Fix: explicitly send client credentials during handshake
[lttng-tools.git] / src / common / consumer / consumer.c
CommitLineData
3bd1e081
MD
1/*
2 * Copyright (C) 2011 - Julien Desfossez <julien.desfossez@polymtl.ca>
3 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
00e2e675 4 * 2012 - David Goulet <dgoulet@efficios.com>
3bd1e081 5 *
d14d33bf
AM
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License, version 2 only,
8 * as published by the Free Software Foundation.
3bd1e081 9 *
d14d33bf
AM
10 * This program is distributed in the hope that it will be useful, but WITHOUT
11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
13 * more details.
3bd1e081 14 *
d14d33bf
AM
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
3bd1e081
MD
18 */
19
6c1c0768 20#define _LGPL_SOURCE
3bd1e081 21#include <assert.h>
3bd1e081
MD
22#include <poll.h>
23#include <pthread.h>
24#include <stdlib.h>
25#include <string.h>
26#include <sys/mman.h>
27#include <sys/socket.h>
28#include <sys/types.h>
29#include <unistd.h>
77c7c900 30#include <inttypes.h>
331744e3 31#include <signal.h>
3bd1e081 32
51a9e1c7 33#include <bin/lttng-consumerd/health-consumerd.h>
990570ed 34#include <common/common.h>
fb3a43a9
DG
35#include <common/utils.h>
36#include <common/compat/poll.h>
f263b7fd 37#include <common/compat/endian.h>
309167d2 38#include <common/index/index.h>
10a8a223 39#include <common/kernel-ctl/kernel-ctl.h>
00e2e675 40#include <common/sessiond-comm/relayd.h>
10a8a223
DG
41#include <common/sessiond-comm/sessiond-comm.h>
42#include <common/kernel-consumer/kernel-consumer.h>
00e2e675 43#include <common/relayd/relayd.h>
10a8a223 44#include <common/ust-consumer/ust-consumer.h>
c8fea79c
JR
45#include <common/consumer/consumer-timer.h>
46#include <common/consumer/consumer.h>
47#include <common/consumer/consumer-stream.h>
48#include <common/consumer/consumer-testpoint.h>
49#include <common/align.h>
5feafd41 50#include <common/consumer/consumer-metadata-cache.h>
3bd1e081
MD
51
52struct lttng_consumer_global_data consumer_data = {
3bd1e081
MD
53 .stream_count = 0,
54 .need_update = 1,
55 .type = LTTNG_CONSUMER_UNKNOWN,
56};
57
d8ef542d
MD
58enum consumer_channel_action {
59 CONSUMER_CHANNEL_ADD,
a0cbdd2e 60 CONSUMER_CHANNEL_DEL,
d8ef542d
MD
61 CONSUMER_CHANNEL_QUIT,
62};
63
64struct consumer_channel_msg {
65 enum consumer_channel_action action;
a0cbdd2e
MD
66 struct lttng_consumer_channel *chan; /* add */
67 uint64_t key; /* del */
d8ef542d
MD
68};
69
cf0bcb51
JG
70int data_consumption_paused;
71
3bd1e081
MD
72/*
73 * Flag to inform the polling thread to quit when all fd hung up. Updated by
74 * the consumer_thread_receive_fds when it notices that all fds has hung up.
75 * Also updated by the signal handler (consumer_should_exit()). Read by the
76 * polling threads.
77 */
a98dae5f 78volatile int consumer_quit;
3bd1e081 79
43c34bc3 80/*
43c34bc3
DG
81 * Global hash table containing respectively metadata and data streams. The
82 * stream element in this ht should only be updated by the metadata poll thread
83 * for the metadata and the data poll thread for the data.
84 */
40dc48e0
DG
85static struct lttng_ht *metadata_ht;
86static struct lttng_ht *data_ht;
43c34bc3 87
acdb9057
DG
88/*
89 * Notify a thread lttng pipe to poll back again. This usually means that some
90 * global state has changed so we just send back the thread in a poll wait
91 * call.
92 */
93static void notify_thread_lttng_pipe(struct lttng_pipe *pipe)
94{
95 struct lttng_consumer_stream *null_stream = NULL;
96
97 assert(pipe);
98
99 (void) lttng_pipe_write(pipe, &null_stream, sizeof(null_stream));
100}
101
5c635c72
MD
102static void notify_health_quit_pipe(int *pipe)
103{
6cd525e8 104 ssize_t ret;
5c635c72 105
6cd525e8
MD
106 ret = lttng_write(pipe[1], "4", 1);
107 if (ret < 1) {
5c635c72
MD
108 PERROR("write consumer health quit");
109 }
110}
111
d8ef542d
MD
112static void notify_channel_pipe(struct lttng_consumer_local_data *ctx,
113 struct lttng_consumer_channel *chan,
a0cbdd2e 114 uint64_t key,
d8ef542d
MD
115 enum consumer_channel_action action)
116{
117 struct consumer_channel_msg msg;
6cd525e8 118 ssize_t ret;
d8ef542d 119
e56251fc
DG
120 memset(&msg, 0, sizeof(msg));
121
d8ef542d
MD
122 msg.action = action;
123 msg.chan = chan;
f21dae48 124 msg.key = key;
6cd525e8
MD
125 ret = lttng_write(ctx->consumer_channel_pipe[1], &msg, sizeof(msg));
126 if (ret < sizeof(msg)) {
127 PERROR("notify_channel_pipe write error");
128 }
d8ef542d
MD
129}
130
a0cbdd2e
MD
131void notify_thread_del_channel(struct lttng_consumer_local_data *ctx,
132 uint64_t key)
133{
134 notify_channel_pipe(ctx, NULL, key, CONSUMER_CHANNEL_DEL);
135}
136
d8ef542d
MD
137static int read_channel_pipe(struct lttng_consumer_local_data *ctx,
138 struct lttng_consumer_channel **chan,
a0cbdd2e 139 uint64_t *key,
d8ef542d
MD
140 enum consumer_channel_action *action)
141{
142 struct consumer_channel_msg msg;
6cd525e8 143 ssize_t ret;
d8ef542d 144
6cd525e8
MD
145 ret = lttng_read(ctx->consumer_channel_pipe[0], &msg, sizeof(msg));
146 if (ret < sizeof(msg)) {
147 ret = -1;
148 goto error;
d8ef542d 149 }
6cd525e8
MD
150 *action = msg.action;
151 *chan = msg.chan;
152 *key = msg.key;
153error:
154 return (int) ret;
d8ef542d
MD
155}
156
212d67a2
DG
157/*
158 * Cleanup the stream list of a channel. Those streams are not yet globally
159 * visible
160 */
161static void clean_channel_stream_list(struct lttng_consumer_channel *channel)
162{
163 struct lttng_consumer_stream *stream, *stmp;
164
165 assert(channel);
166
167 /* Delete streams that might have been left in the stream list. */
168 cds_list_for_each_entry_safe(stream, stmp, &channel->streams.head,
169 send_node) {
170 cds_list_del(&stream->send_node);
171 /*
172 * Once a stream is added to this list, the buffers were created so we
173 * have a guarantee that this call will succeed. Setting the monitor
174 * mode to 0 so we don't lock nor try to delete the stream from the
175 * global hash table.
176 */
177 stream->monitor = 0;
178 consumer_stream_destroy(stream, NULL);
179 }
180}
181
3bd1e081
MD
182/*
183 * Find a stream. The consumer_data.lock must be locked during this
184 * call.
185 */
d88aee68 186static struct lttng_consumer_stream *find_stream(uint64_t key,
8389e4f8 187 struct lttng_ht *ht)
3bd1e081 188{
e4421fec 189 struct lttng_ht_iter iter;
d88aee68 190 struct lttng_ht_node_u64 *node;
e4421fec 191 struct lttng_consumer_stream *stream = NULL;
3bd1e081 192
8389e4f8
DG
193 assert(ht);
194
d88aee68
DG
195 /* -1ULL keys are lookup failures */
196 if (key == (uint64_t) -1ULL) {
7ad0a0cb 197 return NULL;
7a57cf92 198 }
e4421fec 199
6065ceec
DG
200 rcu_read_lock();
201
d88aee68
DG
202 lttng_ht_lookup(ht, &key, &iter);
203 node = lttng_ht_iter_get_node_u64(&iter);
e4421fec
DG
204 if (node != NULL) {
205 stream = caa_container_of(node, struct lttng_consumer_stream, node);
3bd1e081 206 }
e4421fec 207
6065ceec
DG
208 rcu_read_unlock();
209
e4421fec 210 return stream;
3bd1e081
MD
211}
212
da009f2c 213static void steal_stream_key(uint64_t key, struct lttng_ht *ht)
7ad0a0cb
MD
214{
215 struct lttng_consumer_stream *stream;
216
04253271 217 rcu_read_lock();
ffe60014 218 stream = find_stream(key, ht);
04253271 219 if (stream) {
da009f2c 220 stream->key = (uint64_t) -1ULL;
04253271
MD
221 /*
222 * We don't want the lookup to match, but we still need
223 * to iterate on this stream when iterating over the hash table. Just
224 * change the node key.
225 */
da009f2c 226 stream->node.key = (uint64_t) -1ULL;
04253271
MD
227 }
228 rcu_read_unlock();
7ad0a0cb
MD
229}
230
d56db448
DG
231/*
232 * Return a channel object for the given key.
233 *
234 * RCU read side lock MUST be acquired before calling this function and
235 * protects the channel ptr.
236 */
d88aee68 237struct lttng_consumer_channel *consumer_find_channel(uint64_t key)
3bd1e081 238{
e4421fec 239 struct lttng_ht_iter iter;
d88aee68 240 struct lttng_ht_node_u64 *node;
e4421fec 241 struct lttng_consumer_channel *channel = NULL;
3bd1e081 242
d88aee68
DG
243 /* -1ULL keys are lookup failures */
244 if (key == (uint64_t) -1ULL) {
7ad0a0cb 245 return NULL;
7a57cf92 246 }
e4421fec 247
d88aee68
DG
248 lttng_ht_lookup(consumer_data.channel_ht, &key, &iter);
249 node = lttng_ht_iter_get_node_u64(&iter);
e4421fec
DG
250 if (node != NULL) {
251 channel = caa_container_of(node, struct lttng_consumer_channel, node);
3bd1e081 252 }
e4421fec
DG
253
254 return channel;
3bd1e081
MD
255}
256
b5a6470f
DG
257/*
258 * There is a possibility that the consumer does not have enough time between
259 * the close of the channel on the session daemon and the cleanup in here thus
260 * once we have a channel add with an existing key, we know for sure that this
261 * channel will eventually get cleaned up by all streams being closed.
262 *
263 * This function just nullifies the already existing channel key.
264 */
265static void steal_channel_key(uint64_t key)
266{
267 struct lttng_consumer_channel *channel;
268
269 rcu_read_lock();
270 channel = consumer_find_channel(key);
271 if (channel) {
272 channel->key = (uint64_t) -1ULL;
273 /*
274 * We don't want the lookup to match, but we still need to iterate on
275 * this channel when iterating over the hash table. Just change the
276 * node key.
277 */
278 channel->node.key = (uint64_t) -1ULL;
279 }
280 rcu_read_unlock();
281}
282
ffe60014 283static void free_channel_rcu(struct rcu_head *head)
702b1ea4 284{
d88aee68
DG
285 struct lttng_ht_node_u64 *node =
286 caa_container_of(head, struct lttng_ht_node_u64, head);
ffe60014
DG
287 struct lttng_consumer_channel *channel =
288 caa_container_of(node, struct lttng_consumer_channel, node);
702b1ea4 289
b83e03c4
MD
290 switch (consumer_data.type) {
291 case LTTNG_CONSUMER_KERNEL:
292 break;
293 case LTTNG_CONSUMER32_UST:
294 case LTTNG_CONSUMER64_UST:
295 lttng_ustconsumer_free_channel(channel);
296 break;
297 default:
298 ERR("Unknown consumer_data type");
299 abort();
300 }
ffe60014 301 free(channel);
702b1ea4
MD
302}
303
00e2e675
DG
304/*
305 * RCU protected relayd socket pair free.
306 */
ffe60014 307static void free_relayd_rcu(struct rcu_head *head)
00e2e675 308{
d88aee68
DG
309 struct lttng_ht_node_u64 *node =
310 caa_container_of(head, struct lttng_ht_node_u64, head);
00e2e675
DG
311 struct consumer_relayd_sock_pair *relayd =
312 caa_container_of(node, struct consumer_relayd_sock_pair, node);
313
8994307f
DG
314 /*
315 * Close all sockets. This is done in the call RCU since we don't want the
316 * socket fds to be reassigned thus potentially creating bad state of the
317 * relayd object.
318 *
319 * We do not have to lock the control socket mutex here since at this stage
320 * there is no one referencing to this relayd object.
321 */
322 (void) relayd_close(&relayd->control_sock);
323 (void) relayd_close(&relayd->data_sock);
324
00e2e675
DG
325 free(relayd);
326}
327
328/*
329 * Destroy and free relayd socket pair object.
00e2e675 330 */
51230d70 331void consumer_destroy_relayd(struct consumer_relayd_sock_pair *relayd)
00e2e675
DG
332{
333 int ret;
334 struct lttng_ht_iter iter;
335
173af62f
DG
336 if (relayd == NULL) {
337 return;
338 }
339
00e2e675
DG
340 DBG("Consumer destroy and close relayd socket pair");
341
342 iter.iter.node = &relayd->node.node;
343 ret = lttng_ht_del(consumer_data.relayd_ht, &iter);
173af62f 344 if (ret != 0) {
8994307f 345 /* We assume the relayd is being or is destroyed */
173af62f
DG
346 return;
347 }
00e2e675 348
00e2e675 349 /* RCU free() call */
ffe60014
DG
350 call_rcu(&relayd->node.head, free_relayd_rcu);
351}
352
353/*
354 * Remove a channel from the global list protected by a mutex. This function is
355 * also responsible for freeing its data structures.
356 */
357void consumer_del_channel(struct lttng_consumer_channel *channel)
358{
359 int ret;
360 struct lttng_ht_iter iter;
361
d88aee68 362 DBG("Consumer delete channel key %" PRIu64, channel->key);
ffe60014
DG
363
364 pthread_mutex_lock(&consumer_data.lock);
a9838785 365 pthread_mutex_lock(&channel->lock);
ffe60014 366
212d67a2
DG
367 /* Destroy streams that might have been left in the stream list. */
368 clean_channel_stream_list(channel);
51e762e5 369
d3e2ba59
JD
370 if (channel->live_timer_enabled == 1) {
371 consumer_timer_live_stop(channel);
372 }
e9404c27
JG
373 if (channel->monitor_timer_enabled == 1) {
374 consumer_timer_monitor_stop(channel);
375 }
d3e2ba59 376
ffe60014
DG
377 switch (consumer_data.type) {
378 case LTTNG_CONSUMER_KERNEL:
379 break;
380 case LTTNG_CONSUMER32_UST:
381 case LTTNG_CONSUMER64_UST:
382 lttng_ustconsumer_del_channel(channel);
383 break;
384 default:
385 ERR("Unknown consumer_data type");
386 assert(0);
387 goto end;
388 }
389
390 rcu_read_lock();
391 iter.iter.node = &channel->node.node;
392 ret = lttng_ht_del(consumer_data.channel_ht, &iter);
393 assert(!ret);
394 rcu_read_unlock();
395
396 call_rcu(&channel->node.head, free_channel_rcu);
397end:
a9838785 398 pthread_mutex_unlock(&channel->lock);
ffe60014 399 pthread_mutex_unlock(&consumer_data.lock);
00e2e675
DG
400}
401
228b5bf7
DG
402/*
403 * Iterate over the relayd hash table and destroy each element. Finally,
404 * destroy the whole hash table.
