Fix: sessiond: rotation thread: fatal error when not finding a session
[lttng-tools.git] / src / bin / lttng-sessiond / ust-registry.cpp
CommitLineData
d0b96690 1/*
ab5be9fa 2 * Copyright (C) 2013 David Goulet <dgoulet@efficios.com>
d0b96690 3 *
ab5be9fa 4 * SPDX-License-Identifier: GPL-2.0-only
d0b96690 5 *
d0b96690 6 */
890d8fe4 7
6c1c0768 8#define _LGPL_SOURCE
7972aab2 9#include <inttypes.h>
d0b96690
DG
10
11#include <common/common.h>
7972aab2
DG
12#include <common/hashtable/utils.h>
13#include <lttng/lttng.h>
14
d0b96690 15#include "ust-registry.h"
8494bda5 16#include "ust-app.h"
98b73e88 17#include "ust-field-utils.h"
0b2dc8df 18#include "utils.h"
e9404c27
JG
19#include "lttng-sessiond.h"
20#include "notification-thread-commands.h"
d0b96690
DG
21
22/*
23 * Hash table match function for event in the registry.
24 */
25static int ht_match_event(struct cds_lfht_node *node, const void *_key)
26{
d0b96690 27 const struct ust_registry_event *key;
98b73e88 28 struct ust_registry_event *event;
d0b96690 29
a0377dfe
FD
30 LTTNG_ASSERT(node);
31 LTTNG_ASSERT(_key);
d0b96690
DG
32
33 event = caa_container_of(node, struct ust_registry_event, node.node);
a0377dfe 34 LTTNG_ASSERT(event);
7966af57 35 key = (ust_registry_event *) _key;
d0b96690 36
98b73e88 37 /* It has to be a perfect match. First, compare the event names. */
b4d096a6 38 if (strncmp(event->name, key->name, sizeof(event->name))) {
d0b96690
DG
39 goto no_match;
40 }
41
98b73e88
FD
42 /* Compare log levels. */
43 if (event->loglevel_value != key->loglevel_value) {
44 goto no_match;
45 }
46
fb277293
MD
47 /* Compare the arrays of fields. */
48 if (!match_lttng_ust_ctl_field_array(event->fields, event->nr_fields,
49 key->fields, key->nr_fields)) {
98b73e88
FD
50 goto no_match;
51 }
52
98b73e88
FD
53 /* Compare model URI. */
54 if (event->model_emf_uri != NULL && key->model_emf_uri == NULL) {
55 goto no_match;
56 } else if(event->model_emf_uri == NULL && key->model_emf_uri != NULL) {
d0b96690 57 goto no_match;
98b73e88
FD
58 } else if (event->model_emf_uri != NULL && key->model_emf_uri != NULL) {
59 if (strcmp(event->model_emf_uri, key->model_emf_uri)) {
60 goto no_match;
61 }
d0b96690
DG
62 }
63
64 /* Match */
65 return 1;
66
67no_match:
68 return 0;
69}
70
bcd52dd9 71static unsigned long ht_hash_event(const void *_key, unsigned long seed)
7972aab2 72{
98b73e88 73 uint64_t hashed_key;
7966af57 74 const struct ust_registry_event *key = (ust_registry_event *) _key;
7972aab2 75
a0377dfe 76 LTTNG_ASSERT(key);
7972aab2 77
98b73e88 78 hashed_key = (uint64_t) hash_key_str(key->name, seed);
7972aab2 79
98b73e88 80 return hash_key_u64(&hashed_key, seed);
7972aab2
DG
81}
82
10b56aef
MD
83static int compare_enums(const struct ust_registry_enum *reg_enum_a,
84 const struct ust_registry_enum *reg_enum_b)
85{
86 int ret = 0;
87 size_t i;
88
a0377dfe 89 LTTNG_ASSERT(strcmp(reg_enum_a->name, reg_enum_b->name) == 0);
10b56aef
MD
90 if (reg_enum_a->nr_entries != reg_enum_b->nr_entries) {
91 ret = -1;
92 goto end;
93 }
94 for (i = 0; i < reg_enum_a->nr_entries; i++) {
b623cb6a 95 const struct lttng_ust_ctl_enum_entry *entries_a, *entries_b;
10b56aef
MD
96
97 entries_a = &reg_enum_a->entries[i];
98 entries_b = &reg_enum_b->entries[i];
3b016e58 99 if (entries_a->start.value != entries_b->start.value) {
10b56aef
MD
100 ret = -1;
101 goto end;
102 }
3b016e58 103 if (entries_a->end.value != entries_b->end.value) {
10b56aef
MD
104 ret = -1;
105 goto end;
106 }
3b016e58
MD
107 if (entries_a->start.signedness != entries_b->start.signedness) {
108 ret = -1;
109 goto end;
110 }
111 if (entries_a->end.signedness != entries_b->end.signedness) {
112 ret = -1;
113 goto end;
114 }
115
10b56aef
MD
116 if (strcmp(entries_a->string, entries_b->string)) {
117 ret = -1;
118 goto end;
119 }
120 }
121end:
122 return ret;
123}
124
125/*
126 * Hash table match function for enumerations in the session. Match is
127 * performed on enumeration name, and confirmed by comparing the enum
128 * entries.
