 assert(stream_count);
172 assert(key);
173
52898cb1
DG
174 ret = consumer_socket_recv(sock, &reply, sizeof(reply));
175 if (ret < 0) {
ffe60014
DG
176 goto end;
177 }
178
179 /* An error is possible so don't touch the key and stream_count. */
180 if (reply.ret_code != LTTNG_OK) {
181 ret = -1;
182 goto end;
183 }
184
185 *key = reply.key;
186 *stream_count = reply.stream_count;
187
188end:
189 return ret;
190}
191
2f77fc4b
DG
192/*
193 * Send destroy relayd command to consumer.
194 *
195 * On success return positive value. On error, negative value.
196 */
197int consumer_send_destroy_relayd(struct consumer_socket *sock,
198 struct consumer_output *consumer)
199{
200 int ret;
201 struct lttcomm_consumer_msg msg;
202
203 assert(consumer);
204 assert(sock);
205
4ce514c4 206 DBG2("Sending destroy relayd command to consumer sock %d", *sock->fd);
2f77fc4b 207
2f77fc4b
DG
208 msg.cmd_type = LTTNG_CONSUMER_DESTROY_RELAYD;
209 msg.u.destroy_relayd.net_seq_idx = consumer->net_seq_index;
210
211 pthread_mutex_lock(sock->lock);
52898cb1 212 ret = consumer_socket_send(sock, &msg, sizeof(msg));
2f77fc4b 213 if (ret < 0) {
52898cb1 214 goto error;
2f77fc4b
DG
215 }
216
f50f23d9
DG
217 /* Don't check the return value. The caller will do it. */
218 ret = consumer_recv_status_reply(sock);
219
2f77fc4b
DG
220 DBG2("Consumer send destroy relayd command done");
221
222error:
52898cb1 223 pthread_mutex_unlock(sock->lock);
2f77fc4b
DG
224 return ret;
225}
226
227/*
228 * For each consumer socket in the consumer output object, send a destroy
229 * relayd command.
230 */
231void consumer_output_send_destroy_relayd(struct consumer_output *consumer)
232{
2f77fc4b
DG
233 struct lttng_ht_iter iter;
234 struct consumer_socket *socket;
235
236 assert(consumer);
237
238 /* Destroy any relayd connection */
6dc3064a 239 if (consumer->type == CONSUMER_DST_NET) {
2f77fc4b
DG
240 rcu_read_lock();
241 cds_lfht_for_each_entry(consumer->socks->ht, &iter.iter, socket,
242 node.node) {
c617c0c6
MD
243 int ret;
244
2f77fc4b
DG
245 /* Send destroy relayd command */
246 ret = consumer_send_destroy_relayd(socket, consumer);
247 if (ret < 0) {
c5c45efa 248 DBG("Unable to send destroy relayd command to consumer");
2f77fc4b
DG
249 /* Continue since we MUST delete everything at this point. */
250 }
251 }
252 rcu_read_unlock();
253 }
254}
255
a4b92340
DG
256/*
257 * From a consumer_data structure, allocate and add a consumer socket to the
258 * consumer output.
259 *
260 * Return 0 on success, else negative value on error
261 */
262int consumer_create_socket(struct consumer_data *data,
263 struct consumer_output *output)
264{
265 int ret = 0;
266 struct consumer_socket *socket;
267
268 assert(data);
269
270 if (output == NULL || data->cmd_sock < 0) {
271 /*
272 * Not an error. Possible there is simply not spawned consumer or it's
273 * disabled for the tracing session asking the socket.
274 */
275 goto error;
276 }
277
278 rcu_read_lock();
279 socket = consumer_find_socket(data->cmd_sock, output);
280 rcu_read_unlock();
281 if (socket == NULL) {
4ce514c4 282 socket = consumer_allocate_socket(&data->cmd_sock);
a4b92340
DG
283 if (socket == NULL) {
284 ret = -1;
285 goto error;
286 }
287
2f77fc4b 288 socket->registered = 0;
a4b92340
DG
289 socket->lock = &data->lock;
290 rcu_read_lock();
291 consumer_add_socket(socket, output);
292 rcu_read_unlock();
293 }
294
6dc3064a
DG
295 socket->type = data->type;
296
a4b92340
DG
297 DBG3("Consumer socket created (fd: %d) and added to output",
298 data->cmd_sock);
299
300error:
301 return ret;
302}
303
7972aab2
DG
304/*
305 * Return the consumer socket from the given consumer output with the right
306 * bitness. On error, returns NULL.
307 *
308 * The caller MUST acquire a rcu read side lock and keep it until the socket
309 * object reference is not needed anymore.
310 */
311struct consumer_socket *consumer_find_socket_by_bitness(int bits,
312 struct consumer_output *consumer)
313{
314 int consumer_fd;
315 struct consumer_socket *socket = NULL;
316
317 switch (bits) {
318 case 64:
319 consumer_fd = uatomic_read(&ust_consumerd64_fd);
320 break;
321 case 32:
322 consumer_fd = uatomic_read(&ust_consumerd32_fd);
323 break;
324 default:
325 assert(0);
326 goto end;
327 }
328
329 socket = consumer_find_socket(consumer_fd, consumer);
330 if (!socket) {
331 ERR("Consumer socket fd %d not found in consumer obj %p",
332 consumer_fd, consumer);
333 }
334
335end:
336 return socket;
337}
338
173af62f
DG
339/*
340 * Find a consumer_socket in a consumer_output hashtable. Read side lock must
341 * be acquired before calling this function and across use of the
342 * returned consumer_socket.