405 */
406static void cleanup_relayd_ht(void)
407{
408 struct lttng_ht_iter iter;
409 struct consumer_relayd_sock_pair *relayd;
410
411 rcu_read_lock();
412
413 cds_lfht_for_each_entry(consumer_data.relayd_ht->ht, &iter.iter, relayd,
414 node.node) {
51230d70 415 consumer_destroy_relayd(relayd);
228b5bf7
DG
416 }
417
228b5bf7 418 rcu_read_unlock();
36b588ed
MD
419
420 lttng_ht_destroy(consumer_data.relayd_ht);
228b5bf7
DG
421}
422
8994307f
DG
423/*
424 * Update the end point status of all streams having the given network sequence
425 * index (relayd index).
426 *
427 * It's atomically set without having the stream mutex locked which is fine
428 * because we handle the write/read race with a pipe wakeup for each thread.
429 */
da009f2c 430static void update_endpoint_status_by_netidx(uint64_t net_seq_idx,
8994307f
DG
431 enum consumer_endpoint_status status)
432{
433 struct lttng_ht_iter iter;
434 struct lttng_consumer_stream *stream;
435
da009f2c 436 DBG("Consumer set delete flag on stream by idx %" PRIu64, net_seq_idx);
8994307f
DG
437
438 rcu_read_lock();
439
440 /* Let's begin with metadata */
441 cds_lfht_for_each_entry(metadata_ht->ht, &iter.iter, stream, node.node) {
442 if (stream->net_seq_idx == net_seq_idx) {
443 uatomic_set(&stream->endpoint_status, status);
444 DBG("Delete flag set to metadata stream %d", stream->wait_fd);
445 }
446 }
447
448 /* Follow up by the data streams */
449 cds_lfht_for_each_entry(data_ht->ht, &iter.iter, stream, node.node) {
450 if (stream->net_seq_idx == net_seq_idx) {
451 uatomic_set(&stream->endpoint_status, status);
452 DBG("Delete flag set to data stream %d", stream->wait_fd);
453 }
454 }
455 rcu_read_unlock();
456}
457
458/*
459 * Cleanup a relayd object by flagging every associated streams for deletion,
460 * destroying the object meaning removing it from the relayd hash table,
461 * closing the sockets and freeing the memory in a RCU call.
462 *
463 * If a local data context is available, notify the threads that the streams'
464 * state have changed.
465 */
466static void cleanup_relayd(struct consumer_relayd_sock_pair *relayd,
467 struct lttng_consumer_local_data *ctx)
468{
da009f2c 469 uint64_t netidx;
8994307f
DG
470
471 assert(relayd);
472
9617607b
DG
473 DBG("Cleaning up relayd sockets");
474
8994307f
DG
475 /* Save the net sequence index before destroying the object */
476 netidx = relayd->net_seq_idx;
477
478 /*
479 * Delete the relayd from the relayd hash table, close the sockets and free
480 * the object in a RCU call.
481 */
51230d70 482 consumer_destroy_relayd(relayd);
8994307f
DG
483
484 /* Set inactive endpoint to all streams */
485 update_endpoint_status_by_netidx(netidx, CONSUMER_ENDPOINT_INACTIVE);
486
487 /*
488 * With a local data context, notify the threads that the streams' state
489 * have changed. The write() action on the pipe acts as an "implicit"
490 * memory barrier ordering the updates of the end point status from the
491 * read of this status which happens AFTER receiving this notify.
492 */
493 if (ctx) {
acdb9057 494 notify_thread_lttng_pipe(ctx->consumer_data_pipe);
13886d2d 495 notify_thread_lttng_pipe(ctx->consumer_metadata_pipe);
8994307f
DG
496 }
497}
498
a6ba4fe1
DG
499/*
500 * Flag a relayd socket pair for destruction. Destroy it if the refcount
501 * reaches zero.
502 *
503 * RCU read side lock MUST be aquired before calling this function.
504 */
505void consumer_flag_relayd_for_destroy(struct consumer_relayd_sock_pair *relayd)
506{
507 assert(relayd);
508
509 /* Set destroy flag for this object */
510 uatomic_set(&relayd->destroy_flag, 1);
511
512 /* Destroy the relayd if refcount is 0 */
513 if (uatomic_read(&relayd->refcount) == 0) {
51230d70 514 consumer_destroy_relayd(relayd);
a6ba4fe1
DG
515 }
516}
517
3bd1e081 518/*
1d1a276c
DG
519 * Completly destroy stream from every visiable data structure and the given
520 * hash table if one.
521 *
522 * One this call returns, the stream object is not longer usable nor visible.
3bd1e081 523 */
e316aad5
DG
524void consumer_del_stream(struct lttng_consumer_stream *stream,
525 struct lttng_ht *ht)
3bd1e081 526{
1d1a276c 527 consumer_stream_destroy(stream, ht);
3bd1e081
MD
528}
529
5ab66908
MD
530/*
531 * XXX naming of del vs destroy is all mixed up.
532 */
533void consumer_del_stream_for_data(struct lttng_consumer_stream *stream)
534{
535 consumer_stream_destroy(stream, data_ht);
536}
537
538void consumer_del_stream_for_metadata(struct lttng_consumer_stream *stream)
539{
540 consumer_stream_destroy(stream, metadata_ht);
541}
542
d88aee68
DG
543struct lttng_consumer_stream *consumer_allocate_stream(uint64_t channel_key,
544 uint64_t stream_key,
3bd1e081 545 enum lttng_consumer_stream_state state,
ffe60014 546 const char *channel_name,
6df2e2c9 547 uid_t uid,
00e2e675 548 gid_t gid,
57a269f2 549 uint64_t relayd_id,
53632229 550 uint64_t session_id,
ffe60014
DG
551 int cpu,
552 int *alloc_ret,
4891ece8
DG
553 enum consumer_channel_type type,
554 unsigned int monitor)
3bd1e081 555{
ffe60014 556 int ret;
3bd1e081 557 struct lttng_consumer_stream *stream;
3bd1e081 558
effcf122 559 stream = zmalloc(sizeof(*stream));
3bd1e081 560 if (stream == NULL) {
7a57cf92 561 PERROR("malloc struct lttng_consumer_stream");
ffe60014 562 ret = -ENOMEM;
7a57cf92 563 goto end;
3bd1e081 564 }
7a57cf92 565
d56db448
DG
566 rcu_read_lock();
567
3bd1e081 568 stream->key = stream_key;
3bd1e081
MD
569 stream->out_fd = -1;
570 stream->out_fd_offset = 0;
e5d1a9b3 571 stream->output_written = 0;
3bd1e081 572 stream->state = state;
6df2e2c9
MD
573 stream->uid = uid;
574 stream->gid = gid;
ffe60014 575 stream->net_seq_idx = relayd_id;
53632229 576 stream->session_id = session_id;
4891ece8 577 stream->monitor = monitor;
774d490c 578 stream->endpoint_status = CONSUMER_ENDPOINT_ACTIVE;
f8f3885c 579 stream->index_file = NULL;
fb83fe64 580 stream->last_sequence_number = -1ULL;
53632229 581 pthread_mutex_init(&stream->lock, NULL);
c585821b 582 pthread_mutex_init(&stream->metadata_timer_lock, NULL);
58b1f425 583
ffe60014
DG
584 /* If channel is the metadata, flag this stream as metadata. */
585 if (type == CONSUMER_CHANNEL_TYPE_METADATA) {
586 stream->metadata_flag = 1;
587 /* Metadata is flat out. */
588 strncpy(stream->name, DEFAULT_METADATA_NAME, sizeof(stream->name));
94d49140
JD
589 /* Live rendez-vous point. */
590 pthread_cond_init(&stream->metadata_rdv, NULL);
591 pthread_mutex_init(&stream->metadata_rdv_lock, NULL);
58b1f425 592 } else {
ffe60014
DG
593 /* Format stream name to <channel_name>_<cpu_number> */
594 ret = snprintf(stream->name, sizeof(stream->name), "%s_%d",
595 channel_name, cpu);
596 if (ret < 0) {
597 PERROR("snprintf stream name");
598 goto error;
599 }
58b1f425 600 }
c30aaa51 601
ffe60014 602 /* Key is always the wait_fd for streams. */
d88aee68 603 lttng_ht_node_init_u64(&stream->node, stream->key);
ffe60014 604
d8ef542d
MD
605 /* Init node per channel id key */
606 lttng_ht_node_init_u64(&stream->node_channel_id, channel_key);
607
53632229 608 /* Init session id node with the stream session id */
d88aee68 609 lttng_ht_node_init_u64(&stream->node_session_id, stream->session_id);
53632229 610
07b86b52
JD
611 DBG3("Allocated stream %s (key %" PRIu64 ", chan_key %" PRIu64
612 " relayd_id %" PRIu64 ", session_id %" PRIu64,
613 stream->name, stream->key, channel_key,
614 stream->net_seq_idx, stream->session_id);
d56db448
DG
615
616 rcu_read_unlock();
3bd1e081 617 return stream;
c80048c6
MD
618
619error:
d56db448 620 rcu_read_unlock();
c80048c6 621 free(stream);
7a57cf92 622end:
ffe60014
DG
623 if (alloc_ret) {
624 *alloc_ret = ret;
625 }
c80048c6 626 return NULL;
3bd1e081
MD
627}
628
629/*
630 * Add a stream to the global list protected by a mutex.
631 */
5ab66908 632int consumer_add_data_stream(struct lttng_consumer_stream *stream)
3bd1e081 633{
5ab66908 634 struct lttng_ht *ht = data_ht;
3bd1e081
MD
635 int ret = 0;
636
e316aad5 637 assert(stream);
43c34bc3 638 assert(ht);
c77fc10a 639
d88aee68 640 DBG3("Adding consumer stream %" PRIu64, stream->key);
e316aad5
DG
641
642 pthread_mutex_lock(&consumer_data.lock);
a9838785 643 pthread_mutex_lock(&stream->chan->lock);
ec6ea7d0 644 pthread_mutex_lock(&stream->chan->timer_lock);
2e818a6a 645 pthread_mutex_lock(&stream->lock);
b0b335c8 646 rcu_read_lock();
e316aad5 647
43c34bc3 648 /* Steal stream identifier to avoid having streams with the same key */
ffe60014 649 steal_stream_key(stream->key, ht);
43c34bc3 650
d88aee68 651 lttng_ht_add_unique_u64(ht, &stream->node);
00e2e675 652
d8ef542d
MD
653 lttng_ht_add_u64(consumer_data.stream_per_chan_id_ht,
654 &stream->node_channel_id);
655
ca22feea
DG
656 /*
657 * Add stream to the stream_list_ht of the consumer data. No need to steal
658 * the key since the HT does not use it and we allow to add redundant keys
659 * into this table.
660 */
d88aee68 661 lttng_ht_add_u64(consumer_data.stream_list_ht, &stream->node_session_id);
ca22feea 662
e316aad5 663 /*
ffe60014
DG
664 * When nb_init_stream_left reaches 0, we don't need to trigger any action
665 * in terms of destroying the associated channel, because the action that
e316aad5
DG
666 * causes the count to become 0 also causes a stream to be added. The
667 * channel deletion will thus be triggered by the following removal of this
668 * stream.
669 */
ffe60014 670 if (uatomic_read(&stream->chan->nb_init_stream_left) > 0) {
f2ad556d
MD
671 /* Increment refcount before decrementing nb_init_stream_left */
672 cmm_smp_wmb();
ffe60014 673 uatomic_dec(&stream->chan->nb_init_stream_left);
e316aad5
DG
674 }
675
676 /* Update consumer data once the node is inserted. */
3bd1e081
MD
677 consumer_data.stream_count++;
678 consumer_data.need_update = 1;
679
e316aad5 680 rcu_read_unlock();
2e818a6a 681 pthread_mutex_unlock(&stream->lock);
ec6ea7d0 682 pthread_mutex_unlock(&stream->chan->timer_lock);
a9838785 683 pthread_mutex_unlock(&stream->chan->lock);
3bd1e081 684 pthread_mutex_unlock(&consumer_data.lock);
702b1ea4 685
3bd1e081
MD
686 return ret;
687}
688
5ab66908
MD
689void consumer_del_data_stream(struct lttng_consumer_stream *stream)
690{
691 consumer_del_stream(stream, data_ht);
692}
693
00e2e675 694/*
3f8e211f
DG
695 * Add relayd socket to global consumer data hashtable. RCU read side lock MUST
696 * be acquired before calling this.
00e2e675 697 */
d09e1200 698static int add_relayd(struct consumer_relayd_sock_pair *relayd)
00e2e675
DG
699{
700 int ret = 0;
d88aee68 701 struct lttng_ht_node_u64 *node;
00e2e675
DG
702 struct lttng_ht_iter iter;
703
ffe60014 704 assert(relayd);
00e2e675 705
00e2e675 706 lttng_ht_lookup(consumer_data.relayd_ht,
d88aee68
DG
707 &relayd->net_seq_idx, &iter);
708 node = lttng_ht_iter_get_node_u64(&iter);
00e2e675 709 if (node != NULL) {
00e2e675
DG
710 goto end;
711 }
d88aee68 712 lttng_ht_add_unique_u64(consumer_data.relayd_ht, &relayd->node);
00e2e675 713
00e2e675
DG
714end:
715 return ret;
716}
717
718/*
719 * Allocate and return a consumer relayd socket.
720 */
027a694f 721static struct consumer_relayd_sock_pair *consumer_allocate_relayd_sock_pair(
da009f2c 722 uint64_t net_seq_idx)
00e2e675
DG
723{
724 struct consumer_relayd_sock_pair *obj = NULL;
725
da009f2c
MD
726 /* net sequence index of -1 is a failure */
727 if (net_seq_idx == (uint64_t) -1ULL) {
00e2e675
DG
728 goto error;
729 }
730
731 obj = zmalloc(sizeof(struct consumer_relayd_sock_pair));
732 if (obj == NULL) {
733 PERROR("zmalloc relayd sock");
734 goto error;
735 }
736
737 obj->net_seq_idx = net_seq_idx;
738 obj->refcount = 0;
173af62f 739 obj->destroy_flag = 0;
f96e4545
MD
740 obj->control_sock.sock.fd = -1;
741 obj->data_sock.sock.fd = -1;
d88aee68 742 lttng_ht_node_init_u64(&obj->node, obj->net_seq_idx);
00e2e675
DG
743 pthread_mutex_init(&obj->ctrl_sock_mutex, NULL);
744
745error:
746 return obj;
747}
748
749/*
750 * Find a relayd socket pair in the global consumer data.
751 *
752 * Return the object if found else NULL.
b0b335c8
MD
753 * RCU read-side lock must be held across this call and while using the
754 * returned object.