129 */
130static int ht_match_enum(struct cds_lfht_node *node, const void *_key)
131{
132 struct ust_registry_enum *_enum;
133 const struct ust_registry_enum *key;
134
a0377dfe
FD
135 LTTNG_ASSERT(node);
136 LTTNG_ASSERT(_key);
10b56aef
MD
137
138 _enum = caa_container_of(node, struct ust_registry_enum,
139 node.node);
a0377dfe 140 LTTNG_ASSERT(_enum);
7966af57 141 key = (ust_registry_enum *) _key;
10b56aef 142
fc4b93fa 143 if (strncmp(_enum->name, key->name, LTTNG_UST_ABI_SYM_NAME_LEN)) {
10b56aef
MD
144 goto no_match;
145 }
146 if (compare_enums(_enum, key)) {
147 goto no_match;
148 }
149
150 /* Match. */
151 return 1;
152
153no_match:
154 return 0;
155}
156
157/*
158 * Hash table match function for enumerations in the session. Match is
159 * performed by enumeration ID.
160 */
161static int ht_match_enum_id(struct cds_lfht_node *node, const void *_key)
162{
163 struct ust_registry_enum *_enum;
7966af57 164 const struct ust_registry_enum *key = (ust_registry_enum *) _key;
10b56aef 165
a0377dfe
FD
166 LTTNG_ASSERT(node);
167 LTTNG_ASSERT(_key);
10b56aef
MD
168
169 _enum = caa_container_of(node, struct ust_registry_enum, node.node);
a0377dfe 170 LTTNG_ASSERT(_enum);
10b56aef
MD
171
172 if (_enum->id != key->id) {
173 goto no_match;
174 }
175
176 /* Match. */
177 return 1;
178
179no_match:
180 return 0;
181}
182
183/*
184 * Hash table hash function for enumerations in the session. The
185 * enumeration name is used for hashing.
186 */
187static unsigned long ht_hash_enum(void *_key, unsigned long seed)
188{
7966af57 189 struct ust_registry_enum *key = (ust_registry_enum *) _key;
10b56aef 190
a0377dfe 191 LTTNG_ASSERT(key);
10b56aef
MD
192 return hash_key_str(key->name, seed);
193}
194
8494bda5
MD
195/*
196 * Return negative value on error, 0 if OK.
197 *
198 * TODO: we could add stricter verification of more types to catch
199 * errors in liblttng-ust implementation earlier than consumption by the
200 * trace reader.
201 */
202static
b623cb6a 203int validate_event_field(struct lttng_ust_ctl_field *field,
8494bda5
MD
204 const char *event_name,
205 struct ust_app *app)
206{
da860cab
MD
207 int ret = 0;
208
8494bda5 209 switch(field->type.atype) {
b623cb6a
MJ
210 case lttng_ust_ctl_atype_integer:
211 case lttng_ust_ctl_atype_enum:
212 case lttng_ust_ctl_atype_array:
213 case lttng_ust_ctl_atype_sequence:
214 case lttng_ust_ctl_atype_string:
215 case lttng_ust_ctl_atype_variant:
216 case lttng_ust_ctl_atype_array_nestable:
217 case lttng_ust_ctl_atype_sequence_nestable:
218 case lttng_ust_ctl_atype_enum_nestable:
219 case lttng_ust_ctl_atype_variant_nestable:
da860cab 220 break;
b623cb6a 221 case lttng_ust_ctl_atype_struct:
0d32d1a9
MD
222 if (field->type.u.legacy._struct.nr_fields != 0) {
223 WARN("Unsupported non-empty struct field.");
224 ret = -EINVAL;
225 goto end;
226 }
227 break;
b623cb6a 228 case lttng_ust_ctl_atype_struct_nestable:
0d32d1a9 229 if (field->type.u.struct_nestable.nr_fields != 0) {
da860cab
MD
230 WARN("Unsupported non-empty struct field.");
231 ret = -EINVAL;
232 goto end;
233 }
8494bda5
MD
234 break;
235
b623cb6a 236 case lttng_ust_ctl_atype_float:
0d32d1a9 237 switch (field->type.u._float.mant_dig) {
8494bda5
MD
238 case 0:
239 WARN("UST application '%s' (pid: %d) has unknown float mantissa '%u' "
240 "in field '%s', rejecting event '%s'",
241 app->name, app->pid,
0d32d1a9 242 field->type.u._float.mant_dig,
8494bda5
MD
243 field->name,
244 event_name);
da860cab
MD
245 ret = -EINVAL;
246 goto end;
8494bda5
MD
247 default:
248 break;
249 }
250 break;
251
252 default:
da860cab
MD
253 ret = -ENOENT;
254 goto end;
8494bda5 255 }
da860cab
MD
256end:
257 return ret;
8494bda5
MD
258}
259
260static
b623cb6a 261int validate_event_fields(size_t nr_fields, struct lttng_ust_ctl_field *fields,
8494bda5
MD
262 const char *event_name, struct ust_app *app)
263{
264 unsigned int i;
265
266 for (i = 0; i < nr_fields; i++) {
267 if (validate_event_field(&fields[i], event_name, app) < 0)
268 return -EINVAL;
269 }
270 return 0;
271}
272
d0b96690
DG
273/*
274 * Allocate event and initialize it. This does NOT set a valid event id from a
275 * registry.