343 */
344struct consumer_socket *consumer_find_socket(int key,
345 struct consumer_output *consumer)
346{
347 struct lttng_ht_iter iter;
348 struct lttng_ht_node_ulong *node;
349 struct consumer_socket *socket = NULL;
350
351 /* Negative keys are lookup failures */
a4b92340 352 if (key < 0 || consumer == NULL) {
173af62f
DG
353 return NULL;
354 }
355
356 lttng_ht_lookup(consumer->socks, (void *)((unsigned long) key),
357 &iter);
358 node = lttng_ht_iter_get_node_ulong(&iter);
359 if (node != NULL) {
360 socket = caa_container_of(node, struct consumer_socket, node);
361 }
362
363 return socket;
364}
365
366/*
367 * Allocate a new consumer_socket and return the pointer.
368 */
4ce514c4 369struct consumer_socket *consumer_allocate_socket(int *fd)
173af62f
DG
370{
371 struct consumer_socket *socket = NULL;
372
4ce514c4
DG
373 assert(fd);
374
173af62f
DG
375 socket = zmalloc(sizeof(struct consumer_socket));
376 if (socket == NULL) {
377 PERROR("zmalloc consumer socket");
378 goto error;
379 }
380
381 socket->fd = fd;
4ce514c4 382 lttng_ht_node_init_ulong(&socket->node, *fd);
173af62f
DG
383
384error:
385 return socket;
386}
387
388/*
389 * Add consumer socket to consumer output object. Read side lock must be
390 * acquired before calling this function.
391 */
392void consumer_add_socket(struct consumer_socket *sock,
393 struct consumer_output *consumer)
394{
395 assert(sock);
396 assert(consumer);
397
398 lttng_ht_add_unique_ulong(consumer->socks, &sock->node);
399}
400
401/*
402 * Delte consumer socket to consumer output object. Read side lock must be
403 * acquired before calling this function.
404 */
405void consumer_del_socket(struct consumer_socket *sock,
406 struct consumer_output *consumer)
407{
408 int ret;
409 struct lttng_ht_iter iter;
410
411 assert(sock);
412 assert(consumer);
413
414 iter.iter.node = &sock->node.node;
415 ret = lttng_ht_del(consumer->socks, &iter);
416 assert(!ret);
417}
418
419/*
420 * RCU destroy call function.
421 */
422static void destroy_socket_rcu(struct rcu_head *head)
423{
424 struct lttng_ht_node_ulong *node =
425 caa_container_of(head, struct lttng_ht_node_ulong, head);
426 struct consumer_socket *socket =
427 caa_container_of(node, struct consumer_socket, node);
428
429 free(socket);
430}
431
432/*
433 * Destroy and free socket pointer in a call RCU. Read side lock must be
434 * acquired before calling this function.
435 */
436void consumer_destroy_socket(struct consumer_socket *sock)
437{
438 assert(sock);
439
440 /*
441 * We DO NOT close the file descriptor here since it is global to the
2f77fc4b
DG
442 * session daemon and is closed only if the consumer dies or a custom
443 * consumer was registered,
173af62f 444 */
2f77fc4b 445 if (sock->registered) {
4ce514c4
DG
446 DBG3("Consumer socket was registered. Closing fd %d", *sock->fd);
447 lttcomm_close_unix_sock(*sock->fd);
2f77fc4b 448 }
173af62f
DG
449
450 call_rcu(&sock->node.head, destroy_socket_rcu);
451}
452
00e2e675
DG
453/*
454 * Allocate and assign data to a consumer_output object.
455 *
456 * Return pointer to structure.
457 */
458struct consumer_output *consumer_create_output(enum consumer_dst_type type)
459{
460 struct consumer_output *output = NULL;
461
462 output = zmalloc(sizeof(struct consumer_output));
463 if (output == NULL) {
464 PERROR("zmalloc consumer_output");
465 goto error;
466 }
467
468 /* By default, consumer output is enabled */
469 output->enabled = 1;
470 output->type = type;
d88aee68 471 output->net_seq_index = (uint64_t) -1ULL;
173af62f
DG
472
473 output->socks = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
00e2e675
DG
474
475error:
476 return output;
477}
478
af706bb7
DG
479/*
480 * Iterate over the consumer output socket hash table and destroy them. The
481 * socket file descriptor are only closed if the consumer output was
482 * registered meaning it's an external consumer.
483 */
484void consumer_destroy_output_sockets(struct consumer_output *obj)
485{
486 struct lttng_ht_iter iter;
487 struct consumer_socket *socket;
488
489 if (!obj->socks) {
490 return;
491 }
492
493 rcu_read_lock();
494 cds_lfht_for_each_entry(obj->socks->ht, &iter.iter, socket, node.node) {
495 consumer_del_socket(socket, obj);
496 consumer_destroy_socket(socket);
497 }
498 rcu_read_unlock();
499}
500
00e2e675
DG
501/*
502 * Delete the consumer_output object from the list and free the ptr.
36b588ed
MD
503 *
504 * Should *NOT* be called with RCU read-side lock held.