00e2e675 755 */
d88aee68 756struct consumer_relayd_sock_pair *consumer_find_relayd(uint64_t key)
00e2e675
DG
757{
758 struct lttng_ht_iter iter;
d88aee68 759 struct lttng_ht_node_u64 *node;
00e2e675
DG
760 struct consumer_relayd_sock_pair *relayd = NULL;
761
762 /* Negative keys are lookup failures */
d88aee68 763 if (key == (uint64_t) -1ULL) {
00e2e675
DG
764 goto error;
765 }
766
d88aee68 767 lttng_ht_lookup(consumer_data.relayd_ht, &key,
00e2e675 768 &iter);
d88aee68 769 node = lttng_ht_iter_get_node_u64(&iter);
00e2e675
DG
770 if (node != NULL) {
771 relayd = caa_container_of(node, struct consumer_relayd_sock_pair, node);
772 }
773
00e2e675
DG
774error:
775 return relayd;
776}
777
10a50311
JD
778/*
779 * Find a relayd and send the stream
780 *
781 * Returns 0 on success, < 0 on error
782 */
783int consumer_send_relayd_stream(struct lttng_consumer_stream *stream,
784 char *path)
785{
786 int ret = 0;
787 struct consumer_relayd_sock_pair *relayd;
788
789 assert(stream);
790 assert(stream->net_seq_idx != -1ULL);
791 assert(path);
792
793 /* The stream is not metadata. Get relayd reference if exists. */
794 rcu_read_lock();
795 relayd = consumer_find_relayd(stream->net_seq_idx);
796 if (relayd != NULL) {
797 /* Add stream on the relayd */
798 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
799 ret = relayd_add_stream(&relayd->control_sock, stream->name,
800 path, &stream->relayd_stream_id,
801 stream->chan->tracefile_size, stream->chan->tracefile_count);
802 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
803 if (ret < 0) {
804 goto end;
805 }
1c20f0e2 806
10a50311 807 uatomic_inc(&relayd->refcount);
d01178b6 808 stream->sent_to_relayd = 1;
10a50311
JD
809 } else {
810 ERR("Stream %" PRIu64 " relayd ID %" PRIu64 " unknown. Can't send it.",
811 stream->key, stream->net_seq_idx);
812 ret = -1;
813 goto end;
814 }
815
816 DBG("Stream %s with key %" PRIu64 " sent to relayd id %" PRIu64,
817 stream->name, stream->key, stream->net_seq_idx);
818
819end:
820 rcu_read_unlock();
821 return ret;
822}
823
a4baae1b
JD
824/*
825 * Find a relayd and send the streams sent message
826 *
827 * Returns 0 on success, < 0 on error
828 */
829int consumer_send_relayd_streams_sent(uint64_t net_seq_idx)
830{
831 int ret = 0;
832 struct consumer_relayd_sock_pair *relayd;
833
834 assert(net_seq_idx != -1ULL);
835
836 /* The stream is not metadata. Get relayd reference if exists. */
837 rcu_read_lock();
838 relayd = consumer_find_relayd(net_seq_idx);
839 if (relayd != NULL) {
840 /* Add stream on the relayd */
841 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
842 ret = relayd_streams_sent(&relayd->control_sock);
843 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
844 if (ret < 0) {
845 goto end;
846 }
847 } else {
848 ERR("Relayd ID %" PRIu64 " unknown. Can't send streams_sent.",
849 net_seq_idx);
850 ret = -1;
851 goto end;
852 }
853
854 ret = 0;
855 DBG("All streams sent relayd id %" PRIu64, net_seq_idx);
856
857end:
858 rcu_read_unlock();
859 return ret;
860}
861
10a50311
JD
862/*
863 * Find a relayd and close the stream
864 */
865void close_relayd_stream(struct lttng_consumer_stream *stream)
866{
867 struct consumer_relayd_sock_pair *relayd;
868
869 /* The stream is not metadata. Get relayd reference if exists. */
870 rcu_read_lock();
871 relayd = consumer_find_relayd(stream->net_seq_idx);
872 if (relayd) {
873 consumer_stream_relayd_close(stream, relayd);
874 }
875 rcu_read_unlock();
876}
877
00e2e675
DG
878/*
879 * Handle stream for relayd transmission if the stream applies for network
880 * streaming where the net sequence index is set.
881 *
882 * Return destination file descriptor or negative value on error.
883 */
6197aea7 884static int write_relayd_stream_header(struct lttng_consumer_stream *stream,
1d4dfdef
DG
885 size_t data_size, unsigned long padding,
886 struct consumer_relayd_sock_pair *relayd)
00e2e675
DG
887{
888 int outfd = -1, ret;
00e2e675
DG
889 struct lttcomm_relayd_data_hdr data_hdr;
890
891 /* Safety net */
892 assert(stream);
6197aea7 893 assert(relayd);
00e2e675
DG
894
895 /* Reset data header */
896 memset(&data_hdr, 0, sizeof(data_hdr));
897
00e2e675
DG
898 if (stream->metadata_flag) {
899 /* Caller MUST acquire the relayd control socket lock */
900 ret = relayd_send_metadata(&relayd->control_sock, data_size);
901 if (ret < 0) {
902 goto error;
903 }
904
905 /* Metadata are always sent on the control socket. */
6151a90f 906 outfd = relayd->control_sock.sock.fd;
00e2e675
DG
907 } else {
908 /* Set header with stream information */
909 data_hdr.stream_id = htobe64(stream->relayd_stream_id);
910 data_hdr.data_size = htobe32(data_size);
1d4dfdef 911 data_hdr.padding_size = htobe32(padding);
39df6d9f
DG
912 /*
913 * Note that net_seq_num below is assigned with the *current* value of
914 * next_net_seq_num and only after that the next_net_seq_num will be
915 * increment. This is why when issuing a command on the relayd using
916 * this next value, 1 should always be substracted in order to compare
917 * the last seen sequence number on the relayd side to the last sent.
918 */
3604f373 919 data_hdr.net_seq_num = htobe64(stream->next_net_seq_num);
00e2e675
DG
920 /* Other fields are zeroed previously */
921
922 ret = relayd_send_data_hdr(&relayd->data_sock, &data_hdr,
923 sizeof(data_hdr));
924 if (ret < 0) {
925 goto error;
926 }
927
3604f373
DG
928 ++stream->next_net_seq_num;
929
00e2e675 930 /* Set to go on data socket */
6151a90f 931 outfd = relayd->data_sock.sock.fd;
00e2e675
DG
932 }
933
934error:
935 return outfd;
936}
937
3bd1e081 938/*
ffe60014
DG
939 * Allocate and return a new lttng_consumer_channel object using the given key
940 * to initialize the hash table node.
941 *
942 * On error, return NULL.
3bd1e081 943 */
886224ff 944struct lttng_consumer_channel *consumer_allocate_channel(uint64_t key,
ffe60014
DG
945 uint64_t session_id,
946 const char *pathname,
947 const char *name,
948 uid_t uid,
949 gid_t gid,
57a269f2 950 uint64_t relayd_id,
1624d5b7
JD
951 enum lttng_event_output output,
952 uint64_t tracefile_size,
2bba9e53 953 uint64_t tracefile_count,
1950109e 954 uint64_t session_id_per_pid,
ecc48a90 955 unsigned int monitor,
d7ba1388 956 unsigned int live_timer_interval,
3d071855 957 const char *root_shm_path,
d7ba1388 958 const char *shm_path)
3bd1e081
MD
959{
960 struct lttng_consumer_channel *channel;
3bd1e081 961
276b26d1 962 channel = zmalloc(sizeof(*channel));
3bd1e081 963 if (channel == NULL) {
7a57cf92 964 PERROR("malloc struct lttng_consumer_channel");
3bd1e081
MD
965 goto end;
966 }
ffe60014
DG
967
968 channel->key = key;
3bd1e081 969 channel->refcount = 0;
ffe60014 970 channel->session_id = session_id;
1950109e 971 channel->session_id_per_pid = session_id_per_pid;
ffe60014
DG
972 channel->uid = uid;
973 channel->gid = gid;
974 channel->relayd_id = relayd_id;
1624d5b7
JD
975 channel->tracefile_size = tracefile_size;
976 channel->tracefile_count = tracefile_count;
2bba9e53 977 channel->monitor = monitor;
ecc48a90 978 channel->live_timer_interval = live_timer_interval;
a9838785 979 pthread_mutex_init(&channel->lock, NULL);
ec6ea7d0 980 pthread_mutex_init(&channel->timer_lock, NULL);
ffe60014 981
0c759fc9
DG
982 switch (output) {
983 case LTTNG_EVENT_SPLICE:
984 channel->output = CONSUMER_CHANNEL_SPLICE;
985 break;
986 case LTTNG_EVENT_MMAP:
987 channel->output = CONSUMER_CHANNEL_MMAP;
988 break;
989 default:
990 assert(0);
991 free(channel);
992 channel = NULL;
993 goto end;
994 }
995
07b86b52
JD
996 /*
997 * In monitor mode, the streams associated with the channel will be put in
998 * a special list ONLY owned by this channel. So, the refcount is set to 1
999 * here meaning that the channel itself has streams that are referenced.
1000 *
1001 * On a channel deletion, once the channel is no longer visible, the
1002 * refcount is decremented and checked for a zero value to delete it. With
1003 * streams in no monitor mode, it will now be safe to destroy the channel.
1004 */
1005 if (!channel->monitor) {
1006 channel->refcount = 1;
1007 }
1008
ffe60014
DG
1009 strncpy(channel->pathname, pathname, sizeof(channel->pathname));
1010 channel->pathname[sizeof(channel->pathname) - 1] = '\0';
1011
1012 strncpy(channel->name, name, sizeof(channel->name));
1013 channel->name[sizeof(channel->name) - 1] = '\0';
1014
3d071855
MD
1015 if (root_shm_path) {
1016 strncpy(channel->root_shm_path, root_shm_path, sizeof(channel->root_shm_path));
1017 channel->root_shm_path[sizeof(channel->root_shm_path) - 1] = '\0';
1018 }
d7ba1388
MD
1019 if (shm_path) {
1020 strncpy(channel->shm_path, shm_path, sizeof(channel->shm_path));
1021 channel->shm_path[sizeof(channel->shm_path) - 1] = '\0';
1022 }
1023
d88aee68 1024 lttng_ht_node_init_u64(&channel->node, channel->key);
d8ef542d
MD
1025
1026 channel->wait_fd = -1;
1027
ffe60014
DG
1028 CDS_INIT_LIST_HEAD(&channel->streams.head);
1029
62a7b8ed 1030 DBG("Allocated channel (key %" PRIu64 ")", channel->key);
3bd1e081 1031
3bd1e081
MD
1032end:
1033 return channel;
1034}
1035
1036/*
1037 * Add a channel to the global list protected by a mutex.
821fffb2 1038 *
b5a6470f 1039 * Always return 0 indicating success.
3bd1e081 1040 */
d8ef542d
MD
1041int consumer_add_channel(struct lttng_consumer_channel *channel,
1042 struct lttng_consumer_local_data *ctx)
3bd1e081 1043{
3bd1e081 1044 pthread_mutex_lock(&consumer_data.lock);
a9838785 1045 pthread_mutex_lock(&channel->lock);
ec6ea7d0 1046 pthread_mutex_lock(&channel->timer_lock);
c77fc10a 1047
b5a6470f
DG
1048 /*
1049 * This gives us a guarantee that the channel we are about to add to the
1050 * channel hash table will be unique. See this function comment on the why
1051 * we need to steel the channel key at this stage.
1052 */
1053 steal_channel_key(channel->key);
c77fc10a 1054
b5a6470f 1055 rcu_read_lock();
d88aee68 1056 lttng_ht_add_unique_u64(consumer_data.channel_ht, &channel->node);
6065ceec 1057 rcu_read_unlock();
b5a6470f 1058
ec6ea7d0 1059 pthread_mutex_unlock(&channel->timer_lock);
a9838785 1060 pthread_mutex_unlock(&channel->lock);
3bd1e081 1061 pthread_mutex_unlock(&consumer_data.lock);
702b1ea4 1062
b5a6470f 1063 if (channel->wait_fd != -1 && channel->type == CONSUMER_CHANNEL_TYPE_DATA) {
a0cbdd2e 1064 notify_channel_pipe(ctx, channel, -1, CONSUMER_CHANNEL_ADD);
d8ef542d 1065 }
b5a6470f
DG
1066
1067 return 0;
3bd1e081
MD
1068}
1069
1070/*
1071 * Allocate the pollfd structure and the local view of the out fds to avoid
1072 * doing a lookup in the linked list and concurrency issues when writing is
1073 * needed. Called with consumer_data.lock held.
1074 *
1075 * Returns the number of fds in the structures.
1076 */
ffe60014
DG
1077static int update_poll_array(struct lttng_consumer_local_data *ctx,
1078 struct pollfd **pollfd, struct lttng_consumer_stream **local_stream,
1079 struct lttng_ht *ht)
3bd1e081 1080{
3bd1e081 1081 int i = 0;
e4421fec
DG
1082 struct lttng_ht_iter iter;
1083 struct lttng_consumer_stream *stream;
3bd1e081 1084
ffe60014
DG
1085 assert(ctx);
1086 assert(ht);
1087 assert(pollfd);
1088 assert(local_stream);
1089
3bd1e081 1090 DBG("Updating poll fd array");
481d6c57 1091 rcu_read_lock();
43c34bc3 1092 cds_lfht_for_each_entry(ht->ht, &iter.iter, stream, node.node) {
8994307f
DG
1093 /*
1094 * Only active streams with an active end point can be added to the
1095 * poll set and local stream storage of the thread.
1096 *
1097 * There is a potential race here for endpoint_status to be updated
1098 * just after the check. However, this is OK since the stream(s) will
1099 * be deleted once the thread is notified that the end point state has
1100 * changed where this function will be called back again.
1101 */
1102 if (stream->state != LTTNG_CONSUMER_ACTIVE_STREAM ||
79d4ffb7 1103 stream->endpoint_status == CONSUMER_ENDPOINT_INACTIVE) {
3bd1e081
MD
1104 continue;
1105 }
7972aab2
DG
1106 /*
1107 * This clobbers way too much the debug output. Uncomment that if you
1108 * need it for debugging purposes.
1109 *
1110 * DBG("Active FD %d", stream->wait_fd);
1111 */
e4421fec 1112 (*pollfd)[i].fd = stream->wait_fd;
3bd1e081 1113 (*pollfd)[i].events = POLLIN | POLLPRI;
e4421fec 1114 local_stream[i] = stream;
3bd1e081
MD
1115 i++;
1116 }
481d6c57 1117 rcu_read_unlock();
3bd1e081
MD
1118
1119 /*
50f8ae69 1120 * Insert the consumer_data_pipe at the end of the array and don't
3bd1e081
MD
1121 * increment i so nb_fd is the number of real FD.
1122 */
acdb9057 1123 (*pollfd)[i].fd = lttng_pipe_get_readfd(ctx->consumer_data_pipe);
509bb1cf 1124 (*pollfd)[i].events = POLLIN | POLLPRI;
02b3d176
DG
1125
1126 (*pollfd)[i + 1].fd = lttng_pipe_get_readfd(ctx->consumer_wakeup_pipe);
1127 (*pollfd)[i + 1].events = POLLIN | POLLPRI;
3bd1e081
MD
1128 return i;
1129}
1130
1131/*
84382d49
MD
1132 * Poll on the should_quit pipe and the command socket return -1 on
1133 * error, 1 if should exit, 0 if data is available on the command socket
3bd1e081
MD
1134 */
1135int lttng_consumer_poll_socket(struct pollfd *consumer_sockpoll)
1136{
1137 int num_rdy;
1138
88f2b785 1139restart:
3bd1e081
MD
1140 num_rdy = poll(consumer_sockpoll, 2, -1);
1141 if (num_rdy == -1) {
88f2b785
MD
1142 /*
1143 * Restart interrupted system call.
1144 */
1145 if (errno == EINTR) {
1146 goto restart;
1147 }
7a57cf92 1148 PERROR("Poll error");
84382d49 1149 return -1;
3bd1e081 1150 }
509bb1cf 1151 if (consumer_sockpoll[0].revents & (POLLIN | POLLPRI)) {
3bd1e081 1152 DBG("consumer_should_quit wake up");
84382d49 1153 return 1;
3bd1e081
MD
1154 }
1155 return 0;
3bd1e081
MD
1156}
1157
1158/*
1159 * Set the error socket.
1160 */
ffe60014
DG
1161void lttng_consumer_set_error_sock(struct lttng_consumer_local_data *ctx,
1162 int sock)
3bd1e081
MD
1163{
1164 ctx->consumer_error_socket = sock;
1165}
1166
1167/*
1168 * Set the command socket path.
1169 */
3bd1e081
MD
1170void lttng_consumer_set_command_sock_path(
1171 struct lttng_consumer_local_data *ctx, char *sock)
1172{
1173 ctx->consumer_command_sock_path = sock;
1174}
1175
1176/*
1177 * Send return code to the session daemon.