276 */
277static struct ust_registry_event *alloc_event(int session_objd,
278 int channel_objd, char *name, char *sig, size_t nr_fields,
b623cb6a 279 struct lttng_ust_ctl_field *fields, int loglevel_value,
2106efa0 280 char *model_emf_uri, struct ust_app *app)
d0b96690
DG
281{
282 struct ust_registry_event *event = NULL;
283
8494bda5
MD
284 /*
285 * Ensure that the field content is valid.
286 */
287 if (validate_event_fields(nr_fields, fields, name, app) < 0) {
288 return NULL;
289 }
290
7966af57 291 event = (ust_registry_event *) zmalloc(sizeof(*event));
d0b96690
DG
292 if (!event) {
293 PERROR("zmalloc ust registry event");
294 goto error;
295 }
296
297 event->session_objd = session_objd;
298 event->channel_objd = channel_objd;
299 /* Allocated by ustctl. */
300 event->signature = sig;
301 event->nr_fields = nr_fields;
302 event->fields = fields;
2106efa0 303 event->loglevel_value = loglevel_value;
d0b96690
DG
304 event->model_emf_uri = model_emf_uri;
305 if (name) {
306 /* Copy event name and force NULL byte. */
307 strncpy(event->name, name, sizeof(event->name));
308 event->name[sizeof(event->name) - 1] = '\0';
309 }
7972aab2 310 cds_lfht_node_init(&event->node.node);
d0b96690
DG
311
312error:
313 return event;
314}
315
316/*
317 * Free event data structure. This does NOT delete it from any hash table. It's
318 * safe to pass a NULL pointer. This shoudl be called inside a call RCU if the
319 * event is previously deleted from a rcu hash table.
320 */
321static void destroy_event(struct ust_registry_event *event)
322{
323 if (!event) {
324 return;
325 }
326
327 free(event->fields);
328 free(event->model_emf_uri);
329 free(event->signature);
330 free(event);
331}
332
333/*
334 * Destroy event function call of the call RCU.
335 */
336static void destroy_event_rcu(struct rcu_head *head)
337{
7972aab2
DG
338 struct lttng_ht_node_u64 *node =
339 caa_container_of(head, struct lttng_ht_node_u64, head);
d0b96690
DG
340 struct ust_registry_event *event =
341 caa_container_of(node, struct ust_registry_event, node);
342
343 destroy_event(event);
344}
345
346/*
347 * Find an event using the name and signature in the given registry. RCU read
348 * side lock MUST be acquired before calling this function and as long as the
349 * event reference is kept by the caller.
350 *
351 * On success, the event pointer is returned else NULL.
352 */
353struct ust_registry_event *ust_registry_find_event(
354 struct ust_registry_channel *chan, char *name, char *sig)
355{
7972aab2 356 struct lttng_ht_node_u64 *node;
d0b96690
DG
357 struct lttng_ht_iter iter;
358 struct ust_registry_event *event = NULL;
359 struct ust_registry_event key;
360
a0377dfe
FD
361 LTTNG_ASSERT(chan);
362 LTTNG_ASSERT(name);
363 LTTNG_ASSERT(sig);
d0b96690
DG
364
365 /* Setup key for the match function. */
366 strncpy(key.name, name, sizeof(key.name));
367 key.name[sizeof(key.name) - 1] = '\0';
368 key.signature = sig;
369
7972aab2 370 cds_lfht_lookup(chan->ht->ht, chan->ht->hash_fct(&key, lttng_ht_seed),
d0b96690 371 chan->ht->match_fct, &key, &iter.iter);
7972aab2 372 node = lttng_ht_iter_get_node_u64(&iter);
d0b96690
DG
373 if (!node) {
374 goto end;
375 }
376 event = caa_container_of(node, struct ust_registry_event, node);
377
378end:
379 return event;
380}
381
382/*
383 * Create a ust_registry_event from the given parameters and add it to the
384 * registry hash table. If event_id is valid, it is set with the newly created
385 * event id.
386 *
387 * On success, return 0 else a negative value. The created event MUST be unique
388 * so on duplicate entry -EINVAL is returned. On error, event_id is untouched.
389 *
390 * Should be called with session registry mutex held.
391 */
392int ust_registry_create_event(struct ust_registry_session *session,
45893984 393 uint64_t chan_key, int session_objd, int channel_objd, char *name,
b623cb6a 394 char *sig, size_t nr_fields, struct lttng_ust_ctl_field *fields,
2106efa0
PP
395 int loglevel_value, char *model_emf_uri, int buffer_type,
396 uint32_t *event_id_p, struct ust_app *app)
d0b96690
DG
397{
398 int ret;
7972aab2 399 uint32_t event_id;
d0b96690
DG
400 struct cds_lfht_node *nptr;
401 struct ust_registry_event *event = NULL;
45893984 402 struct ust_registry_channel *chan;
d0b96690 403
a0377dfe
FD
404 LTTNG_ASSERT(session);
405 LTTNG_ASSERT(name);
406 LTTNG_ASSERT(sig);
407 LTTNG_ASSERT(event_id_p);
d0b96690 408
d5d629b5
DG
409 rcu_read_lock();
410
d0b96690
DG
411 /*
412 * This should not happen but since it comes from the UST tracer, an
413 * external party, don't assert and simply validate values.