00e2e675
DG
505 */
506void consumer_destroy_output(struct consumer_output *obj)
507{
508 if (obj == NULL) {
509 return;
510 }
511
af706bb7 512 consumer_destroy_output_sockets(obj);
2f77fc4b 513
af706bb7 514 if (obj->socks) {
2f77fc4b 515 /* Finally destroy HT */
0b2dc8df 516 ht_cleanup_push(obj->socks);
00e2e675 517 }
173af62f 518
00e2e675
DG
519 free(obj);
520}
521
522/*
523 * Copy consumer output and returned the newly allocated copy.
36b588ed
MD
524 *
525 * Should *NOT* be called with RCU read-side lock held.
00e2e675
DG
526 */
527struct consumer_output *consumer_copy_output(struct consumer_output *obj)
528{
6dc3064a 529 int ret;
09a90bcd 530 struct lttng_ht *tmp_ht_ptr;
00e2e675
DG
531 struct consumer_output *output;
532
533 assert(obj);
534
535 output = consumer_create_output(obj->type);
536 if (output == NULL) {
537 goto error;
538 }
09a90bcd
DG
539 /* Avoid losing the HT reference after the memcpy() */
540 tmp_ht_ptr = output->socks;
00e2e675
DG
541
542 memcpy(output, obj, sizeof(struct consumer_output));
543
09a90bcd
DG
544 /* Putting back the HT pointer and start copying socket(s). */
545 output->socks = tmp_ht_ptr;
173af62f 546
6dc3064a
DG
547 ret = consumer_copy_sockets(output, obj);
548 if (ret < 0) {
549 goto malloc_error;
550 }
551
552error:
553 return output;
554
555malloc_error:
556 consumer_destroy_output(output);
557 return NULL;
558}
559
560/*
561 * Copy consumer sockets from src to dst.
562 *
563 * Return 0 on success or else a negative value.
564 */
565int consumer_copy_sockets(struct consumer_output *dst,
566 struct consumer_output *src)
567{
568 int ret = 0;
569 struct lttng_ht_iter iter;
570 struct consumer_socket *socket, *copy_sock;
571
572 assert(dst);
573 assert(src);
574
b82c5c4d 575 rcu_read_lock();
6dc3064a
DG
576 cds_lfht_for_each_entry(src->socks->ht, &iter.iter, socket, node.node) {
577 /* Ignore socket that are already there. */
4ce514c4 578 copy_sock = consumer_find_socket(*socket->fd, dst);
6dc3064a
DG
579 if (copy_sock) {
580 continue;
581 }
582
173af62f
DG
583 /* Create new socket object. */
584 copy_sock = consumer_allocate_socket(socket->fd);
585 if (copy_sock == NULL) {
b82c5c4d 586 rcu_read_unlock();
6dc3064a
DG
587 ret = -ENOMEM;
588 goto error;
173af62f
DG
589 }
590
09a90bcd 591 copy_sock->registered = socket->registered;
6dc3064a
DG
592 /*
593 * This is valid because this lock is shared accross all consumer
594 * object being the global lock of the consumer data structure of the
595 * session daemon.
596 */
173af62f 597 copy_sock->lock = socket->lock;
6dc3064a 598 consumer_add_socket(copy_sock, dst);
173af62f 599 }
b82c5c4d 600 rcu_read_unlock();
173af62f 601
00e2e675 602error:
6dc3064a 603 return ret;
00e2e675
DG
604}
605
606/*
607 * Set network URI to the consumer output object.
608 *
ad20f474
DG
609 * Return 0 on success. Return 1 if the URI were equal. Else, negative value on
610 * error.
00e2e675
DG
611 */
612int consumer_set_network_uri(struct consumer_output *obj,
613 struct lttng_uri *uri)
614{
615 int ret;
616 char tmp_path[PATH_MAX];
617 char hostname[HOST_NAME_MAX];
618 struct lttng_uri *dst_uri = NULL;
619
620 /* Code flow error safety net. */
621 assert(obj);
622 assert(uri);
623
624 switch (uri->stype) {
625 case LTTNG_STREAM_CONTROL:
626 dst_uri = &obj->dst.net.control;
627 obj->dst.net.control_isset = 1;
628 if (uri->port == 0) {
629 /* Assign default port. */
630 uri->port = DEFAULT_NETWORK_CONTROL_PORT;
a74934ba
DG
631 } else {
632 if (obj->dst.net.data_isset && uri->port ==
633 obj->dst.net.data.port) {
634 ret = -LTTNG_ERR_INVALID;
635 goto error;
636 }
00e2e675 637 }
ad20f474 638 DBG3("Consumer control URI set with port %d", uri->port);
00e2e675
DG
639 break;
640 case LTTNG_STREAM_DATA:
641 dst_uri = &obj->dst.net.data;
642 obj->dst.net.data_isset = 1;