1178 * If the socket is not defined, we return 0, it is not a fatal error
1179 */
ffe60014 1180int lttng_consumer_send_error(struct lttng_consumer_local_data *ctx, int cmd)
3bd1e081
MD
1181{
1182 if (ctx->consumer_error_socket > 0) {
1183 return lttcomm_send_unix_sock(ctx->consumer_error_socket, &cmd,
1184 sizeof(enum lttcomm_sessiond_command));
1185 }
1186
1187 return 0;
1188}
1189
1190/*
228b5bf7
DG
1191 * Close all the tracefiles and stream fds and MUST be called when all
1192 * instances are destroyed i.e. when all threads were joined and are ended.
3bd1e081
MD
1193 */
1194void lttng_consumer_cleanup(void)
1195{
e4421fec 1196 struct lttng_ht_iter iter;
ffe60014 1197 struct lttng_consumer_channel *channel;
6065ceec
DG
1198
1199 rcu_read_lock();
3bd1e081 1200
ffe60014
DG
1201 cds_lfht_for_each_entry(consumer_data.channel_ht->ht, &iter.iter, channel,
1202 node.node) {
702b1ea4 1203 consumer_del_channel(channel);
3bd1e081 1204 }
6065ceec
DG
1205
1206 rcu_read_unlock();
d6ce1df2 1207
d6ce1df2 1208 lttng_ht_destroy(consumer_data.channel_ht);
228b5bf7
DG
1209
1210 cleanup_relayd_ht();
1211
d8ef542d
MD
1212 lttng_ht_destroy(consumer_data.stream_per_chan_id_ht);
1213
228b5bf7
DG
1214 /*
1215 * This HT contains streams that are freed by either the metadata thread or
1216 * the data thread so we do *nothing* on the hash table and simply destroy
1217 * it.
1218 */
1219 lttng_ht_destroy(consumer_data.stream_list_ht);
3bd1e081
MD
1220}
1221
1222/*
1223 * Called from signal handler.
1224 */
1225void lttng_consumer_should_exit(struct lttng_consumer_local_data *ctx)
1226{
6cd525e8
MD
1227 ssize_t ret;
1228
3bd1e081 1229 consumer_quit = 1;
6cd525e8
MD
1230 ret = lttng_write(ctx->consumer_should_quit[1], "4", 1);
1231 if (ret < 1) {
7a57cf92 1232 PERROR("write consumer quit");
3bd1e081 1233 }
ab1027f4
DG
1234
1235 DBG("Consumer flag that it should quit");
3bd1e081
MD
1236}
1237
5199ffc4
JG
1238
1239/*
1240 * Flush pending writes to trace output disk file.
1241 */
1242static
00e2e675
DG
1243void lttng_consumer_sync_trace_file(struct lttng_consumer_stream *stream,
1244 off_t orig_offset)
3bd1e081 1245{
c7a78aab 1246 int ret;
3bd1e081
MD
1247 int outfd = stream->out_fd;
1248
1249 /*
1250 * This does a blocking write-and-wait on any page that belongs to the
1251 * subbuffer prior to the one we just wrote.
1252 * Don't care about error values, as these are just hints and ways to
1253 * limit the amount of page cache used.
1254 */
ffe60014 1255 if (orig_offset < stream->max_sb_size) {
3bd1e081
MD
1256 return;
1257 }
ffe60014
DG
1258 lttng_sync_file_range(outfd, orig_offset - stream->max_sb_size,
1259 stream->max_sb_size,
3bd1e081
MD
1260 SYNC_FILE_RANGE_WAIT_BEFORE
1261 | SYNC_FILE_RANGE_WRITE
1262 | SYNC_FILE_RANGE_WAIT_AFTER);
1263 /*
1264 * Give hints to the kernel about how we access the file:
1265 * POSIX_FADV_DONTNEED : we won't re-access data in a near future after
1266 * we write it.
1267 *
1268 * We need to call fadvise again after the file grows because the
1269 * kernel does not seem to apply fadvise to non-existing parts of the
1270 * file.
1271 *
1272 * Call fadvise _after_ having waited for the page writeback to
1273 * complete because the dirty page writeback semantic is not well
1274 * defined. So it can be expected to lead to lower throughput in
1275 * streaming.
1276 */
c7a78aab 1277 ret = posix_fadvise(outfd, orig_offset - stream->max_sb_size,
ffe60014 1278 stream->max_sb_size, POSIX_FADV_DONTNEED);
a0d0e127 1279 if (ret && ret != -ENOSYS) {
a74a5f4a
JG
1280 errno = ret;
1281 PERROR("posix_fadvise on fd %i", outfd);
c7a78aab 1282 }
3bd1e081
MD
1283}
1284
1285/*
1286 * Initialise the necessary environnement :
1287 * - create a new context
1288 * - create the poll_pipe
1289 * - create the should_quit pipe (for signal handler)
1290 * - create the thread pipe (for splice)
1291 *
1292 * Takes a function pointer as argument, this function is called when data is
1293 * available on a buffer. This function is responsible to do the
1294 * kernctl_get_next_subbuf, read the data with mmap or splice depending on the
1295 * buffer configuration and then kernctl_put_next_subbuf at the end.
1296 *
1297 * Returns a pointer to the new context or NULL on error.
1298 */
1299struct lttng_consumer_local_data *lttng_consumer_create(
1300 enum lttng_consumer_type type,
4078b776 1301 ssize_t (*buffer_ready)(struct lttng_consumer_stream *stream,
d41f73b7 1302 struct lttng_consumer_local_data *ctx),
3bd1e081
MD
1303 int (*recv_channel)(struct lttng_consumer_channel *channel),
1304 int (*recv_stream)(struct lttng_consumer_stream *stream),
30319bcb 1305 int (*update_stream)(uint64_t stream_key, uint32_t state))
3bd1e081 1306{
d8ef542d 1307 int ret;
3bd1e081
MD
1308 struct lttng_consumer_local_data *ctx;
1309
1310 assert(consumer_data.type == LTTNG_CONSUMER_UNKNOWN ||
1311 consumer_data.type == type);
1312 consumer_data.type = type;
1313
effcf122 1314 ctx = zmalloc(sizeof(struct lttng_consumer_local_data));
3bd1e081 1315 if (ctx == NULL) {
7a57cf92 1316 PERROR("allocating context");
3bd1e081
MD
1317 goto error;
1318 }
1319
1320 ctx->consumer_error_socket = -1;
331744e3 1321 ctx->consumer_metadata_socket = -1;
75d83e50 1322 pthread_mutex_init(&ctx->metadata_socket_lock, NULL);
3bd1e081
MD
1323 /* assign the callbacks */
1324 ctx->on_buffer_ready = buffer_ready;
1325 ctx->on_recv_channel = recv_channel;
1326 ctx->on_recv_stream = recv_stream;
1327 ctx->on_update_stream = update_stream;
1328
acdb9057
DG
1329 ctx->consumer_data_pipe = lttng_pipe_open(0);
1330 if (!ctx->consumer_data_pipe) {
3bd1e081
MD
1331 goto error_poll_pipe;
1332 }
1333
02b3d176
DG
1334 ctx->consumer_wakeup_pipe = lttng_pipe_open(0);
1335 if (!ctx->consumer_wakeup_pipe) {
1336 goto error_wakeup_pipe;
1337 }
1338
3bd1e081
MD
1339 ret = pipe(ctx->consumer_should_quit);
1340 if (ret < 0) {
7a57cf92 1341 PERROR("Error creating recv pipe");
3bd1e081
MD
1342 goto error_quit_pipe;
1343 }
1344
d8ef542d
MD
1345 ret = pipe(ctx->consumer_channel_pipe);
1346 if (ret < 0) {
1347 PERROR("Error creating channel pipe");
1348 goto error_channel_pipe;
1349 }
1350
13886d2d
DG
1351 ctx->consumer_metadata_pipe = lttng_pipe_open(0);
1352 if (!ctx->consumer_metadata_pipe) {
fb3a43a9
DG
1353 goto error_metadata_pipe;
1354 }
3bd1e081 1355
e9404c27
JG
1356 ctx->channel_monitor_pipe = -1;
1357
fb3a43a9 1358 return ctx;
3bd1e081 1359
fb3a43a9 1360error_metadata_pipe:
d8ef542d
MD
1361 utils_close_pipe(ctx->consumer_channel_pipe);
1362error_channel_pipe:
d8ef542d 1363 utils_close_pipe(ctx->consumer_should_quit);
3bd1e081 1364error_quit_pipe:
02b3d176
DG
1365 lttng_pipe_destroy(ctx->consumer_wakeup_pipe);
1366error_wakeup_pipe:
acdb9057 1367 lttng_pipe_destroy(ctx->consumer_data_pipe);
3bd1e081
MD
1368error_poll_pipe:
1369 free(ctx);
1370error:
1371 return NULL;
1372}
1373
282dadbc
MD
1374/*
1375 * Iterate over all streams of the hashtable and free them properly.
1376 */
1377static void destroy_data_stream_ht(struct lttng_ht *ht)
1378{
1379 struct lttng_ht_iter iter;
1380 struct lttng_consumer_stream *stream;
1381
1382 if (ht == NULL) {
1383 return;
1384 }
1385
1386 rcu_read_lock();
1387 cds_lfht_for_each_entry(ht->ht, &iter.iter, stream, node.node) {
1388 /*
1389 * Ignore return value since we are currently cleaning up so any error
1390 * can't be handled.
1391 */
1392 (void) consumer_del_stream(stream, ht);
1393 }
1394 rcu_read_unlock();
1395
1396 lttng_ht_destroy(ht);
1397}
1398
1399/*
1400 * Iterate over all streams of the metadata hashtable and free them
1401 * properly.
1402 */
1403static void destroy_metadata_stream_ht(struct lttng_ht *ht)
1404{
1405 struct lttng_ht_iter iter;
1406 struct lttng_consumer_stream *stream;
1407
1408 if (ht == NULL) {
1409 return;
1410 }
1411
1412 rcu_read_lock();
1413 cds_lfht_for_each_entry(ht->ht, &iter.iter, stream, node.node) {
1414 /*
1415 * Ignore return value since we are currently cleaning up so any error
1416 * can't be handled.
1417 */
1418 (void) consumer_del_metadata_stream(stream, ht);
1419 }
1420 rcu_read_unlock();
1421
1422 lttng_ht_destroy(ht);
1423}
1424
3bd1e081
MD
1425/*
1426 * Close all fds associated with the instance and free the context.
1427 */
1428void lttng_consumer_destroy(struct lttng_consumer_local_data *ctx)
1429{
4c462e79
MD
1430 int ret;
1431
ab1027f4
DG
1432 DBG("Consumer destroying it. Closing everything.");
1433
4f2e75b9
DG
1434 if (!ctx) {
1435 return;
1436 }
1437
282dadbc
MD
1438 destroy_data_stream_ht(data_ht);
1439 destroy_metadata_stream_ht(metadata_ht);
1440
4c462e79
MD
1441 ret = close(ctx->consumer_error_socket);
1442 if (ret) {
1443 PERROR("close");
1444 }
331744e3
JD
1445 ret = close(ctx->consumer_metadata_socket);
1446 if (ret) {
1447 PERROR("close");
1448 }
d8ef542d 1449 utils_close_pipe(ctx->consumer_channel_pipe);
acdb9057 1450 lttng_pipe_destroy(ctx->consumer_data_pipe);
13886d2d 1451 lttng_pipe_destroy(ctx->consumer_metadata_pipe);
02b3d176 1452 lttng_pipe_destroy(ctx->consumer_wakeup_pipe);
d8ef542d 1453 utils_close_pipe(ctx->consumer_should_quit);
fb3a43a9 1454
3bd1e081
MD
1455 unlink(ctx->consumer_command_sock_path);
1456 free(ctx);
1457}
1458
6197aea7
DG
1459/*
1460 * Write the metadata stream id on the specified file descriptor.
1461 */
1462static int write_relayd_metadata_id(int fd,
1463 struct lttng_consumer_stream *stream,
ffe60014 1464 struct consumer_relayd_sock_pair *relayd, unsigned long padding)
6197aea7 1465{
6cd525e8 1466 ssize_t ret;
1d4dfdef 1467 struct lttcomm_relayd_metadata_payload hdr;
6197aea7 1468
1d4dfdef
DG
1469 hdr.stream_id = htobe64(stream->relayd_stream_id);
1470 hdr.padding_size = htobe32(padding);
6cd525e8
MD
1471 ret = lttng_write(fd, (void *) &hdr, sizeof(hdr));
1472 if (ret < sizeof(hdr)) {
d7b75ec8 1473 /*
6f04ed72 1474 * This error means that the fd's end is closed so ignore the PERROR
d7b75ec8
DG
1475 * not to clubber the error output since this can happen in a normal
1476 * code path.
1477 */
1478 if (errno != EPIPE) {
1479 PERROR("write metadata stream id");
1480 }
1481 DBG3("Consumer failed to write relayd metadata id (errno: %d)", errno);
534d2592
DG
1482 /*
1483 * Set ret to a negative value because if ret != sizeof(hdr), we don't
1484 * handle writting the missing part so report that as an error and
1485 * don't lie to the caller.
1486 */
1487 ret = -1;
6197aea7
DG
1488 goto end;
1489 }
1d4dfdef
DG
1490 DBG("Metadata stream id %" PRIu64 " with padding %lu written before data",
1491 stream->relayd_stream_id, padding);
6197aea7
DG
1492
1493end:
6cd525e8 1494 return (int) ret;
6197aea7
DG
1495}
1496
3bd1e081 1497/*
09e26845
DG
1498 * Mmap the ring buffer, read it and write the data to the tracefile. This is a
1499 * core function for writing trace buffers to either the local filesystem or
1500 * the network.
1501 *
79d4ffb7
DG
1502 * It must be called with the stream lock held.
1503 *
09e26845 1504 * Careful review MUST be put if any changes occur!
3bd1e081
MD
1505 *
1506 * Returns the number of bytes written
1507 */
4078b776 1508ssize_t lttng_consumer_on_read_subbuffer_mmap(
3bd1e081 1509 struct lttng_consumer_local_data *ctx,
1d4dfdef 1510 struct lttng_consumer_stream *stream, unsigned long len,
309167d2 1511 unsigned long padding,
50adc264 1512 struct ctf_packet_index *index)
3bd1e081 1513{
f02e1e8a 1514 unsigned long mmap_offset;
ffe60014 1515 void *mmap_base;
994ab360 1516 ssize_t ret = 0;
f02e1e8a
DG
1517 off_t orig_offset = stream->out_fd_offset;
1518 /* Default is on the disk */
1519 int outfd = stream->out_fd;
f02e1e8a 1520 struct consumer_relayd_sock_pair *relayd = NULL;
8994307f 1521 unsigned int relayd_hang_up = 0;
f02e1e8a
DG
1522
1523 /* RCU lock for the relayd pointer */
1524 rcu_read_lock();
1525
1526 /* Flag that the current stream if set for network streaming. */
da009f2c 1527 if (stream->net_seq_idx != (uint64_t) -1ULL) {
f02e1e8a
DG
1528 relayd = consumer_find_relayd(stream->net_seq_idx);
1529 if (relayd == NULL) {
56591bac 1530 ret = -EPIPE;
f02e1e8a
DG
1531 goto end;
1532 }
1533 }
1534
1535 /* get the offset inside the fd to mmap */
3bd1e081
MD
1536 switch (consumer_data.type) {
1537 case LTTNG_CONSUMER_KERNEL:
ffe60014 1538 mmap_base = stream->mmap_base;
f02e1e8a 1539 ret = kernctl_get_mmap_read_offset(stream->wait_fd, &mmap_offset);
994ab360 1540 if (ret < 0) {
56591bac 1541 PERROR("tracer ctl get_mmap_read_offset");
56591bac
MD
1542 goto end;
1543 }
f02e1e8a 1544 break;
7753dea8
MD
1545 case LTTNG_CONSUMER32_UST:
1546 case LTTNG_CONSUMER64_UST:
ffe60014
DG
1547 mmap_base = lttng_ustctl_get_mmap_base(stream);
1548 if (!mmap_base) {
1549 ERR("read mmap get mmap base for stream %s", stream->name);
994ab360 1550 ret = -EPERM;
ffe60014
DG
1551 goto end;
1552 }
1553 ret = lttng_ustctl_get_mmap_read_offset(stream, &mmap_offset);
56591bac
MD
1554 if (ret != 0) {
1555 PERROR("tracer ctl get_mmap_read_offset");
994ab360 1556 ret = -EINVAL;
56591bac
MD
1557 goto end;
1558 }
f02e1e8a 1559 break;
3bd1e081
MD
1560 default:
1561 ERR("Unknown consumer_data type");
1562 assert(0);
1563 }
b9182dd9 1564
f02e1e8a
DG
1565 /* Handle stream on the relayd if the output is on the network */
1566 if (relayd) {
1567 unsigned long netlen = len;
1568
1569 /*
1570 * Lock the control socket for the complete duration of the function
1571 * since from this point on we will use the socket.