414 */
415 if (session_objd < 0 || channel_objd < 0) {
416 ret = -EINVAL;
d5d629b5 417 goto error_free;
d0b96690
DG
418 }
419
45893984
DG
420 chan = ust_registry_channel_find(session, chan_key);
421 if (!chan) {
422 ret = -EINVAL;
d5d629b5 423 goto error_free;
45893984
DG
424 }
425
d0b96690
DG
426 /* Check if we've reached the maximum possible id. */
427 if (ust_registry_is_max_id(chan->used_event_id)) {
428 ret = -ENOENT;
d5d629b5 429 goto error_free;
d0b96690
DG
430 }
431
432 event = alloc_event(session_objd, channel_objd, name, sig, nr_fields,
2106efa0 433 fields, loglevel_value, model_emf_uri, app);
d0b96690
DG
434 if (!event) {
435 ret = -ENOMEM;
d5d629b5 436 goto error_free;
d0b96690
DG
437 }
438
d0b96690 439 DBG3("UST registry creating event with event: %s, sig: %s, id: %u, "
7972aab2
DG
440 "chan_objd: %u, sess_objd: %u, chan_id: %u", event->name,
441 event->signature, event->id, event->channel_objd,
442 event->session_objd, chan->chan_id);
d0b96690 443
d0b96690
DG
444 /*
445 * This is an add unique with a custom match function for event. The node
446 * are matched using the event name and signature.
447 */
7972aab2 448 nptr = cds_lfht_add_unique(chan->ht->ht, chan->ht->hash_fct(event,
d0b96690
DG
449 lttng_ht_seed), chan->ht->match_fct, event, &event->node.node);
450 if (nptr != &event->node.node) {
7972aab2
DG
451 if (buffer_type == LTTNG_BUFFER_PER_UID) {
452 /*
453 * This is normal, we just have to send the event id of the
454 * returned node and make sure we destroy the previously allocated
455 * event object.
456 */
457 destroy_event(event);
458 event = caa_container_of(nptr, struct ust_registry_event,
459 node.node);
a0377dfe 460 LTTNG_ASSERT(event);
7972aab2
DG
461 event_id = event->id;
462 } else {
463 ERR("UST registry create event add unique failed for event: %s, "
464 "sig: %s, id: %u, chan_objd: %u, sess_objd: %u",
465 event->name, event->signature, event->id,
466 event->channel_objd, event->session_objd);
467 ret = -EINVAL;
468 goto error_unlock;
469 }
470 } else {
471 /* Request next event id if the node was successfully added. */
472 event_id = event->id = ust_registry_get_next_event_id(chan);
d0b96690
DG
473 }
474
7972aab2 475 *event_id_p = event_id;
d0b96690 476
7972aab2
DG
477 if (!event->metadata_dumped) {
478 /* Append to metadata */
479 ret = ust_metadata_event_statedump(session, chan, event);
480 if (ret) {
481 ERR("Error appending event metadata (errno = %d)", ret);
482 rcu_read_unlock();
483 return ret;
484 }
d0b96690
DG
485 }
486
45893984 487 rcu_read_unlock();
d0b96690
DG
488 return 0;
489
d5d629b5
DG
490error_free:
491 free(sig);
492 free(fields);
493 free(model_emf_uri);
d0b96690
DG
494error_unlock:
495 rcu_read_unlock();
d0b96690
DG
496 destroy_event(event);
497 return ret;
498}
499
500/*
501 * For a given event in a registry, delete the entry and destroy the event.
502 * This MUST be called within a RCU read side lock section.
503 */
504void ust_registry_destroy_event(struct ust_registry_channel *chan,
505 struct ust_registry_event *event)
506{
507 int ret;
508 struct lttng_ht_iter iter;
509
a0377dfe
FD
510 LTTNG_ASSERT(chan);
511 LTTNG_ASSERT(event);
d0b96690
DG
512
513 /* Delete the node first. */
514 iter.iter.node = &event->node.node;
515 ret = lttng_ht_del(chan->ht, &iter);
a0377dfe 516 LTTNG_ASSERT(!ret);
d0b96690
DG
517
518 call_rcu(&event->node.head, destroy_event_rcu);
519
520 return;
521}
522
10b56aef
MD
523static void destroy_enum(struct ust_registry_enum *reg_enum)
524{
525 if (!reg_enum) {
526 return;
527 }
528 free(reg_enum->entries);
529 free(reg_enum);
530}
531
532static void destroy_enum_rcu(struct rcu_head *head)
533{
534 struct ust_registry_enum *reg_enum =
535 caa_container_of(head, struct ust_registry_enum, rcu_head);
536
537 destroy_enum(reg_enum);
538}
539
540/*
541 * Lookup enumeration by name and comparing enumeration entries.