643 if (uri->port == 0) {
644 /* Assign default port. */
645 uri->port = DEFAULT_NETWORK_DATA_PORT;
a74934ba
DG
646 } else {
647 if (obj->dst.net.control_isset && uri->port ==
648 obj->dst.net.control.port) {
649 ret = -LTTNG_ERR_INVALID;
650 goto error;
651 }
00e2e675 652 }
ad20f474 653 DBG3("Consumer data URI set with port %d", uri->port);
00e2e675
DG
654 break;
655 default:
656 ERR("Set network uri type unknown %d", uri->stype);
a74934ba 657 ret = -LTTNG_ERR_INVALID;
00e2e675
DG
658 goto error;
659 }
660
661 ret = uri_compare(dst_uri, uri);
662 if (!ret) {
663 /* Same URI, don't touch it and return success. */
664 DBG3("URI network compare are the same");
ad20f474 665 goto equal;
00e2e675
DG
666 }
667
668 /* URIs were not equal, replacing it. */
669 memset(dst_uri, 0, sizeof(struct lttng_uri));
670 memcpy(dst_uri, uri, sizeof(struct lttng_uri));
671 obj->type = CONSUMER_DST_NET;
672
673 /* Handle subdir and add hostname in front. */
674 if (dst_uri->stype == LTTNG_STREAM_CONTROL) {
675 /* Get hostname to append it in the pathname */
676 ret = gethostname(hostname, sizeof(hostname));
677 if (ret < 0) {
678 PERROR("gethostname. Fallback on default localhost");
679 strncpy(hostname, "localhost", sizeof(hostname));
680 }
681 hostname[sizeof(hostname) - 1] = '\0';
682
683 /* Setup consumer subdir if none present in the control URI */
684 if (strlen(dst_uri->subdir) == 0) {
685 ret = snprintf(tmp_path, sizeof(tmp_path), "%s/%s",
686 hostname, obj->subdir);
687 } else {
688 ret = snprintf(tmp_path, sizeof(tmp_path), "%s/%s",
689 hostname, dst_uri->subdir);
690 }
691 if (ret < 0) {
692 PERROR("snprintf set consumer uri subdir");
a74934ba 693 ret = -LTTNG_ERR_NOMEM;
00e2e675
DG
694 goto error;
695 }
696
697 strncpy(obj->subdir, tmp_path, sizeof(obj->subdir));
698 DBG3("Consumer set network uri subdir path %s", tmp_path);
699 }
700
00e2e675 701 return 0;
ad20f474
DG
702equal:
703 return 1;
00e2e675 704error:
a74934ba 705 return ret;
00e2e675
DG
706}
707
708/*
709 * Send file descriptor to consumer via sock.
710 */
f50f23d9 711int consumer_send_fds(struct consumer_socket *sock, int *fds, size_t nb_fd)
00e2e675
DG
712{
713 int ret;
714
715 assert(fds);
f50f23d9 716 assert(sock);
4ce514c4 717 assert(sock->fd);
00e2e675
DG
718 assert(nb_fd > 0);
719
4ce514c4 720 ret = lttcomm_send_fds_unix_sock(*sock->fd, fds, nb_fd);
00e2e675 721 if (ret < 0) {
3448e266 722 /* The above call will print a PERROR on error. */
4ce514c4 723 DBG("Error when sending consumer fds on sock %d", *sock->fd);
00e2e675
DG
724 goto error;
725 }
726
f50f23d9
DG
727 ret = consumer_recv_status_reply(sock);
728
00e2e675
DG
729error:
730 return ret;
731}
732
ffe60014
DG
733/*
734 * Consumer send communication message structure to consumer.
735 */
736int consumer_send_msg(struct consumer_socket *sock,
737 struct lttcomm_consumer_msg *msg)
738{
739 int ret;
740
741 assert(msg);
742 assert(sock);
4ce514c4 743 assert(sock->fd);
ffe60014 744
52898cb1 745 ret = consumer_socket_send(sock, msg, sizeof(struct lttcomm_consumer_msg));
ffe60014 746 if (ret < 0) {
ffe60014
DG
747 goto error;
748 }
749
750 ret = consumer_recv_status_reply(sock);
751
752error:
753 return ret;
754}
755
00e2e675
DG
756/*
757 * Consumer send channel communication message structure to consumer.
758 */
f50f23d9
DG
759int consumer_send_channel(struct consumer_socket *sock,
760 struct lttcomm_consumer_msg *msg)
00e2e675
DG
761{
762 int ret;
763
764 assert(msg);
f50f23d9 765 assert(sock);
4ce514c4 766 assert(sock->fd);
00e2e675 767
52898cb1 768 ret = consumer_send_msg(sock, msg);
00e2e675 769 if (ret < 0) {
00e2e675
DG
770 goto error;
771 }
772
773error:
774 return ret;
775}
776
ffe60014
DG
777/*
778 * Populate the given consumer msg structure with the ask_channel command
779 * information.