1572 */
1573 if (stream->metadata_flag) {
1574 /* Metadata requires the control socket. */
1575 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
93ec662e
JD
1576 if (stream->reset_metadata_flag) {
1577 ret = relayd_reset_metadata(&relayd->control_sock,
1578 stream->relayd_stream_id,
1579 stream->metadata_version);
1580 if (ret < 0) {
1581 relayd_hang_up = 1;
1582 goto write_error;
1583 }
1584 stream->reset_metadata_flag = 0;
1585 }
1d4dfdef 1586 netlen += sizeof(struct lttcomm_relayd_metadata_payload);
f02e1e8a
DG
1587 }
1588
1d4dfdef 1589 ret = write_relayd_stream_header(stream, netlen, padding, relayd);
994ab360
DG
1590 if (ret < 0) {
1591 relayd_hang_up = 1;
1592 goto write_error;
1593 }
1594 /* Use the returned socket. */
1595 outfd = ret;
f02e1e8a 1596
994ab360
DG
1597 /* Write metadata stream id before payload */
1598 if (stream->metadata_flag) {
1599 ret = write_relayd_metadata_id(outfd, stream, relayd, padding);
1600 if (ret < 0) {
8994307f
DG
1601 relayd_hang_up = 1;
1602 goto write_error;
1603 }
f02e1e8a 1604 }
1d4dfdef
DG
1605 } else {
1606 /* No streaming, we have to set the len with the full padding */
1607 len += padding;
1624d5b7 1608
93ec662e
JD
1609 if (stream->metadata_flag && stream->reset_metadata_flag) {
1610 ret = utils_truncate_stream_file(stream->out_fd, 0);
1611 if (ret < 0) {
1612 ERR("Reset metadata file");
1613 goto end;
1614 }
1615 stream->reset_metadata_flag = 0;
1616 }
1617
1624d5b7
JD
1618 /*
1619 * Check if we need to change the tracefile before writing the packet.
1620 */
1621 if (stream->chan->tracefile_size > 0 &&
1622 (stream->tracefile_size_current + len) >
1623 stream->chan->tracefile_size) {
fe4477ee
JD
1624 ret = utils_rotate_stream_file(stream->chan->pathname,
1625 stream->name, stream->chan->tracefile_size,
1626 stream->chan->tracefile_count, stream->uid, stream->gid,
309167d2
JD
1627 stream->out_fd, &(stream->tracefile_count_current),
1628 &stream->out_fd);
1624d5b7
JD
1629 if (ret < 0) {
1630 ERR("Rotating output file");
1631 goto end;
1632 }
309167d2
JD
1633 outfd = stream->out_fd;
1634
f8f3885c
MD
1635 if (stream->index_file) {
1636 lttng_index_file_put(stream->index_file);
1637 stream->index_file = lttng_index_file_create(stream->chan->pathname,
309167d2
JD
1638 stream->name, stream->uid, stream->gid,
1639 stream->chan->tracefile_size,
f8f3885c
MD
1640 stream->tracefile_count_current,
1641 CTF_INDEX_MAJOR, CTF_INDEX_MINOR);
1642 if (!stream->index_file) {
309167d2
JD
1643 goto end;
1644 }
309167d2
JD
1645 }
1646
a6976990
DG
1647 /* Reset current size because we just perform a rotation. */
1648 stream->tracefile_size_current = 0;
a1ae300f
JD
1649 stream->out_fd_offset = 0;
1650 orig_offset = 0;
1624d5b7
JD
1651 }
1652 stream->tracefile_size_current += len;
309167d2
JD
1653 if (index) {
1654 index->offset = htobe64(stream->out_fd_offset);
1655 }
f02e1e8a
DG
1656 }
1657
d02b8372
DG
1658 /*
1659 * This call guarantee that len or less is returned. It's impossible to
1660 * receive a ret value that is bigger than len.
1661 */
1662 ret = lttng_write(outfd, mmap_base + mmap_offset, len);
1663 DBG("Consumer mmap write() ret %zd (len %lu)", ret, len);
1664 if (ret < 0 || ((size_t) ret != len)) {
1665 /*
1666 * Report error to caller if nothing was written else at least send the
1667 * amount written.
1668 */
1669 if (ret < 0) {
994ab360 1670 ret = -errno;
f02e1e8a 1671 }
994ab360 1672 relayd_hang_up = 1;
f02e1e8a 1673
d02b8372 1674 /* Socket operation failed. We consider the relayd dead */
994ab360 1675 if (errno == EPIPE || errno == EINVAL || errno == EBADF) {
d02b8372
DG
1676 /*
1677 * This is possible if the fd is closed on the other side
1678 * (outfd) or any write problem. It can be verbose a bit for a
1679 * normal execution if for instance the relayd is stopped
1680 * abruptly. This can happen so set this to a DBG statement.
1681 */
1682 DBG("Consumer mmap write detected relayd hang up");
994ab360
DG
1683 } else {
1684 /* Unhandled error, print it and stop function right now. */
1685 PERROR("Error in write mmap (ret %zd != len %lu)", ret, len);
f02e1e8a 1686 }
994ab360 1687 goto write_error;
d02b8372
DG
1688 }
1689 stream->output_written += ret;
d02b8372
DG
1690
1691 /* This call is useless on a socket so better save a syscall. */
1692 if (!relayd) {
1693 /* This won't block, but will start writeout asynchronously */
1694 lttng_sync_file_range(outfd, stream->out_fd_offset, len,
1695 SYNC_FILE_RANGE_WRITE);
1696 stream->out_fd_offset += len;
f5dbe415 1697 lttng_consumer_sync_trace_file(stream, orig_offset);
f02e1e8a 1698 }
f02e1e8a 1699
8994307f
DG
1700write_error:
1701 /*
1702 * This is a special case that the relayd has closed its socket. Let's
1703 * cleanup the relayd object and all associated streams.
1704 */
1705 if (relayd && relayd_hang_up) {
1706 cleanup_relayd(relayd, ctx);
1707 }
1708
f02e1e8a
DG
1709end:
1710 /* Unlock only if ctrl socket used */
1711 if (relayd && stream->metadata_flag) {
1712 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
1713 }
1714
1715 rcu_read_unlock();
994ab360 1716 return ret;
3bd1e081
MD
1717}
1718
1719/*
1720 * Splice the data from the ring buffer to the tracefile.
1721 *
79d4ffb7
DG
1722 * It must be called with the stream lock held.
1723 *
3bd1e081
MD
1724 * Returns the number of bytes spliced.
1725 */
4078b776 1726ssize_t lttng_consumer_on_read_subbuffer_splice(
3bd1e081 1727 struct lttng_consumer_local_data *ctx,
1d4dfdef 1728 struct lttng_consumer_stream *stream, unsigned long len,
309167d2 1729 unsigned long padding,
50adc264 1730 struct ctf_packet_index *index)
3bd1e081 1731{
f02e1e8a
DG
1732 ssize_t ret = 0, written = 0, ret_splice = 0;
1733 loff_t offset = 0;
1734 off_t orig_offset = stream->out_fd_offset;
1735 int fd = stream->wait_fd;
1736 /* Default is on the disk */
1737 int outfd = stream->out_fd;
f02e1e8a 1738 struct consumer_relayd_sock_pair *relayd = NULL;
fb3a43a9 1739 int *splice_pipe;
8994307f 1740 unsigned int relayd_hang_up = 0;
f02e1e8a 1741
3bd1e081
MD
1742 switch (consumer_data.type) {
1743 case LTTNG_CONSUMER_KERNEL:
f02e1e8a 1744 break;
7753dea8
MD
1745 case LTTNG_CONSUMER32_UST:
1746 case LTTNG_CONSUMER64_UST:
f02e1e8a 1747 /* Not supported for user space tracing */
3bd1e081
MD
1748 return -ENOSYS;
1749 default:
1750 ERR("Unknown consumer_data type");
1751 assert(0);
3bd1e081
MD
1752 }
1753
f02e1e8a
DG
1754 /* RCU lock for the relayd pointer */
1755 rcu_read_lock();
1756
1757 /* Flag that the current stream if set for network streaming. */
da009f2c 1758 if (stream->net_seq_idx != (uint64_t) -1ULL) {
f02e1e8a
DG
1759 relayd = consumer_find_relayd(stream->net_seq_idx);
1760 if (relayd == NULL) {
ad0b0d23 1761 written = -ret;
f02e1e8a
DG
1762 goto end;
1763 }
1764 }
a2361a61 1765 splice_pipe = stream->splice_pipe;
fb3a43a9 1766
f02e1e8a 1767 /* Write metadata stream id before payload */
1d4dfdef 1768 if (relayd) {
ad0b0d23 1769 unsigned long total_len = len;
f02e1e8a 1770
1d4dfdef
DG
1771 if (stream->metadata_flag) {
1772 /*
1773 * Lock the control socket for the complete duration of the function
1774 * since from this point on we will use the socket.
1775 */
1776 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
1777
93ec662e
JD
1778 if (stream->reset_metadata_flag) {
1779 ret = relayd_reset_metadata(&relayd->control_sock,
1780 stream->relayd_stream_id,
1781 stream->metadata_version);
1782 if (ret < 0) {
1783 relayd_hang_up = 1;
1784 goto write_error;
1785 }
1786 stream->reset_metadata_flag = 0;
1787 }
1d4dfdef
DG
1788 ret = write_relayd_metadata_id(splice_pipe[1], stream, relayd,
1789 padding);
1790 if (ret < 0) {
1791 written = ret;
ad0b0d23
DG
1792 relayd_hang_up = 1;
1793 goto write_error;
1d4dfdef
DG
1794 }
1795
1796 total_len += sizeof(struct lttcomm_relayd_metadata_payload);
1797 }
1798
1799 ret = write_relayd_stream_header(stream, total_len, padding, relayd);
ad0b0d23
DG
1800 if (ret < 0) {
1801 written = ret;
1802 relayd_hang_up = 1;
1803 goto write_error;
f02e1e8a 1804 }
ad0b0d23
DG
1805 /* Use the returned socket. */
1806 outfd = ret;
1d4dfdef
DG
1807 } else {
1808 /* No streaming, we have to set the len with the full padding */
1809 len += padding;
1624d5b7 1810
93ec662e
JD
1811 if (stream->metadata_flag && stream->reset_metadata_flag) {
1812 ret = utils_truncate_stream_file(stream->out_fd, 0);
1813 if (ret < 0) {
1814 ERR("Reset metadata file");
1815 goto end;
1816 }
1817 stream->reset_metadata_flag = 0;
1818 }
1624d5b7
JD
1819 /*
1820 * Check if we need to change the tracefile before writing the packet.
1821 */
1822 if (stream->chan->tracefile_size > 0 &&
1823 (stream->tracefile_size_current + len) >
1824 stream->chan->tracefile_size) {
fe4477ee
JD
1825 ret = utils_rotate_stream_file(stream->chan->pathname,
1826 stream->name, stream->chan->tracefile_size,
1827 stream->chan->tracefile_count, stream->uid, stream->gid,
309167d2
JD
1828 stream->out_fd, &(stream->tracefile_count_current),
1829 &stream->out_fd);
1624d5b7 1830 if (ret < 0) {
ad0b0d23 1831 written = ret;
1624d5b7
JD
1832 ERR("Rotating output file");
1833 goto end;
1834 }
309167d2
JD
1835 outfd = stream->out_fd;
1836
f8f3885c
MD
1837 if (stream->index_file) {
1838 lttng_index_file_put(stream->index_file);
1839 stream->index_file = lttng_index_file_create(stream->chan->pathname,
309167d2
JD
1840 stream->name, stream->uid, stream->gid,
1841 stream->chan->tracefile_size,
f8f3885c
MD
1842 stream->tracefile_count_current,
1843 CTF_INDEX_MAJOR, CTF_INDEX_MINOR);
1844 if (!stream->index_file) {
309167d2
JD
1845 goto end;
1846 }
309167d2
JD
1847 }
1848
a6976990
DG
1849 /* Reset current size because we just perform a rotation. */
1850 stream->tracefile_size_current = 0;
a1ae300f
JD
1851 stream->out_fd_offset = 0;
1852 orig_offset = 0;
1624d5b7
JD
1853 }
1854 stream->tracefile_size_current += len;
309167d2 1855 index->offset = htobe64(stream->out_fd_offset);
f02e1e8a
DG
1856 }
1857
1858 while (len > 0) {
1d4dfdef
DG
1859 DBG("splice chan to pipe offset %lu of len %lu (fd : %d, pipe: %d)",
1860 (unsigned long)offset, len, fd, splice_pipe[1]);
fb3a43a9 1861 ret_splice = splice(fd, &offset, splice_pipe[1], NULL, len,
f02e1e8a
DG
1862 SPLICE_F_MOVE | SPLICE_F_MORE);
1863 DBG("splice chan to pipe, ret %zd", ret_splice);
1864 if (ret_splice < 0) {
d02b8372 1865 ret = errno;
ad0b0d23 1866 written = -ret;
d02b8372 1867 PERROR("Error in relay splice");
f02e1e8a
DG
1868 goto splice_error;
1869 }
1870
1871 /* Handle stream on the relayd if the output is on the network */
ad0b0d23
DG
1872 if (relayd && stream->metadata_flag) {
1873 size_t metadata_payload_size =
1874 sizeof(struct lttcomm_relayd_metadata_payload);
1875
1876 /* Update counter to fit the spliced data */
1877 ret_splice += metadata_payload_size;
1878 len += metadata_payload_size;
1879 /*
1880 * We do this so the return value can match the len passed as
1881 * argument to this function.
1882 */
1883 written -= metadata_payload_size;
f02e1e8a
DG
1884 }
1885
1886 /* Splice data out */
fb3a43a9 1887 ret_splice = splice(splice_pipe[0], NULL, outfd, NULL,
f02e1e8a 1888 ret_splice, SPLICE_F_MOVE | SPLICE_F_MORE);
a2361a61
JD
1889 DBG("Consumer splice pipe to file (out_fd: %d), ret %zd",
1890 outfd, ret_splice);
f02e1e8a 1891 if (ret_splice < 0) {
d02b8372 1892 ret = errno;
ad0b0d23
DG
1893 written = -ret;
1894 relayd_hang_up = 1;
1895 goto write_error;
f02e1e8a 1896 } else if (ret_splice > len) {
d02b8372
DG
1897 /*
1898 * We don't expect this code path to be executed but you never know
1899 * so this is an extra protection agains a buggy splice().