542 * Needs to be called from RCU read-side critical section.
543 */
10dc2d10
SM
544static struct ust_registry_enum *ust_registry_lookup_enum(
545 struct ust_registry_session *session,
10b56aef
MD
546 const struct ust_registry_enum *reg_enum_lookup)
547{
548 struct ust_registry_enum *reg_enum = NULL;
549 struct lttng_ht_node_str *node;
550 struct lttng_ht_iter iter;
551
552 cds_lfht_lookup(session->enums->ht,
a752d6fa
FD
553 ht_hash_enum((void *) reg_enum_lookup, lttng_ht_seed),
554 ht_match_enum, reg_enum_lookup, &iter.iter);
10b56aef
MD
555 node = lttng_ht_iter_get_node_str(&iter);
556 if (!node) {
557 goto end;
558 }
559 reg_enum = caa_container_of(node, struct ust_registry_enum, node);
560end:
561 return reg_enum;
562}
563
564/*
565 * Lookup enumeration by enum ID.
566 * Needs to be called from RCU read-side critical section.
567 */
568struct ust_registry_enum *
569 ust_registry_lookup_enum_by_id(struct ust_registry_session *session,
570 const char *enum_name, uint64_t enum_id)
571{
572 struct ust_registry_enum *reg_enum = NULL;
573 struct lttng_ht_node_str *node;
574 struct lttng_ht_iter iter;
575 struct ust_registry_enum reg_enum_lookup;
576
577 memset(&reg_enum_lookup, 0, sizeof(reg_enum_lookup));
fc4b93fa
MD
578 strncpy(reg_enum_lookup.name, enum_name, LTTNG_UST_ABI_SYM_NAME_LEN);
579 reg_enum_lookup.name[LTTNG_UST_ABI_SYM_NAME_LEN - 1] = '\0';
10b56aef
MD
580 reg_enum_lookup.id = enum_id;
581 cds_lfht_lookup(session->enums->ht,
582 ht_hash_enum((void *) &reg_enum_lookup, lttng_ht_seed),
583 ht_match_enum_id, &reg_enum_lookup, &iter.iter);
584 node = lttng_ht_iter_get_node_str(&iter);
585 if (!node) {
586 goto end;
587 }
588 reg_enum = caa_container_of(node, struct ust_registry_enum, node);
589end:
590 return reg_enum;
591}
592
593/*
594 * Create a ust_registry_enum from the given parameters and add it to the
595 * registry hash table, or find it if already there.
596 *
597 * On success, return 0 else a negative value.
598 *
599 * Should be called with session registry mutex held.
600 *
601 * We receive ownership of entries.
602 */
603int ust_registry_create_or_find_enum(struct ust_registry_session *session,
604 int session_objd, char *enum_name,
b623cb6a 605 struct lttng_ust_ctl_enum_entry *entries, size_t nr_entries,
10b56aef
MD
606 uint64_t *enum_id)
607{
608 int ret = 0;
609 struct cds_lfht_node *nodep;
610 struct ust_registry_enum *reg_enum = NULL, *old_reg_enum;
611
a0377dfe
FD
612 LTTNG_ASSERT(session);
613 LTTNG_ASSERT(enum_name);
10b56aef
MD
614
615 rcu_read_lock();
616
617 /*
618 * This should not happen but since it comes from the UST tracer, an
619 * external party, don't assert and simply validate values.
620 */
621 if (session_objd < 0) {
622 ret = -EINVAL;
623 goto end;
624 }
625
626 /* Check if the enumeration was already dumped */
7966af57 627 reg_enum = (ust_registry_enum *) zmalloc(sizeof(*reg_enum));
10b56aef
MD
628 if (!reg_enum) {
629 PERROR("zmalloc ust registry enumeration");
630 ret = -ENOMEM;
631 goto end;
632 }
fc4b93fa
MD
633 strncpy(reg_enum->name, enum_name, LTTNG_UST_ABI_SYM_NAME_LEN);
634 reg_enum->name[LTTNG_UST_ABI_SYM_NAME_LEN - 1] = '\0';
10b56aef
MD
635 /* entries will be owned by reg_enum. */
636 reg_enum->entries = entries;
637 reg_enum->nr_entries = nr_entries;
638 entries = NULL;
639
640 old_reg_enum = ust_registry_lookup_enum(session, reg_enum);
641 if (old_reg_enum) {
642 DBG("enum %s already in sess_objd: %u", enum_name, session_objd);
643 /* Fall through. Use prior enum. */
644 destroy_enum(reg_enum);
645 reg_enum = old_reg_enum;
646 } else {
647 DBG("UST registry creating enum: %s, sess_objd: %u",
648 enum_name, session_objd);
649 if (session->next_enum_id == -1ULL) {
650 ret = -EOVERFLOW;
651 destroy_enum(reg_enum);
652 goto end;
653 }
654 reg_enum->id = session->next_enum_id++;
655 cds_lfht_node_init(&reg_enum->node.node);
656 nodep = cds_lfht_add_unique(session->enums->ht,
657 ht_hash_enum(reg_enum, lttng_ht_seed),
658 ht_match_enum_id, reg_enum,
659 &reg_enum->node.node);
a0377dfe 660 LTTNG_ASSERT(nodep == &reg_enum->node.node);
10b56aef
MD
661 }
662 DBG("UST registry reply with enum %s with id %" PRIu64 " in sess_objd: %u",
663 enum_name, reg_enum->id, session_objd);
664 *enum_id = reg_enum->id;
665end:
666 free(entries);
667 rcu_read_unlock();
668 return ret;
669}
670
671/*
672 * For a given enumeration in a registry, delete the entry and destroy
673 * the enumeration.