780 */
781void consumer_init_ask_channel_comm_msg(struct lttcomm_consumer_msg *msg,
782 uint64_t subbuf_size,
783 uint64_t num_subbuf,
784 int overwrite,
785 unsigned int switch_timer_interval,
786 unsigned int read_timer_interval,
787 int output,
788 int type,
789 uint64_t session_id,
790 const char *pathname,
791 const char *name,
792 uid_t uid,
793 gid_t gid,
d88aee68
DG
794 uint64_t relayd_id,
795 uint64_t key,
7972aab2 796 unsigned char *uuid,
1624d5b7
JD
797 uint32_t chan_id,
798 uint64_t tracefile_size,
2bba9e53 799 uint64_t tracefile_count,
1950109e 800 uint64_t session_id_per_pid,
567eb353
DG
801 unsigned int monitor,
802 uint32_t ust_app_uid)
ffe60014
DG
803{
804 assert(msg);
805
806 /* Zeroed structure */
807 memset(msg, 0, sizeof(struct lttcomm_consumer_msg));
808
809 msg->cmd_type = LTTNG_CONSUMER_ASK_CHANNEL_CREATION;
810 msg->u.ask_channel.subbuf_size = subbuf_size;
811 msg->u.ask_channel.num_subbuf = num_subbuf ;
812 msg->u.ask_channel.overwrite = overwrite;
813 msg->u.ask_channel.switch_timer_interval = switch_timer_interval;
814 msg->u.ask_channel.read_timer_interval = read_timer_interval;
815 msg->u.ask_channel.output = output;
816 msg->u.ask_channel.type = type;
817 msg->u.ask_channel.session_id = session_id;
1950109e 818 msg->u.ask_channel.session_id_per_pid = session_id_per_pid;
ffe60014
DG
819 msg->u.ask_channel.uid = uid;
820 msg->u.ask_channel.gid = gid;
821 msg->u.ask_channel.relayd_id = relayd_id;
822 msg->u.ask_channel.key = key;
7972aab2 823 msg->u.ask_channel.chan_id = chan_id;
1624d5b7
JD
824 msg->u.ask_channel.tracefile_size = tracefile_size;
825 msg->u.ask_channel.tracefile_count = tracefile_count;
2bba9e53 826 msg->u.ask_channel.monitor = monitor;
567eb353 827 msg->u.ask_channel.ust_app_uid = ust_app_uid;
ffe60014
DG
828
829 memcpy(msg->u.ask_channel.uuid, uuid, sizeof(msg->u.ask_channel.uuid));
830
10a50311
JD
831 if (pathname) {
832 strncpy(msg->u.ask_channel.pathname, pathname,
833 sizeof(msg->u.ask_channel.pathname));
834 msg->u.ask_channel.pathname[sizeof(msg->u.ask_channel.pathname)-1] = '\0';
835 }
ffe60014
DG
836
837 strncpy(msg->u.ask_channel.name, name, sizeof(msg->u.ask_channel.name));
838 msg->u.ask_channel.name[sizeof(msg->u.ask_channel.name) - 1] = '\0';
839}
840
00e2e675
DG
841/*
842 * Init channel communication message structure.
843 */
844void consumer_init_channel_comm_msg(struct lttcomm_consumer_msg *msg,
845 enum lttng_consumer_command cmd,
d88aee68 846 uint64_t channel_key,
ffe60014
DG
847 uint64_t session_id,
848 const char *pathname,
849 uid_t uid,
850 gid_t gid,
d88aee68 851 uint64_t relayd_id,
c30aaa51 852 const char *name,
ffe60014
DG
853 unsigned int nb_init_streams,
854 enum lttng_event_output output,
1624d5b7
JD
855 int type,
856 uint64_t tracefile_size,
2bba9e53
DG
857 uint64_t tracefile_count,
858 unsigned int monitor)
00e2e675
DG
859{
860 assert(msg);
861
00e2e675
DG
862 /* Zeroed structure */
863 memset(msg, 0, sizeof(struct lttcomm_consumer_msg));
864
865 /* Send channel */
866 msg->cmd_type = cmd;
867 msg->u.channel.channel_key = channel_key;
ffe60014
DG
868 msg->u.channel.session_id = session_id;
869 msg->u.channel.uid = uid;
870 msg->u.channel.gid = gid;
871 msg->u.channel.relayd_id = relayd_id;
c30aaa51 872 msg->u.channel.nb_init_streams = nb_init_streams;
ffe60014
DG
873 msg->u.channel.output = output;
874 msg->u.channel.type = type;
1624d5b7
JD
875 msg->u.channel.tracefile_size = tracefile_size;
876 msg->u.channel.tracefile_count = tracefile_count;
2bba9e53 877 msg->u.channel.monitor = monitor;
ffe60014
DG
878
879 strncpy(msg->u.channel.pathname, pathname,
880 sizeof(msg->u.channel.pathname));
881 msg->u.channel.pathname[sizeof(msg->u.channel.pathname) - 1] = '\0';
882
883 strncpy(msg->u.channel.name, name, sizeof(msg->u.channel.name));
884 msg->u.channel.name[sizeof(msg->u.channel.name) - 1] = '\0';
00e2e675
DG
885}
886
887/*
888 * Init stream communication message structure.
889 */
890void consumer_init_stream_comm_msg(struct lttcomm_consumer_msg *msg,
891 enum lttng_consumer_command cmd,
d88aee68
DG
892 uint64_t channel_key,
893 uint64_t stream_key,
ffe60014 894 int cpu)
00e2e675
DG
895{
896 assert(msg);
897
898 memset(msg, 0, sizeof(struct lttcomm_consumer_msg));
899
00e2e675
DG
900 msg->cmd_type = cmd;
901 msg->u.stream.channel_key = channel_key;
902 msg->u.stream.stream_key = stream_key;
ffe60014 903 msg->u.stream.cpu = cpu;
00e2e675
DG
904}
905
906/*
907 * Send stream communication structure to the consumer.