1900 */
f02e1e8a 1901 ret = errno;
ad0b0d23 1902 written += ret_splice;
d02b8372
DG
1903 PERROR("Wrote more data than requested %zd (len: %lu)", ret_splice,
1904 len);
f02e1e8a 1905 goto splice_error;
d02b8372
DG
1906 } else {
1907 /* All good, update current len and continue. */
1908 len -= ret_splice;
f02e1e8a 1909 }
f02e1e8a
DG
1910
1911 /* This call is useless on a socket so better save a syscall. */
1912 if (!relayd) {
1913 /* This won't block, but will start writeout asynchronously */
1914 lttng_sync_file_range(outfd, stream->out_fd_offset, ret_splice,
1915 SYNC_FILE_RANGE_WRITE);
1916 stream->out_fd_offset += ret_splice;
1917 }
e5d1a9b3 1918 stream->output_written += ret_splice;
f02e1e8a
DG
1919 written += ret_splice;
1920 }
f5dbe415
JG
1921 if (!relayd) {
1922 lttng_consumer_sync_trace_file(stream, orig_offset);
1923 }
f02e1e8a
DG
1924 goto end;
1925
8994307f
DG
1926write_error:
1927 /*
1928 * This is a special case that the relayd has closed its socket. Let's
1929 * cleanup the relayd object and all associated streams.
1930 */
1931 if (relayd && relayd_hang_up) {
1932 cleanup_relayd(relayd, ctx);
1933 /* Skip splice error so the consumer does not fail */
1934 goto end;
1935 }
1936
f02e1e8a
DG
1937splice_error:
1938 /* send the appropriate error description to sessiond */
1939 switch (ret) {
f02e1e8a 1940 case EINVAL:
f73fabfd 1941 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_SPLICE_EINVAL);
f02e1e8a
DG
1942 break;
1943 case ENOMEM:
f73fabfd 1944 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_SPLICE_ENOMEM);
f02e1e8a
DG
1945 break;
1946 case ESPIPE:
f73fabfd 1947 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_SPLICE_ESPIPE);
f02e1e8a
DG
1948 break;
1949 }
1950
1951end:
1952 if (relayd && stream->metadata_flag) {
1953 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
1954 }
1955
1956 rcu_read_unlock();
1957 return written;
3bd1e081
MD
1958}
1959
1960/*
1961 * Take a snapshot for a specific fd
1962 *
1963 * Returns 0 on success, < 0 on error
1964 */
ffe60014 1965int lttng_consumer_take_snapshot(struct lttng_consumer_stream *stream)
3bd1e081
MD
1966{
1967 switch (consumer_data.type) {
1968 case LTTNG_CONSUMER_KERNEL:
ffe60014 1969 return lttng_kconsumer_take_snapshot(stream);
7753dea8
MD
1970 case LTTNG_CONSUMER32_UST:
1971 case LTTNG_CONSUMER64_UST:
ffe60014 1972 return lttng_ustconsumer_take_snapshot(stream);
3bd1e081
MD
1973 default:
1974 ERR("Unknown consumer_data type");
1975 assert(0);
1976 return -ENOSYS;
1977 }
3bd1e081
MD
1978}
1979
1980/*
1981 * Get the produced position
1982 *
1983 * Returns 0 on success, < 0 on error
1984 */
ffe60014 1985int lttng_consumer_get_produced_snapshot(struct lttng_consumer_stream *stream,
3bd1e081
MD
1986 unsigned long *pos)
1987{
1988 switch (consumer_data.type) {
1989 case LTTNG_CONSUMER_KERNEL:
ffe60014 1990 return lttng_kconsumer_get_produced_snapshot(stream, pos);
7753dea8
MD
1991 case LTTNG_CONSUMER32_UST:
1992 case LTTNG_CONSUMER64_UST:
ffe60014 1993 return lttng_ustconsumer_get_produced_snapshot(stream, pos);
3bd1e081
MD
1994 default:
1995 ERR("Unknown consumer_data type");
1996 assert(0);
1997 return -ENOSYS;
1998 }
1999}
2000
2001int lttng_consumer_recv_cmd(struct lttng_consumer_local_data *ctx,
2002 int sock, struct pollfd *consumer_sockpoll)
2003{
2004 switch (consumer_data.type) {
2005 case LTTNG_CONSUMER_KERNEL:
2006 return lttng_kconsumer_recv_cmd(ctx, sock, consumer_sockpoll);
7753dea8
MD
2007 case LTTNG_CONSUMER32_UST:
2008 case LTTNG_CONSUMER64_UST:
3bd1e081
MD
2009 return lttng_ustconsumer_recv_cmd(ctx, sock, consumer_sockpoll);
2010 default:
2011 ERR("Unknown consumer_data type");
2012 assert(0);
2013 return -ENOSYS;
2014 }
2015}
2016
6d574024 2017void lttng_consumer_close_all_metadata(void)
d88aee68
DG
2018{
2019 switch (consumer_data.type) {
2020 case LTTNG_CONSUMER_KERNEL:
2021 /*
2022 * The Kernel consumer has a different metadata scheme so we don't
2023 * close anything because the stream will be closed by the session
2024 * daemon.
2025 */
2026 break;
2027 case LTTNG_CONSUMER32_UST:
2028 case LTTNG_CONSUMER64_UST:
2029 /*
2030 * Close all metadata streams. The metadata hash table is passed and
2031 * this call iterates over it by closing all wakeup fd. This is safe
2032 * because at this point we are sure that the metadata producer is
2033 * either dead or blocked.
2034 */
6d574024 2035 lttng_ustconsumer_close_all_metadata(metadata_ht);
d88aee68
DG
2036 break;
2037 default:
2038 ERR("Unknown consumer_data type");
2039 assert(0);
2040 }
2041}
2042
fb3a43a9
DG
2043/*
2044 * Clean up a metadata stream and free its memory.
2045 */
e316aad5
DG
2046void consumer_del_metadata_stream(struct lttng_consumer_stream *stream,
2047 struct lttng_ht *ht)
fb3a43a9 2048{
e316aad5 2049 struct lttng_consumer_channel *free_chan = NULL;
fb3a43a9
DG
2050
2051 assert(stream);
2052 /*
2053 * This call should NEVER receive regular stream. It must always be
2054 * metadata stream and this is crucial for data structure synchronization.
2055 */
2056 assert(stream->metadata_flag);
2057
e316aad5
DG
2058 DBG3("Consumer delete metadata stream %d", stream->wait_fd);
2059
74251bb8 2060 pthread_mutex_lock(&consumer_data.lock);
fb549e7a 2061 pthread_mutex_lock(&stream->chan->lock);
3dad2c0f 2062 pthread_mutex_lock(&stream->lock);
081424af
JG
2063 if (stream->chan->metadata_cache) {
2064 /* Only applicable to userspace consumers. */
2065 pthread_mutex_lock(&stream->chan->metadata_cache->lock);
2066 }
8994307f 2067
6d574024
DG
2068 /* Remove any reference to that stream. */
2069 consumer_stream_delete(stream, ht);
ca22feea 2070
6d574024
DG
2071 /* Close down everything including the relayd if one. */
2072 consumer_stream_close(stream);
2073 /* Destroy tracer buffers of the stream. */
2074 consumer_stream_destroy_buffers(stream);
fb3a43a9
DG
2075
2076 /* Atomically decrement channel refcount since other threads can use it. */
f2ad556d 2077 if (!uatomic_sub_return(&stream->chan->refcount, 1)
ffe60014 2078 && !uatomic_read(&stream->chan->nb_init_stream_left)) {
c30aaa51 2079 /* Go for channel deletion! */
e316aad5 2080 free_chan = stream->chan;
fb3a43a9
DG
2081 }
2082
73811ecc
DG
2083 /*
2084 * Nullify the stream reference so it is not used after deletion. The
6d574024
DG
2085 * channel lock MUST be acquired before being able to check for a NULL
2086 * pointer value.
73811ecc
DG
2087 */
2088 stream->chan->metadata_stream = NULL;
2089
081424af
JG
2090 if (stream->chan->metadata_cache) {
2091 pthread_mutex_unlock(&stream->chan->metadata_cache->lock);
2092 }
3dad2c0f 2093 pthread_mutex_unlock(&stream->lock);
fb549e7a 2094 pthread_mutex_unlock(&stream->chan->lock);
74251bb8 2095 pthread_mutex_unlock(&consumer_data.lock);
e316aad5
DG
2096
2097 if (free_chan) {
2098 consumer_del_channel(free_chan);
2099 }
2100
6d574024 2101 consumer_stream_free(stream);
fb3a43a9
DG
2102}
2103
2104/*
2105 * Action done with the metadata stream when adding it to the consumer internal
2106 * data structures to handle it.
2107 */
5ab66908 2108int consumer_add_metadata_stream(struct lttng_consumer_stream *stream)
fb3a43a9 2109{
5ab66908 2110 struct lttng_ht *ht = metadata_ht;
e316aad5 2111 int ret = 0;
76082088 2112 struct lttng_ht_iter iter;
d88aee68 2113 struct lttng_ht_node_u64 *node;
fb3a43a9 2114
e316aad5
DG
2115 assert(stream);
2116 assert(ht);
2117
d88aee68 2118 DBG3("Adding metadata stream %" PRIu64 " to hash table", stream->key);
e316aad5
DG
2119
2120 pthread_mutex_lock(&consumer_data.lock);
a9838785 2121 pthread_mutex_lock(&stream->chan->lock);
ec6ea7d0 2122 pthread_mutex_lock(&stream->chan->timer_lock);
2e818a6a 2123 pthread_mutex_lock(&stream->lock);
e316aad5 2124
e316aad5
DG
2125 /*
2126 * From here, refcounts are updated so be _careful_ when returning an error
2127 * after this point.
2128 */
2129
fb3a43a9 2130 rcu_read_lock();
76082088
DG
2131
2132 /*
2133 * Lookup the stream just to make sure it does not exist in our internal
2134 * state. This should NEVER happen.
2135 */
d88aee68
DG
2136 lttng_ht_lookup(ht, &stream->key, &iter);
2137 node = lttng_ht_iter_get_node_u64(&iter);
76082088
DG
2138 assert(!node);
2139
e316aad5 2140 /*
ffe60014
DG
2141 * When nb_init_stream_left reaches 0, we don't need to trigger any action
2142 * in terms of destroying the associated channel, because the action that
e316aad5
DG
2143 * causes the count to become 0 also causes a stream to be added. The
2144 * channel deletion will thus be triggered by the following removal of this
2145 * stream.
2146 */
ffe60014 2147 if (uatomic_read(&stream->chan->nb_init_stream_left) > 0) {
f2ad556d
MD
2148 /* Increment refcount before decrementing nb_init_stream_left */
2149 cmm_smp_wmb();
ffe60014 2150 uatomic_dec(&stream->chan->nb_init_stream_left);
e316aad5
DG
2151 }
2152
d88aee68 2153 lttng_ht_add_unique_u64(ht, &stream->node);
ca22feea 2154
d8ef542d
MD
2155 lttng_ht_add_unique_u64(consumer_data.stream_per_chan_id_ht,
2156 &stream->node_channel_id);
2157
ca22feea
DG
2158 /*
2159 * Add stream to the stream_list_ht of the consumer data. No need to steal
2160 * the key since the HT does not use it and we allow to add redundant keys
2161 * into this table.
2162 */
d88aee68 2163 lttng_ht_add_u64(consumer_data.stream_list_ht, &stream->node_session_id);
ca22feea 2164
fb3a43a9 2165 rcu_read_unlock();
e316aad5 2166
2e818a6a 2167 pthread_mutex_unlock(&stream->lock);
a9838785 2168 pthread_mutex_unlock(&stream->chan->lock);
ec6ea7d0 2169 pthread_mutex_unlock(&stream->chan->timer_lock);
e316aad5
DG
2170 pthread_mutex_unlock(&consumer_data.lock);
2171 return ret;
fb3a43a9
DG
2172}
2173
8994307f
DG
2174/*
2175 * Delete data stream that are flagged for deletion (endpoint_status).
2176 */
2177static void validate_endpoint_status_data_stream(void)
2178{
2179 struct lttng_ht_iter iter;
2180 struct lttng_consumer_stream *stream;
2181
2182 DBG("Consumer delete flagged data stream");
2183
2184 rcu_read_lock();
2185 cds_lfht_for_each_entry(data_ht->ht, &iter.iter, stream, node.node) {
2186 /* Validate delete flag of the stream */
79d4ffb7 2187 if (stream->endpoint_status == CONSUMER_ENDPOINT_ACTIVE) {
8994307f
DG
2188 continue;
2189 }
2190 /* Delete it right now */
2191 consumer_del_stream(stream, data_ht);
2192 }
2193 rcu_read_unlock();
2194}
2195
2196/*
2197 * Delete metadata stream that are flagged for deletion (endpoint_status).
2198 */
2199static void validate_endpoint_status_metadata_stream(
2200 struct lttng_poll_event *pollset)
2201{
2202 struct lttng_ht_iter iter;
2203 struct lttng_consumer_stream *stream;
2204
2205 DBG("Consumer delete flagged metadata stream");
2206
2207 assert(pollset);
2208
2209 rcu_read_lock();
2210 cds_lfht_for_each_entry(metadata_ht->ht, &iter.iter, stream, node.node) {
2211 /* Validate delete flag of the stream */
79d4ffb7 2212 if (stream->endpoint_status == CONSUMER_ENDPOINT_ACTIVE) {
8994307f
DG
2213 continue;
2214 }
2215 /*
2216 * Remove from pollset so the metadata thread can continue without
2217 * blocking on a deleted stream.
2218 */
2219 lttng_poll_del(pollset, stream->wait_fd);
2220
2221 /* Delete it right now */
2222 consumer_del_metadata_stream(stream, metadata_ht);
2223 }
2224 rcu_read_unlock();
2225}
2226
fb3a43a9
DG
2227/*
2228 * Thread polls on metadata file descriptor and write them on disk or on the
2229 * network.