674 * This MUST be called within a RCU read side lock section.
675 */
10dc2d10 676static void ust_registry_destroy_enum(struct ust_registry_session *reg_session,
10b56aef
MD
677 struct ust_registry_enum *reg_enum)
678{
679 int ret;
680 struct lttng_ht_iter iter;
681
a0377dfe
FD
682 LTTNG_ASSERT(reg_session);
683 LTTNG_ASSERT(reg_enum);
10b56aef
MD
684
685 /* Delete the node first. */
686 iter.iter.node = &reg_enum->node.node;
687 ret = lttng_ht_del(reg_session->enums, &iter);
a0377dfe 688 LTTNG_ASSERT(!ret);
10b56aef
MD
689 call_rcu(&reg_enum->rcu_head, destroy_enum_rcu);
690}
691
36b588ed
MD
692/*
693 * We need to execute ht_destroy outside of RCU read-side critical
0b2dc8df
MD
694 * section and outside of call_rcu thread, so we postpone its execution
695 * using ht_cleanup_push. It is simpler than to change the semantic of
696 * the many callers of delete_ust_app_session().
36b588ed
MD
697 */
698static
699void destroy_channel_rcu(struct rcu_head *head)
700{
701 struct ust_registry_channel *chan =
702 caa_container_of(head, struct ust_registry_channel, rcu_head);
703
9dbcf332 704 if (chan->ht) {
0b2dc8df 705 ht_cleanup_push(chan->ht);
9dbcf332 706 }
3295105b 707 free(chan->ctx_fields);
36b588ed
MD
708 free(chan);
709}
710
d0b96690
DG
711/*
712 * Destroy every element of the registry and free the memory. This does NOT
713 * free the registry pointer since it might not have been allocated before so
714 * it's the caller responsability.
d0b96690 715 */
e9404c27 716static void destroy_channel(struct ust_registry_channel *chan, bool notif)
d0b96690
DG
717{
718 struct lttng_ht_iter iter;
719 struct ust_registry_event *event;
e9404c27 720 enum lttng_error_code cmd_ret;
d0b96690 721
a0377dfe 722 LTTNG_ASSERT(chan);
d0b96690 723
e9404c27
JG
724 if (notif) {
725 cmd_ret = notification_thread_command_remove_channel(
412d7227
SM
726 the_notification_thread_handle,
727 chan->consumer_key, LTTNG_DOMAIN_UST);
e9404c27
JG
728 if (cmd_ret != LTTNG_OK) {
729 ERR("Failed to remove channel from notification thread");
730 }
731 }
732
70987ead
JG
733 if (chan->ht) {
734 rcu_read_lock();
735 /* Destroy all event associated with this registry. */
736 cds_lfht_for_each_entry(
737 chan->ht->ht, &iter.iter, event, node.node) {
738 /* Delete the node from the ht and free it. */
739 ust_registry_destroy_event(chan, event);
740 }
741 rcu_read_unlock();
d0b96690 742 }
36b588ed 743 call_rcu(&chan->rcu_head, destroy_channel_rcu);
d0b96690
DG
744}
745
746/*
747 * Initialize registry with default values.
748 */
45893984
DG
749int ust_registry_channel_add(struct ust_registry_session *session,
750 uint64_t key)
751{
752 int ret = 0;
753 struct ust_registry_channel *chan;
754
a0377dfe 755 LTTNG_ASSERT(session);
45893984 756
7966af57 757 chan = (ust_registry_channel *) zmalloc(sizeof(*chan));
45893984
DG
758 if (!chan) {
759 PERROR("zmalloc ust registry channel");
760 ret = -ENOMEM;
9dbcf332 761 goto error_alloc;
45893984
DG
762 }
763
764 chan->ht = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
765 if (!chan->ht) {
766 ret = -ENOMEM;
767 goto error;
768 }
769
770 /* Set custom match function. */
771 chan->ht->match_fct = ht_match_event;
7972aab2
DG
772 chan->ht->hash_fct = ht_hash_event;
773
774 /*
775 * Assign a channel ID right now since the event notification comes
776 * *before* the channel notify so the ID needs to be set at this point so
777 * the metadata can be dumped for that event.