908 */
f50f23d9
DG
909int consumer_send_stream(struct consumer_socket *sock,
910 struct consumer_output *dst, struct lttcomm_consumer_msg *msg,
911 int *fds, size_t nb_fd)
00e2e675
DG
912{
913 int ret;
914
915 assert(msg);
916 assert(dst);
f50f23d9 917 assert(sock);
4ce514c4 918 assert(sock->fd);
ffe60014 919 assert(fds);
00e2e675 920
52898cb1 921 ret = consumer_send_msg(sock, msg);
f50f23d9
DG
922 if (ret < 0) {
923 goto error;
924 }
925
00e2e675
DG
926 ret = consumer_send_fds(sock, fds, nb_fd);
927 if (ret < 0) {
928 goto error;
929 }
930
931error:
932 return ret;
933}
37278a1e
DG
934
935/*
936 * Send relayd socket to consumer associated with a session name.
937 *
938 * On success return positive value. On error, negative value.
939 */
f50f23d9 940int consumer_send_relayd_socket(struct consumer_socket *consumer_sock,
6151a90f 941 struct lttcomm_relayd_sock *rsock, struct consumer_output *consumer,
d88aee68 942 enum lttng_stream_type type, uint64_t session_id)
37278a1e
DG
943{
944 int ret;
945 struct lttcomm_consumer_msg msg;
946
947 /* Code flow error. Safety net. */
6151a90f 948 assert(rsock);
37278a1e 949 assert(consumer);
f50f23d9 950 assert(consumer_sock);
4ce514c4 951 assert(consumer_sock->fd);
37278a1e
DG
952
953 /* Bail out if consumer is disabled */
954 if (!consumer->enabled) {
f73fabfd 955 ret = LTTNG_OK;
37278a1e
DG
956 goto error;
957 }
958
959 msg.cmd_type = LTTNG_CONSUMER_ADD_RELAYD_SOCKET;
960 /*
961 * Assign network consumer output index using the temporary consumer since
962 * this call should only be made from within a set_consumer_uri() function
963 * call in the session daemon.
964 */
965 msg.u.relayd_sock.net_index = consumer->net_seq_index;
966 msg.u.relayd_sock.type = type;
46e6455f 967 msg.u.relayd_sock.session_id = session_id;
6151a90f 968 memcpy(&msg.u.relayd_sock.sock, rsock, sizeof(msg.u.relayd_sock.sock));
37278a1e 969
4ce514c4 970 DBG3("Sending relayd sock info to consumer on %d", *consumer_sock->fd);
52898cb1 971 ret = consumer_send_msg(consumer_sock, &msg);
f50f23d9
DG
972 if (ret < 0) {
973 goto error;
974 }
975
37278a1e 976 DBG3("Sending relayd socket file descriptor to consumer");
6151a90f 977 ret = consumer_send_fds(consumer_sock, &rsock->sock.fd, 1);
37278a1e
DG
978 if (ret < 0) {
979 goto error;
980 }
981
982 DBG2("Consumer relayd socket sent");
983
984error:
985 return ret;
986}
173af62f
DG
987
988/*
2f77fc4b
DG
989 * Set consumer subdirectory using the session name and a generated datetime if
990 * needed. This is appended to the current subdirectory.
173af62f 991 */
2f77fc4b
DG
992int consumer_set_subdir(struct consumer_output *consumer,
993 const char *session_name)
173af62f 994{
2f77fc4b
DG
995 int ret = 0;
996 unsigned int have_default_name = 0;
997 char datetime[16], tmp_path[PATH_MAX];
998 time_t rawtime;
999 struct tm *timeinfo;
173af62f
DG
1000
1001 assert(consumer);
2f77fc4b
DG
1002 assert(session_name);
1003
1004 memset(tmp_path, 0, sizeof(tmp_path));
1005
1006 /* Flag if we have a default session. */
1007 if (strncmp(session_name, DEFAULT_SESSION_NAME "-",
1008 strlen(DEFAULT_SESSION_NAME) + 1) == 0) {
1009 have_default_name = 1;
1010 } else {
1011 /* Get date and time for session path */
1012 time(&rawtime);
1013 timeinfo = localtime(&rawtime);
1014 strftime(datetime, sizeof(datetime), "%Y%m%d-%H%M%S", timeinfo);
173af62f
DG
1015 }
1016
2f77fc4b
DG
1017 if (have_default_name) {
1018 ret = snprintf(tmp_path, sizeof(tmp_path),
1019 "%s/%s", consumer->subdir, session_name);
1020 } else {
1021 ret = snprintf(tmp_path, sizeof(tmp_path),
1022 "%s/%s-%s/", consumer->subdir, session_name, datetime);
1023 }
173af62f 1024 if (ret < 0) {
2f77fc4b 1025 PERROR("snprintf session name date");
173af62f
DG
1026 goto error;
1027 }
1028
2f77fc4b
DG
1029 strncpy(consumer->subdir, tmp_path, sizeof(consumer->subdir));
1030 DBG2("Consumer subdir set to %s", consumer->subdir);
173af62f
DG
1031
1032error:
1033 return ret;
1034}
806e2684
DG
1035
1036/*
6d805429 1037 * Ask the consumer if the data is ready to read (NOT pending) for the specific
806e2684
DG
1038 * session id.
1039 *
1040 * This function has a different behavior with the consumer i.e. that it waits
6d805429 1041 * for a reply from the consumer if yes or no the data is pending.