2230 */
7d980def 2231void *consumer_thread_metadata_poll(void *data)
fb3a43a9 2232{
1fc79fb4 2233 int ret, i, pollfd, err = -1;
fb3a43a9 2234 uint32_t revents, nb_fd;
e316aad5 2235 struct lttng_consumer_stream *stream = NULL;
fb3a43a9 2236 struct lttng_ht_iter iter;
d88aee68 2237 struct lttng_ht_node_u64 *node;
fb3a43a9
DG
2238 struct lttng_poll_event events;
2239 struct lttng_consumer_local_data *ctx = data;
2240 ssize_t len;
2241
2242 rcu_register_thread();
2243
1fc79fb4
MD
2244 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_METADATA);
2245
2d57de81
MD
2246 if (testpoint(consumerd_thread_metadata)) {
2247 goto error_testpoint;
2248 }
2249
9ce5646a
MD
2250 health_code_update();
2251
fb3a43a9
DG
2252 DBG("Thread metadata poll started");
2253
fb3a43a9
DG
2254 /* Size is set to 1 for the consumer_metadata pipe */
2255 ret = lttng_poll_create(&events, 2, LTTNG_CLOEXEC);
2256 if (ret < 0) {
2257 ERR("Poll set creation failed");
d8ef542d 2258 goto end_poll;
fb3a43a9
DG
2259 }
2260
13886d2d
DG
2261 ret = lttng_poll_add(&events,
2262 lttng_pipe_get_readfd(ctx->consumer_metadata_pipe), LPOLLIN);
fb3a43a9
DG
2263 if (ret < 0) {
2264 goto end;
2265 }
2266
2267 /* Main loop */
2268 DBG("Metadata main loop started");
2269
2270 while (1) {
fb3a43a9 2271restart:
7fa2082e 2272 health_code_update();
9ce5646a 2273 health_poll_entry();
7fa2082e 2274 DBG("Metadata poll wait");
fb3a43a9 2275 ret = lttng_poll_wait(&events, -1);
7fa2082e
MD
2276 DBG("Metadata poll return from wait with %d fd(s)",
2277 LTTNG_POLL_GETNB(&events));
9ce5646a 2278 health_poll_exit();
40063ead 2279 DBG("Metadata event caught in thread");
fb3a43a9
DG
2280 if (ret < 0) {
2281 if (errno == EINTR) {
40063ead 2282 ERR("Poll EINTR caught");
fb3a43a9
DG
2283 goto restart;
2284 }
d9607cd7
MD
2285 if (LTTNG_POLL_GETNB(&events) == 0) {
2286 err = 0; /* All is OK */
2287 }
2288 goto end;
fb3a43a9
DG
2289 }
2290
0d9c5d77
DG
2291 nb_fd = ret;
2292
e316aad5 2293 /* From here, the event is a metadata wait fd */
fb3a43a9 2294 for (i = 0; i < nb_fd; i++) {
9ce5646a
MD
2295 health_code_update();
2296
fb3a43a9
DG
2297 revents = LTTNG_POLL_GETEV(&events, i);
2298 pollfd = LTTNG_POLL_GETFD(&events, i);
2299
fd20dac9
MD
2300 if (!revents) {
2301 /* No activity for this FD (poll implementation). */
2302 continue;
2303 }
2304
13886d2d 2305 if (pollfd == lttng_pipe_get_readfd(ctx->consumer_metadata_pipe)) {
03e43155 2306 if (revents & LPOLLIN) {
13886d2d
DG
2307 ssize_t pipe_len;
2308
2309 pipe_len = lttng_pipe_read(ctx->consumer_metadata_pipe,
2310 &stream, sizeof(stream));
6cd525e8 2311 if (pipe_len < sizeof(stream)) {
03e43155
MD
2312 if (pipe_len < 0) {
2313 PERROR("read metadata stream");
2314 }
fb3a43a9 2315 /*
03e43155
MD
2316 * Remove the pipe from the poll set and continue the loop
2317 * since their might be data to consume.
fb3a43a9 2318 */
03e43155
MD
2319 lttng_poll_del(&events,
2320 lttng_pipe_get_readfd(ctx->consumer_metadata_pipe));
2321 lttng_pipe_read_close(ctx->consumer_metadata_pipe);
fb3a43a9
DG
2322 continue;
2323 }
2324
8994307f
DG
2325 /* A NULL stream means that the state has changed. */
2326 if (stream == NULL) {
2327 /* Check for deleted streams. */
2328 validate_endpoint_status_metadata_stream(&events);
3714380f 2329 goto restart;
8994307f
DG
2330 }
2331
fb3a43a9
DG
2332 DBG("Adding metadata stream %d to poll set",
2333 stream->wait_fd);
2334
fb3a43a9
DG
2335 /* Add metadata stream to the global poll events list */
2336 lttng_poll_add(&events, stream->wait_fd,
6d574024 2337 LPOLLIN | LPOLLPRI | LPOLLHUP);
03e43155
MD
2338 } else if (revents & (LPOLLERR | LPOLLHUP)) {
2339 DBG("Metadata thread pipe hung up");
2340 /*
2341 * Remove the pipe from the poll set and continue the loop
2342 * since their might be data to consume.
2343 */
2344 lttng_poll_del(&events,
2345 lttng_pipe_get_readfd(ctx->consumer_metadata_pipe));
2346 lttng_pipe_read_close(ctx->consumer_metadata_pipe);
2347 continue;
2348 } else {
2349 ERR("Unexpected poll events %u for sock %d", revents, pollfd);
2350 goto end;
fb3a43a9
DG
2351 }
2352
e316aad5 2353 /* Handle other stream */
fb3a43a9
DG
2354 continue;
2355 }
2356
d09e1200 2357 rcu_read_lock();
d88aee68
DG
2358 {
2359 uint64_t tmp_id = (uint64_t) pollfd;
2360
2361 lttng_ht_lookup(metadata_ht, &tmp_id, &iter);
2362 }
2363 node = lttng_ht_iter_get_node_u64(&iter);
e316aad5 2364 assert(node);
fb3a43a9
DG
2365
2366 stream = caa_container_of(node, struct lttng_consumer_stream,
58b1f425 2367 node);
fb3a43a9 2368
03e43155
MD
2369 if (revents & (LPOLLIN | LPOLLPRI)) {
2370 /* Get the data out of the metadata file descriptor */
2371 DBG("Metadata available on fd %d", pollfd);
2372 assert(stream->wait_fd == pollfd);
2373
2374 do {
2375 health_code_update();
2376
2377 len = ctx->on_buffer_ready(stream, ctx);
2378 /*
2379 * We don't check the return value here since if we get
83f4233d 2380 * a negative len, it means an error occurred thus we
03e43155
MD
2381 * simply remove it from the poll set and free the
2382 * stream.
2383 */
2384 } while (len > 0);
2385
2386 /* It's ok to have an unavailable sub-buffer */
2387 if (len < 0 && len != -EAGAIN && len != -ENODATA) {
2388 /* Clean up stream from consumer and free it. */
2389 lttng_poll_del(&events, stream->wait_fd);
2390 consumer_del_metadata_stream(stream, metadata_ht);
2391 }
2392 } else if (revents & (LPOLLERR | LPOLLHUP)) {
e316aad5 2393 DBG("Metadata fd %d is hup|err.", pollfd);
fb3a43a9
DG
2394 if (!stream->hangup_flush_done
2395 && (consumer_data.type == LTTNG_CONSUMER32_UST
2396 || consumer_data.type == LTTNG_CONSUMER64_UST)) {
2397 DBG("Attempting to flush and consume the UST buffers");
2398 lttng_ustconsumer_on_stream_hangup(stream);
2399
2400 /* We just flushed the stream now read it. */
4bb94b75 2401 do {
9ce5646a
MD
2402 health_code_update();
2403
4bb94b75
DG
2404 len = ctx->on_buffer_ready(stream, ctx);
2405 /*
2406 * We don't check the return value here since if we get
83f4233d 2407 * a negative len, it means an error occurred thus we
4bb94b75
DG
2408 * simply remove it from the poll set and free the
2409 * stream.
2410 */
2411 } while (len > 0);
fb3a43a9
DG
2412 }
2413
fb3a43a9 2414 lttng_poll_del(&events, stream->wait_fd);
e316aad5
DG
2415 /*
2416 * This call update the channel states, closes file descriptors
2417 * and securely free the stream.
2418 */
2419 consumer_del_metadata_stream(stream, metadata_ht);
03e43155
MD
2420 } else {
2421 ERR("Unexpected poll events %u for sock %d", revents, pollfd);
6f2f1a70 2422 rcu_read_unlock();
03e43155 2423 goto end;
fb3a43a9 2424 }
e316aad5 2425 /* Release RCU lock for the stream looked up */
d09e1200 2426 rcu_read_unlock();
fb3a43a9
DG
2427 }
2428 }
2429
1fc79fb4
MD
2430 /* All is OK */
2431 err = 0;
fb3a43a9
DG
2432end:
2433 DBG("Metadata poll thread exiting");
fb3a43a9 2434
d8ef542d
MD
2435 lttng_poll_clean(&events);
2436end_poll:
2d57de81 2437error_testpoint:
1fc79fb4
MD
2438 if (err) {
2439 health_error();
2440 ERR("Health error occurred in %s", __func__);
2441 }
2442 health_unregister(health_consumerd);
fb3a43a9
DG
2443 rcu_unregister_thread();
2444 return NULL;
2445}
2446
3bd1e081 2447/*
e4421fec 2448 * This thread polls the fds in the set to consume the data and write
3bd1e081
MD
2449 * it to tracefile if necessary.
2450 */
7d980def 2451void *consumer_thread_data_poll(void *data)
3bd1e081 2452{
1fc79fb4 2453 int num_rdy, num_hup, high_prio, ret, i, err = -1;
3bd1e081
MD
2454 struct pollfd *pollfd = NULL;
2455 /* local view of the streams */
c869f647 2456 struct lttng_consumer_stream **local_stream = NULL, *new_stream = NULL;
3bd1e081
MD
2457 /* local view of consumer_data.fds_count */
2458 int nb_fd = 0;
3bd1e081 2459 struct lttng_consumer_local_data *ctx = data;
00e2e675 2460 ssize_t len;
3bd1e081 2461
e7b994a3
DG
2462 rcu_register_thread();
2463
1fc79fb4
MD
2464 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_DATA);
2465
2d57de81
MD
2466 if (testpoint(consumerd_thread_data)) {
2467 goto error_testpoint;
2468 }
2469
9ce5646a
MD
2470 health_code_update();
2471
4df6c8cb
MD
2472 local_stream = zmalloc(sizeof(struct lttng_consumer_stream *));
2473 if (local_stream == NULL) {
2474 PERROR("local_stream malloc");
2475 goto end;
2476 }
3bd1e081
MD
2477
2478 while (1) {
9ce5646a
MD
2479 health_code_update();
2480
3bd1e081
MD
2481 high_prio = 0;
2482 num_hup = 0;
2483
2484 /*
e4421fec 2485 * the fds set has been updated, we need to update our
3bd1e081
MD
2486 * local array as well
2487 */
2488 pthread_mutex_lock(&consumer_data.lock);
2489 if (consumer_data.need_update) {
0e428499
DG
2490 free(pollfd);
2491 pollfd = NULL;
2492
2493 free(local_stream);
2494 local_stream = NULL;
3bd1e081 2495
02b3d176
DG
2496 /*
2497 * Allocate for all fds +1 for the consumer_data_pipe and +1 for
2498 * wake up pipe.
2499 */
2500 pollfd = zmalloc((consumer_data.stream_count + 2) * sizeof(struct pollfd));
3bd1e081 2501 if (pollfd == NULL) {
7a57cf92 2502 PERROR("pollfd malloc");
3bd1e081
MD
2503 pthread_mutex_unlock(&consumer_data.lock);
2504 goto end;
2505 }
2506
02b3d176 2507 local_stream = zmalloc((consumer_data.stream_count + 2) *
747f8642 2508 sizeof(struct lttng_consumer_stream *));
3bd1e081 2509 if (local_stream == NULL) {
7a57cf92 2510 PERROR("local_stream malloc");
3bd1e081
MD
2511 pthread_mutex_unlock(&consumer_data.lock);
2512 goto end;
2513 }
ffe60014 2514 ret = update_poll_array(ctx, &pollfd, local_stream,
43c34bc3 2515 data_ht);
3bd1e081
MD
2516 if (ret < 0) {
2517 ERR("Error in allocating pollfd or local_outfds");
f73fabfd 2518 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_POLL_ERROR);
3bd1e081
MD
2519 pthread_mutex_unlock(&consumer_data.lock);
2520 goto end;
2521 }
2522 nb_fd = ret;
2523 consumer_data.need_update = 0;
2524 }
2525 pthread_mutex_unlock(&consumer_data.lock);
2526
4078b776
MD
2527 /* No FDs and consumer_quit, consumer_cleanup the thread */
2528 if (nb_fd == 0 && consumer_quit == 1) {
1fc79fb4 2529 err = 0; /* All is OK */
4078b776
MD
2530 goto end;
2531 }
3bd1e081 2532 /* poll on the array of fds */
88f2b785 2533 restart:
02b3d176 2534 DBG("polling on %d fd", nb_fd + 2);
cf0bcb51
JG
2535 if (testpoint(consumerd_thread_data_poll)) {
2536 goto end;
2537 }
9ce5646a 2538 health_poll_entry();
02b3d176 2539 num_rdy = poll(pollfd, nb_fd + 2, -1);
9ce5646a 2540 health_poll_exit();
3bd1e081
MD
2541 DBG("poll num_rdy : %d", num_rdy);
2542 if (num_rdy == -1) {
88f2b785
MD
2543 /*
2544 * Restart interrupted system call.
2545 */
2546 if (errno == EINTR) {
2547 goto restart;
2548 }
7a57cf92 2549 PERROR("Poll error");
f73fabfd 2550 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_POLL_ERROR);
3bd1e081
MD
2551 goto end;
2552 } else if (num_rdy == 0) {
2553 DBG("Polling thread timed out");
2554 goto end;
2555 }
2556
3bd1e081 2557 /*
50f8ae69 2558 * If the consumer_data_pipe triggered poll go directly to the
00e2e675
DG
2559 * beginning of the loop to update the array. We want to prioritize
2560 * array update over low-priority reads.
3bd1e081 2561 */
509bb1cf 2562 if (pollfd[nb_fd].revents & (POLLIN | POLLPRI)) {
ab30f567 2563 ssize_t pipe_readlen;
04fdd819 2564
50f8ae69 2565 DBG("consumer_data_pipe wake up");
acdb9057
DG
2566 pipe_readlen = lttng_pipe_read(ctx->consumer_data_pipe,
2567 &new_stream, sizeof(new_stream));
6cd525e8
MD
2568 if (pipe_readlen < sizeof(new_stream)) {
2569 PERROR("Consumer data pipe");
23f5f35d
DG
2570 /* Continue so we can at least handle the current stream(s). */
2571 continue;
2572 }
c869f647
DG
2573
2574 /*
2575 * If the stream is NULL, just ignore it. It's also possible that
2576 * the sessiond poll thread changed the consumer_quit state and is
2577 * waking us up to test it.
2578 */
2579 if (new_stream == NULL) {
8994307f 2580 validate_endpoint_status_data_stream();
c869f647
DG
2581 continue;
2582 }
2583
c869f647 2584 /* Continue to update the local streams and handle prio ones */
3bd1e081
MD
2585 continue;
2586 }
2587
02b3d176
DG
2588 /* Handle wakeup pipe. */
2589 if (pollfd[nb_fd + 1].revents & (POLLIN | POLLPRI)) {
2590 char dummy;
2591 ssize_t pipe_readlen;
2592
2593 pipe_readlen = lttng_pipe_read(ctx->consumer_wakeup_pipe, &dummy,
2594 sizeof(dummy));
2595 if (pipe_readlen < 0) {
2596 PERROR("Consumer data wakeup pipe");
2597 }
2598 /* We've been awakened to handle stream(s). */
2599 ctx->has_wakeup = 0;
2600 }
2601
3bd1e081
MD
2602 /* Take care of high priority channels first. */
2603 for (i = 0; i < nb_fd; i++) {
9ce5646a
MD
2604 health_code_update();
2605
9617607b
DG
2606 if (local_stream[i] == NULL) {
2607 continue;
2608 }
fb3a43a9 2609 if (pollfd[i].revents & POLLPRI) {
d41f73b7
MD
2610 DBG("Urgent read on fd %d", pollfd[i].fd);
2611 high_prio = 1;
4078b776 2612 len = ctx->on_buffer_ready(local_stream[i], ctx);
d41f73b7 2613 /* it's ok to have an unavailable sub-buffer */
b64403e3 2614 if (len < 0 && len != -EAGAIN && len != -ENODATA) {
ab1027f4
DG
2615 /* Clean the stream and free it. */
2616 consumer_del_stream(local_stream[i], data_ht);
9617607b 2617 local_stream[i] = NULL;
4078b776
MD
2618 } else if (len > 0) {
2619 local_stream[i]->data_read = 1;
d41f73b7 2620 }
3bd1e081
MD
2621 }
2622 }
2623
4078b776
MD
2624 /*
2625 * If we read high prio channel in this loop, try again
2626 * for more high prio data.