778 */
779 if (ust_registry_is_max_id(session->used_channel_id)) {
780 ret = -1;
781 goto error;
782 }
783 chan->chan_id = ust_registry_get_next_chan_id(session);
45893984
DG
784
785 rcu_read_lock();
786 lttng_ht_node_init_u64(&chan->node, key);
787 lttng_ht_add_unique_u64(session->channels, &chan->node);
788 rcu_read_unlock();
789
9dbcf332
DG
790 return 0;
791
45893984 792error:
e9404c27 793 destroy_channel(chan, false);
9dbcf332 794error_alloc:
45893984
DG
795 return ret;
796}
797
798/*
799 * Find a channel in the given registry. RCU read side lock MUST be acquired
800 * before calling this function and as long as the event reference is kept by
801 * the caller.
802 *
803 * On success, the pointer is returned else NULL.
804 */
805struct ust_registry_channel *ust_registry_channel_find(
806 struct ust_registry_session *session, uint64_t key)
807{
808 struct lttng_ht_node_u64 *node;
809 struct lttng_ht_iter iter;
810 struct ust_registry_channel *chan = NULL;
811
a0377dfe
FD
812 LTTNG_ASSERT(session);
813 LTTNG_ASSERT(session->channels);
45893984 814
7972aab2
DG
815 DBG3("UST registry channel finding key %" PRIu64, key);
816
45893984
DG
817 lttng_ht_lookup(session->channels, &key, &iter);
818 node = lttng_ht_iter_get_node_u64(&iter);
819 if (!node) {
820 goto end;
821 }
822 chan = caa_container_of(node, struct ust_registry_channel, node);
823
824end:
825 return chan;
826}
827
828/*
829 * Remove channel using key from registry and free memory.
830 */
831void ust_registry_channel_del_free(struct ust_registry_session *session,
e9404c27 832 uint64_t key, bool notif)
45893984
DG
833{
834 struct lttng_ht_iter iter;
835 struct ust_registry_channel *chan;
9209cee7 836 int ret;
45893984 837
a0377dfe 838 LTTNG_ASSERT(session);
45893984
DG
839
840 rcu_read_lock();
841 chan = ust_registry_channel_find(session, key);
842 if (!chan) {
9209cee7 843 rcu_read_unlock();
45893984
DG
844 goto end;
845 }
846
847 iter.iter.node = &chan->node.node;
9209cee7 848 ret = lttng_ht_del(session->channels, &iter);
a0377dfe 849 LTTNG_ASSERT(!ret);
9209cee7 850 rcu_read_unlock();
e9404c27 851 destroy_channel(chan, notif);
45893984
DG
852
853end:
45893984
DG
854 return;
855}
856
857/*
858 * Initialize registry with default values and set the newly allocated session
859 * pointer to sessionp.
860 *
861 * Return 0 on success and sessionp is set or else return -1 and sessionp is
862 * kept untouched.
863 */
864int ust_registry_session_init(struct ust_registry_session **sessionp,
d0b96690
DG
865 struct ust_app *app,
866 uint32_t bits_per_long,
867 uint32_t uint8_t_alignment,
868 uint32_t uint16_t_alignment,
869 uint32_t uint32_t_alignment,
870 uint32_t uint64_t_alignment,
871 uint32_t long_alignment,
af6142cf
MD
872 int byte_order,
873 uint32_t major,
d7ba1388 874 uint32_t minor,
3d071855 875 const char *root_shm_path,
d7ba1388
MD
876 const char *shm_path,
877 uid_t euid,
8de88061
JR
878 gid_t egid,
879 uint64_t tracing_id,
880 uid_t tracing_uid)
d0b96690
DG
881{
882 int ret;
45893984 883 struct ust_registry_session *session;
d0b96690 884
a0377dfe 885 LTTNG_ASSERT(sessionp);
d0b96690 886
7966af57 887 session = (ust_registry_session *) zmalloc(sizeof(*session));
45893984
DG
888 if (!session) {
889 PERROR("zmalloc ust registry session");
9dbcf332 890 goto error_alloc;
45893984 891 }
d0b96690
DG
892
893 pthread_mutex_init(&session->lock, NULL);
894 session->bits_per_long = bits_per_long;
895 session->uint8_t_alignment = uint8_t_alignment;
896 session->uint16_t_alignment = uint16_t_alignment;
897 session->uint32_t_alignment = uint32_t_alignment;
898 session->uint64_t_alignment = uint64_t_alignment;
899 session->long_alignment = long_alignment;
900 session->byte_order = byte_order;
d7ba1388 901 session->metadata_fd = -1;
4628484a
MD
902 session->uid = euid;
903 session->gid = egid;
10b56aef 904 session->next_enum_id = 0;
7062f070
JD
905 session->major = major;
906 session->minor = minor;
3d071855
MD
907 strncpy(session->root_shm_path, root_shm_path,
908 sizeof(session->root_shm_path));
909 session->root_shm_path[sizeof(session->root_shm_path) - 1] = '\0';
d7ba1388
MD
910 if (shm_path[0]) {
911 strncpy(session->shm_path, shm_path,
912 sizeof(session->shm_path));
913 session->shm_path[sizeof(session->shm_path) - 1] = '\0';