806e2684 1042 */
d88aee68 1043int consumer_is_data_pending(uint64_t session_id,
806e2684
DG
1044 struct consumer_output *consumer)
1045{
1046 int ret;
6d805429 1047 int32_t ret_code = 0; /* Default is that the data is NOT pending */
806e2684
DG
1048 struct consumer_socket *socket;
1049 struct lttng_ht_iter iter;
1050 struct lttcomm_consumer_msg msg;
1051
1052 assert(consumer);
1053
6d805429 1054 msg.cmd_type = LTTNG_CONSUMER_DATA_PENDING;
806e2684 1055
d88aee68 1056 msg.u.data_pending.session_id = session_id;
806e2684 1057
d88aee68 1058 DBG3("Consumer data pending for id %" PRIu64, session_id);
806e2684 1059
c8f59ee5 1060 /* Send command for each consumer */
b82c5c4d 1061 rcu_read_lock();
806e2684
DG
1062 cds_lfht_for_each_entry(consumer->socks->ht, &iter.iter, socket,
1063 node.node) {
1064 /* Code flow error */
4ce514c4 1065 assert(socket->fd);
806e2684
DG
1066
1067 pthread_mutex_lock(socket->lock);
52898cb1 1068 ret = consumer_socket_send(socket, &msg, sizeof(msg));
806e2684 1069 if (ret < 0) {
806e2684 1070 pthread_mutex_unlock(socket->lock);
b82c5c4d 1071 goto error_unlock;
806e2684
DG
1072 }
1073
f50f23d9
DG
1074 /*
1075 * No need for a recv reply status because the answer to the command is
1076 * the reply status message.
1077 */
1078
52898cb1
DG
1079 ret = consumer_socket_recv(socket, &ret_code, sizeof(ret_code));
1080 if (ret < 0) {
806e2684 1081 pthread_mutex_unlock(socket->lock);
b82c5c4d 1082 goto error_unlock;
806e2684 1083 }
806e2684
DG
1084 pthread_mutex_unlock(socket->lock);
1085
6d805429 1086 if (ret_code == 1) {
806e2684
DG
1087 break;
1088 }
1089 }
b82c5c4d 1090 rcu_read_unlock();
806e2684 1091
d88aee68
DG
1092 DBG("Consumer data is %s pending for session id %" PRIu64,
1093 ret_code == 1 ? "" : "NOT", session_id);
806e2684
DG
1094 return ret_code;
1095
b82c5c4d
DG
1096error_unlock:
1097 rcu_read_unlock();
806e2684
DG
1098 return -1;
1099}
7972aab2
DG
1100
1101/*
1102 * Send a flush command to consumer using the given channel key.
1103 *
1104 * Return 0 on success else a negative value.
1105 */
1106int consumer_flush_channel(struct consumer_socket *socket, uint64_t key)
1107{
1108 int ret;
1109 struct lttcomm_consumer_msg msg;
1110
1111 assert(socket);
4ce514c4 1112 assert(socket->fd);
7972aab2
DG
1113
1114 DBG2("Consumer flush channel key %" PRIu64, key);
1115
1116 msg.cmd_type = LTTNG_CONSUMER_FLUSH_CHANNEL;
1117 msg.u.flush_channel.key = key;
1118
1119 pthread_mutex_lock(socket->lock);
1120 health_code_update();
1121
1122 ret = consumer_send_msg(socket, &msg);
1123 if (ret < 0) {
1124 goto end;
1125 }
1126
1127end:
1128 health_code_update();
1129 pthread_mutex_unlock(socket->lock);
1130 return ret;
1131}
1132
1133/*
1134 * Send a close metdata command to consumer using the given channel key.
1135 *
1136 * Return 0 on success else a negative value.
1137 */
1138int consumer_close_metadata(struct consumer_socket *socket,
1139 uint64_t metadata_key)
1140{
1141 int ret;
1142 struct lttcomm_consumer_msg msg;
1143
1144 assert(socket);
4ce514c4 1145 assert(socket->fd);
7972aab2
DG
1146
1147 DBG2("Consumer close metadata channel key %" PRIu64, metadata_key);
1148
1149 msg.cmd_type = LTTNG_CONSUMER_CLOSE_METADATA;
1150 msg.u.close_metadata.key = metadata_key;
1151
1152 pthread_mutex_lock(socket->lock);
1153 health_code_update();
1154
1155 ret = consumer_send_msg(socket, &msg);
1156 if (ret < 0) {
1157 goto end;
1158 }
1159
1160end:
1161 health_code_update();
1162 pthread_mutex_unlock(socket->lock);
1163 return ret;
1164}
1165
1166/*
1167 * Send a setup metdata command to consumer using the given channel key.
1168 *
1169 * Return 0 on success else a negative value.
1170 */
1171int consumer_setup_metadata(struct consumer_socket *socket,
1172 uint64_t metadata_key)
1173{
1174 int ret;
1175 struct lttcomm_consumer_msg msg;
1176
1177 assert(socket);
4ce514c4 1178 assert(socket->fd);
7972aab2
DG
1179
1180 DBG2("Consumer setup metadata channel key %" PRIu64, metadata_key);
1181
1182 msg.cmd_type = LTTNG_CONSUMER_SETUP_METADATA;
1183 msg.u.setup_metadata.key = metadata_key;
1184
1185 pthread_mutex_lock(socket->lock);
1186 health_code_update();
1187
1188 ret = consumer_send_msg(socket, &msg);
1189 if (ret < 0) {
1190 goto end;
1191 }
1192
1193end:
1194 health_code_update();
1195 pthread_mutex_unlock(socket->lock);
1196 return ret;
1197}
1198
1199/*
331744e3 1200 * Send metadata string to consumer. Socket lock MUST be acquired.