914 strncpy(session->metadata_path, shm_path,
915 sizeof(session->metadata_path));
916 session->metadata_path[sizeof(session->metadata_path) - 1] = '\0';
917 strncat(session->metadata_path, "/metadata",
918 sizeof(session->metadata_path)
919 - strlen(session->metadata_path) - 1);
920 }
921 if (session->shm_path[0]) {
922 ret = run_as_mkdir_recursive(session->shm_path,
923 S_IRWXU | S_IRWXG,
924 euid, egid);
925 if (ret) {
926 PERROR("run_as_mkdir_recursive");
927 goto error;
928 }
929 }
930 if (session->metadata_path[0]) {
931 /* Create metadata file */
4628484a 932 ret = run_as_open(session->metadata_path,
d7ba1388 933 O_WRONLY | O_CREAT | O_EXCL,
4628484a 934 S_IRUSR | S_IWUSR, euid, egid);
d7ba1388
MD
935 if (ret < 0) {
936 PERROR("Opening metadata file");
937 goto error;
938 }
939 session->metadata_fd = ret;
940 }
d0b96690 941
10b56aef
MD
942 session->enums = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
943 if (!session->enums) {
de64322e 944 ERR("Failed to create enums hash table");
10b56aef
MD
945 goto error;
946 }
947 /* hash/match functions are specified at call site. */
948 session->enums->match_fct = NULL;
949 session->enums->hash_fct = NULL;
950
45893984
DG
951 session->channels = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
952 if (!session->channels) {
953 goto error;
954 }
955
d0b96690
DG
956 ret = lttng_uuid_generate(session->uuid);
957 if (ret) {
958 ERR("Failed to generate UST uuid (errno = %d)", ret);
959 goto error;
960 }
961
8de88061
JR
962 session->tracing_id = tracing_id;
963 session->tracing_uid = tracing_uid;
964
d0b96690 965 pthread_mutex_lock(&session->lock);
af6142cf 966 ret = ust_metadata_session_statedump(session, app, major, minor);
d0b96690
DG
967 pthread_mutex_unlock(&session->lock);
968 if (ret) {
969 ERR("Failed to generate session metadata (errno = %d)", ret);
970 goto error;
971 }
972
45893984
DG
973 *sessionp = session;
974
d0b96690
DG
975 return 0;
976
977error:
9dbcf332 978 ust_registry_session_destroy(session);
d24ff3fd 979 free(session);
9dbcf332 980error_alloc:
d0b96690
DG
981 return -1;
982}
983
984/*
985 * Destroy session registry. This does NOT free the given pointer since it
986 * might get passed as a reference. The registry lock should NOT be acquired.
987 */
988void ust_registry_session_destroy(struct ust_registry_session *reg)
989{
990 int ret;
45893984
DG
991 struct lttng_ht_iter iter;
992 struct ust_registry_channel *chan;
10b56aef 993 struct ust_registry_enum *reg_enum;
d0b96690 994
286c991a
MD
995 if (!reg) {
996 return;
997 }
9d8efb0e 998
d0b96690
DG
999 /* On error, EBUSY can be returned if lock. Code flow error. */
1000 ret = pthread_mutex_destroy(&reg->lock);
a0377dfe 1001 LTTNG_ASSERT(!ret);
d0b96690 1002
9d8efb0e
DG
1003 if (reg->channels) {
1004 rcu_read_lock();
1005 /* Destroy all event associated with this registry. */
1006 cds_lfht_for_each_entry(reg->channels->ht, &iter.iter, chan,
1007 node.node) {
1008 /* Delete the node from the ht and free it. */
1009 ret = lttng_ht_del(reg->channels, &iter);
a0377dfe 1010 LTTNG_ASSERT(!ret);
e9404c27 1011 destroy_channel(chan, true);
9d8efb0e
DG
1012 }
1013 rcu_read_unlock();
1014 ht_cleanup_push(reg->channels);
45893984 1015 }
45893984 1016
d0b96690 1017 free(reg->metadata);
d7ba1388
MD
1018 if (reg->metadata_fd >= 0) {
1019 ret = close(reg->metadata_fd);
1020 if (ret) {
1021 PERROR("close");
1022 }
4628484a
MD
1023 ret = run_as_unlink(reg->metadata_path,
1024 reg->uid, reg->gid);
d7ba1388
MD
1025 if (ret) {
1026 PERROR("unlink");
1027 }
1028 }
3d071855
MD
1029 if (reg->root_shm_path[0]) {
1030 /*
1031 * Try deleting the directory hierarchy.
1032 */
602766ec 1033 (void) run_as_rmdir_recursive(reg->root_shm_path,
f75c5439
MD
1034 reg->uid, reg->gid,
1035 LTTNG_DIRECTORY_HANDLE_SKIP_NON_EMPTY_FLAG);
3d071855 1036 }
10b56aef
MD
1037 /* Destroy the enum hash table */
1038 if (reg->enums) {
1039 rcu_read_lock();
1040 /* Destroy all enum entries associated with this registry. */
1041 cds_lfht_for_each_entry(reg->enums->ht, &iter.iter, reg_enum,
1042 node.node) {
1043 ust_registry_destroy_enum(reg, reg_enum);
1044 }
1045 rcu_read_unlock();
1046 ht_cleanup_push(reg->enums);
1047 }
d0b96690 1048}
This page took 0.111193 seconds and 4 git commands to generate.