7972aab2
DG
1201 *
1202 * Return 0 on success else a negative value.
1203 */
1204int consumer_push_metadata(struct consumer_socket *socket,
1205 uint64_t metadata_key, char *metadata_str, size_t len,
1206 size_t target_offset)
1207{
1208 int ret;
1209 struct lttcomm_consumer_msg msg;
1210
1211 assert(socket);
4ce514c4 1212 assert(socket->fd);
7972aab2 1213
4ce514c4 1214 DBG2("Consumer push metadata to consumer socket %d", *socket->fd);
7972aab2
DG
1215
1216 msg.cmd_type = LTTNG_CONSUMER_PUSH_METADATA;
1217 msg.u.push_metadata.key = metadata_key;
1218 msg.u.push_metadata.target_offset = target_offset;
1219 msg.u.push_metadata.len = len;
1220
7972aab2
DG
1221 health_code_update();
1222 ret = consumer_send_msg(socket, &msg);
331744e3 1223 if (ret < 0 || len == 0) {
7972aab2
DG
1224 goto end;
1225 }
1226
4ce514c4 1227 DBG3("Consumer pushing metadata on sock %d of len %zu", *socket->fd, len);
7972aab2 1228
52898cb1 1229 ret = consumer_socket_send(socket, metadata_str, len);
7972aab2
DG
1230 if (ret < 0) {
1231 goto end;
1232 }
1233
1234 health_code_update();
1235 ret = consumer_recv_status_reply(socket);
1236 if (ret < 0) {
1237 goto end;
1238 }
1239
1240end:
1241 health_code_update();
7972aab2
DG
1242 return ret;
1243}
6dc3064a
DG
1244
1245/*
1246 * Ask the consumer to snapshot a specific channel using the key.
1247 *
1248 * Return 0 on success or else a negative error.
1249 */
1250int consumer_snapshot_channel(struct consumer_socket *socket, uint64_t key,
1251 struct snapshot_output *output, int metadata, uid_t uid, gid_t gid,
5c786ded 1252 const char *session_path, int wait, int max_stream_size)
6dc3064a
DG
1253{
1254 int ret;
1255 struct lttcomm_consumer_msg msg;
1256
1257 assert(socket);
4ce514c4 1258 assert(socket->fd);
6dc3064a
DG
1259 assert(output);
1260 assert(output->consumer);
1261
1262 DBG("Consumer snapshot channel key %" PRIu64, key);
1263
ee91bab2 1264 memset(&msg, 0, sizeof(msg));
6dc3064a
DG
1265 msg.cmd_type = LTTNG_CONSUMER_SNAPSHOT_CHANNEL;
1266 msg.u.snapshot_channel.key = key;
5c786ded 1267 msg.u.snapshot_channel.max_stream_size = max_stream_size;
6dc3064a
DG
1268 msg.u.snapshot_channel.metadata = metadata;
1269
1270 if (output->consumer->type == CONSUMER_DST_NET) {
1271 msg.u.snapshot_channel.relayd_id = output->consumer->net_seq_index;
1272 msg.u.snapshot_channel.use_relayd = 1;
1273 ret = snprintf(msg.u.snapshot_channel.pathname,
1bfe7328
DG
1274 sizeof(msg.u.snapshot_channel.pathname),
1275 "%s/%s-%s-%" PRIu64 "%s", output->consumer->subdir,
1276 output->name, output->datetime, output->nb_snapshot,
ee91bab2 1277 session_path);
6dc3064a
DG
1278 if (ret < 0) {
1279 ret = -LTTNG_ERR_NOMEM;
1280 goto error;
1281 }
1282 } else {
1283 ret = snprintf(msg.u.snapshot_channel.pathname,
1bfe7328
DG
1284 sizeof(msg.u.snapshot_channel.pathname),
1285 "%s/%s-%s-%" PRIu64 "%s", output->consumer->dst.trace_path,
1286 output->name, output->datetime, output->nb_snapshot,
1287 session_path);
6dc3064a
DG
1288 if (ret < 0) {
1289 ret = -LTTNG_ERR_NOMEM;
1290 goto error;
1291 }
07b86b52 1292 msg.u.snapshot_channel.relayd_id = (uint64_t) -1ULL;
6dc3064a
DG
1293
1294 /* Create directory. Ignore if exist. */
1295 ret = run_as_mkdir_recursive(msg.u.snapshot_channel.pathname,
1296 S_IRWXU | S_IRWXG, uid, gid);
1297 if (ret < 0) {
1298 if (ret != -EEXIST) {
1299 ERR("Trace directory creation error");
1300 goto error;
1301 }
1302 }
1303 }
1304
1305 health_code_update();
1306 ret = consumer_send_msg(socket, &msg);
1307 if (ret < 0) {
1308 goto error;
1309 }
1310
1311error:
1312 health_code_update();
1313 return ret;
1314}
This page took 0.093097 seconds and 5 git commands to generate.