2627 */
2628 if (high_prio) {
3bd1e081
MD
2629 continue;
2630 }
2631
2632 /* Take care of low priority channels. */
4078b776 2633 for (i = 0; i < nb_fd; i++) {
9ce5646a
MD
2634 health_code_update();
2635
9617607b
DG
2636 if (local_stream[i] == NULL) {
2637 continue;
2638 }
4078b776 2639 if ((pollfd[i].revents & POLLIN) ||
02b3d176
DG
2640 local_stream[i]->hangup_flush_done ||
2641 local_stream[i]->has_data) {
4078b776
MD
2642 DBG("Normal read on fd %d", pollfd[i].fd);
2643 len = ctx->on_buffer_ready(local_stream[i], ctx);
2644 /* it's ok to have an unavailable sub-buffer */
b64403e3 2645 if (len < 0 && len != -EAGAIN && len != -ENODATA) {
ab1027f4
DG
2646 /* Clean the stream and free it. */
2647 consumer_del_stream(local_stream[i], data_ht);
9617607b 2648 local_stream[i] = NULL;
4078b776
MD
2649 } else if (len > 0) {
2650 local_stream[i]->data_read = 1;
2651 }
2652 }
2653 }
2654
2655 /* Handle hangup and errors */
2656 for (i = 0; i < nb_fd; i++) {
9ce5646a
MD
2657 health_code_update();
2658
9617607b
DG
2659 if (local_stream[i] == NULL) {
2660 continue;
2661 }
4078b776
MD
2662 if (!local_stream[i]->hangup_flush_done
2663 && (pollfd[i].revents & (POLLHUP | POLLERR | POLLNVAL))
2664 && (consumer_data.type == LTTNG_CONSUMER32_UST
2665 || consumer_data.type == LTTNG_CONSUMER64_UST)) {
2666 DBG("fd %d is hup|err|nval. Attempting flush and read.",
9617607b 2667 pollfd[i].fd);
4078b776
MD
2668 lttng_ustconsumer_on_stream_hangup(local_stream[i]);
2669 /* Attempt read again, for the data we just flushed. */
2670 local_stream[i]->data_read = 1;
2671 }
2672 /*
2673 * If the poll flag is HUP/ERR/NVAL and we have
2674 * read no data in this pass, we can remove the
2675 * stream from its hash table.
2676 */
2677 if ((pollfd[i].revents & POLLHUP)) {
2678 DBG("Polling fd %d tells it has hung up.", pollfd[i].fd);
2679 if (!local_stream[i]->data_read) {
43c34bc3 2680 consumer_del_stream(local_stream[i], data_ht);
9617607b 2681 local_stream[i] = NULL;
4078b776
MD
2682 num_hup++;
2683 }
2684 } else if (pollfd[i].revents & POLLERR) {
2685 ERR("Error returned in polling fd %d.", pollfd[i].fd);
2686 if (!local_stream[i]->data_read) {
43c34bc3 2687 consumer_del_stream(local_stream[i], data_ht);
9617607b 2688 local_stream[i] = NULL;
4078b776
MD
2689 num_hup++;
2690 }
2691 } else if (pollfd[i].revents & POLLNVAL) {
2692 ERR("Polling fd %d tells fd is not open.", pollfd[i].fd);
2693 if (!local_stream[i]->data_read) {
43c34bc3 2694 consumer_del_stream(local_stream[i], data_ht);
9617607b 2695 local_stream[i] = NULL;
4078b776 2696 num_hup++;
3bd1e081
MD
2697 }
2698 }
9617607b
DG
2699 if (local_stream[i] != NULL) {
2700 local_stream[i]->data_read = 0;
2701 }
3bd1e081
MD
2702 }
2703 }
1fc79fb4
MD
2704 /* All is OK */
2705 err = 0;
3bd1e081
MD
2706end:
2707 DBG("polling thread exiting");
0e428499
DG
2708 free(pollfd);
2709 free(local_stream);
fb3a43a9
DG
2710
2711 /*
2712 * Close the write side of the pipe so epoll_wait() in
7d980def
DG
2713 * consumer_thread_metadata_poll can catch it. The thread is monitoring the
2714 * read side of the pipe. If we close them both, epoll_wait strangely does
2715 * not return and could create a endless wait period if the pipe is the
2716 * only tracked fd in the poll set. The thread will take care of closing
2717 * the read side.
fb3a43a9 2718 */
13886d2d 2719 (void) lttng_pipe_write_close(ctx->consumer_metadata_pipe);
fb3a43a9 2720
2d57de81 2721error_testpoint:
1fc79fb4
MD
2722 if (err) {
2723 health_error();
2724 ERR("Health error occurred in %s", __func__);
2725 }
2726 health_unregister(health_consumerd);
2727
e7b994a3 2728 rcu_unregister_thread();
3bd1e081
MD
2729 return NULL;
2730}
2731
d8ef542d
MD
2732/*
2733 * Close wake-up end of each stream belonging to the channel. This will
2734 * allow the poll() on the stream read-side to detect when the
2735 * write-side (application) finally closes them.
2736 */
2737static
2738void consumer_close_channel_streams(struct lttng_consumer_channel *channel)
2739{
2740 struct lttng_ht *ht;
2741 struct lttng_consumer_stream *stream;
2742 struct lttng_ht_iter iter;
2743
2744 ht = consumer_data.stream_per_chan_id_ht;
2745
2746 rcu_read_lock();
2747 cds_lfht_for_each_entry_duplicate(ht->ht,
2748 ht->hash_fct(&channel->key, lttng_ht_seed),
2749 ht->match_fct, &channel->key,
2750 &iter.iter, stream, node_channel_id.node) {
f2ad556d
MD
2751 /*
2752 * Protect against teardown with mutex.
2753 */
2754 pthread_mutex_lock(&stream->lock);
2755 if (cds_lfht_is_node_deleted(&stream->node.node)) {
2756 goto next;
2757 }
d8ef542d
MD
2758 switch (consumer_data.type) {
2759 case LTTNG_CONSUMER_KERNEL:
2760 break;
2761 case LTTNG_CONSUMER32_UST:
2762 case LTTNG_CONSUMER64_UST:
b4a650f3
DG
2763 if (stream->metadata_flag) {
2764 /* Safe and protected by the stream lock. */
2765 lttng_ustconsumer_close_metadata(stream->chan);
2766 } else {
2767 /*
2768 * Note: a mutex is taken internally within
2769 * liblttng-ust-ctl to protect timer wakeup_fd
2770 * use from concurrent close.
2771 */
2772 lttng_ustconsumer_close_stream_wakeup(stream);
2773 }
d8ef542d
MD
2774 break;
2775 default:
2776 ERR("Unknown consumer_data type");
2777 assert(0);
2778 }
f2ad556d
MD
2779 next:
2780 pthread_mutex_unlock(&stream->lock);
d8ef542d
MD
2781 }
2782 rcu_read_unlock();
2783}
2784
2785static void destroy_channel_ht(struct lttng_ht *ht)
2786{
2787 struct lttng_ht_iter iter;
2788 struct lttng_consumer_channel *channel;
2789 int ret;
2790
2791 if (ht == NULL) {
2792 return;
2793 }
2794
2795 rcu_read_lock();
2796 cds_lfht_for_each_entry(ht->ht, &iter.iter, channel, wait_fd_node.node) {
2797 ret = lttng_ht_del(ht, &iter);
2798 assert(ret != 0);
2799 }
2800 rcu_read_unlock();
2801
2802 lttng_ht_destroy(ht);
2803}
2804
2805/*
2806 * This thread polls the channel fds to detect when they are being
2807 * closed. It closes all related streams if the channel is detected as
2808 * closed. It is currently only used as a shim layer for UST because the
2809 * consumerd needs to keep the per-stream wakeup end of pipes open for
2810 * periodical flush.
2811 */
2812void *consumer_thread_channel_poll(void *data)
2813{
1fc79fb4 2814 int ret, i, pollfd, err = -1;
d8ef542d
MD
2815 uint32_t revents, nb_fd;
2816 struct lttng_consumer_channel *chan = NULL;
2817 struct lttng_ht_iter iter;
2818 struct lttng_ht_node_u64 *node;
2819 struct lttng_poll_event events;
2820 struct lttng_consumer_local_data *ctx = data;
2821 struct lttng_ht *channel_ht;
2822
2823 rcu_register_thread();
2824
1fc79fb4
MD
2825 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_CHANNEL);
2826
2d57de81
MD
2827 if (testpoint(consumerd_thread_channel)) {
2828 goto error_testpoint;
2829 }
2830
9ce5646a
MD
2831 health_code_update();
2832
d8ef542d
MD
2833 channel_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
2834 if (!channel_ht) {
2835 /* ENOMEM at this point. Better to bail out. */
2836 goto end_ht;
2837 }
2838
2839 DBG("Thread channel poll started");
2840
2841 /* Size is set to 1 for the consumer_channel pipe */
2842 ret = lttng_poll_create(&events, 2, LTTNG_CLOEXEC);
2843 if (ret < 0) {
2844 ERR("Poll set creation failed");
2845 goto end_poll;
2846 }
2847
2848 ret = lttng_poll_add(&events, ctx->consumer_channel_pipe[0], LPOLLIN);
2849 if (ret < 0) {
2850 goto end;
2851 }
2852
2853 /* Main loop */
2854 DBG("Channel main loop started");
2855
2856 while (1) {
d8ef542d 2857restart:
7fa2082e
MD
2858 health_code_update();
2859 DBG("Channel poll wait");
9ce5646a 2860 health_poll_entry();
d8ef542d 2861 ret = lttng_poll_wait(&events, -1);
7fa2082e
MD
2862 DBG("Channel poll return from wait with %d fd(s)",
2863 LTTNG_POLL_GETNB(&events));
9ce5646a 2864 health_poll_exit();
40063ead 2865 DBG("Channel event caught in thread");
d8ef542d
MD
2866 if (ret < 0) {
2867 if (errno == EINTR) {
40063ead 2868 ERR("Poll EINTR caught");
d8ef542d
MD
2869 goto restart;
2870 }
d9607cd7
MD
2871 if (LTTNG_POLL_GETNB(&events) == 0) {
2872 err = 0; /* All is OK */
2873 }
d8ef542d
MD
2874 goto end;
2875 }
2876
2877 nb_fd = ret;
2878
2879 /* From here, the event is a channel wait fd */
2880 for (i = 0; i < nb_fd; i++) {
9ce5646a
MD
2881 health_code_update();
2882
d8ef542d
MD
2883 revents = LTTNG_POLL_GETEV(&events, i);
2884 pollfd = LTTNG_POLL_GETFD(&events, i);
2885
d8ef542d 2886 if (!revents) {
fd20dac9 2887 /* No activity for this FD (poll implementation). */
d8ef542d
MD
2888 continue;
2889 }
fd20dac9 2890
d8ef542d 2891 if (pollfd == ctx->consumer_channel_pipe[0]) {
03e43155 2892 if (revents & LPOLLIN) {
d8ef542d 2893 enum consumer_channel_action action;
a0cbdd2e 2894 uint64_t key;
d8ef542d 2895
a0cbdd2e 2896 ret = read_channel_pipe(ctx, &chan, &key, &action);
d8ef542d 2897 if (ret <= 0) {
03e43155
MD
2898 if (ret < 0) {
2899 ERR("Error reading channel pipe");
2900 }
2901 lttng_poll_del(&events, ctx->consumer_channel_pipe[0]);
d8ef542d
MD
2902 continue;
2903 }
2904
2905 switch (action) {
2906 case CONSUMER_CHANNEL_ADD:
2907 DBG("Adding channel %d to poll set",
2908 chan->wait_fd);
2909
2910 lttng_ht_node_init_u64(&chan->wait_fd_node,
2911 chan->wait_fd);
c7260a81 2912 rcu_read_lock();
d8ef542d
MD
2913 lttng_ht_add_unique_u64(channel_ht,
2914 &chan->wait_fd_node);
c7260a81 2915 rcu_read_unlock();
d8ef542d
MD
2916 /* Add channel to the global poll events list */
2917 lttng_poll_add(&events, chan->wait_fd,
03e43155 2918 LPOLLERR | LPOLLHUP);
d8ef542d 2919 break;
a0cbdd2e
MD
2920 case CONSUMER_CHANNEL_DEL:
2921 {
b4a650f3
DG
2922 /*
2923 * This command should never be called if the channel
2924 * has streams monitored by either the data or metadata
2925 * thread. The consumer only notify this thread with a
2926 * channel del. command if it receives a destroy
2927 * channel command from the session daemon that send it
2928 * if a command prior to the GET_CHANNEL failed.
2929 */
2930
c7260a81 2931 rcu_read_lock();
a0cbdd2e
MD
2932 chan = consumer_find_channel(key);
2933 if (!chan) {
c7260a81 2934 rcu_read_unlock();
a0cbdd2e
MD
2935 ERR("UST consumer get channel key %" PRIu64 " not found for del channel", key);
2936 break;
2937 }
2938 lttng_poll_del(&events, chan->wait_fd);
f623cc0b 2939 iter.iter.node = &chan->wait_fd_node.node;
a0cbdd2e
MD
2940 ret = lttng_ht_del(channel_ht, &iter);
2941 assert(ret == 0);
a0cbdd2e 2942
f2a444f1
DG
2943 switch (consumer_data.type) {
2944 case LTTNG_CONSUMER_KERNEL:
2945 break;
2946 case LTTNG_CONSUMER32_UST:
2947 case LTTNG_CONSUMER64_UST:
212d67a2
DG
2948 health_code_update();
2949 /* Destroy streams that might have been left in the stream list. */
2950 clean_channel_stream_list(chan);
f2a444f1
DG
2951 break;
2952 default:
2953 ERR("Unknown consumer_data type");
2954 assert(0);
2955 }
2956
a0cbdd2e
MD
2957 /*
2958 * Release our own refcount. Force channel deletion even if
2959 * streams were not initialized.
2960 */
2961 if (!uatomic_sub_return(&chan->refcount, 1)) {
2962 consumer_del_channel(chan);
2963 }
c7260a81 2964 rcu_read_unlock();
a0cbdd2e
MD
2965 goto restart;
2966 }
d8ef542d
MD
2967 case CONSUMER_CHANNEL_QUIT:
2968 /*
2969 * Remove the pipe from the poll set and continue the loop
2970 * since their might be data to consume.
2971 */
2972 lttng_poll_del(&events, ctx->consumer_channel_pipe[0]);
2973 continue;
2974 default:
2975 ERR("Unknown action");
2976 break;
2977 }
03e43155
MD
2978 } else if (revents & (LPOLLERR | LPOLLHUP)) {
2979 DBG("Channel thread pipe hung up");
2980 /*
2981 * Remove the pipe from the poll set and continue the loop
2982 * since their might be data to consume.
2983 */
2984 lttng_poll_del(&events, ctx->consumer_channel_pipe[0]);
2985 continue;
2986 } else {
2987 ERR("Unexpected poll events %u for sock %d", revents, pollfd);
2988 goto end;
d8ef542d
MD
2989 }
2990
2991 /* Handle other stream */
2992 continue;
2993 }
2994
2995 rcu_read_lock();
2996 {
2997 uint64_t tmp_id = (uint64_t) pollfd;
2998
2999 lttng_ht_lookup(channel_ht, &tmp_id, &iter);
3000 }
3001 node = lttng_ht_iter_get_node_u64(&iter);
3002 assert(node);
3003
3004 chan = caa_container_of(node, struct lttng_consumer_channel,
3005 wait_fd_node);
3006
3007 /* Check for error event */
3008 if (revents & (LPOLLERR | LPOLLHUP)) {
3009 DBG("Channel fd %d is hup|err.", pollfd);
3010
3011 lttng_poll_del(&events, chan->wait_fd);
3012 ret = lttng_ht_del(channel_ht, &iter);
3013 assert(ret == 0);
b4a650f3
DG
3014
3015 /*
3016 * This will close the wait fd for each stream associated to
3017 * this channel AND monitored by the data/metadata thread thus
3018 * will be clean by the right thread.
3019 */
d8ef542d 3020 consumer_close_channel_streams(chan);
f2ad556d
MD
3021
3022 /* Release our own refcount */
3023 if (!uatomic_sub_return(&chan->refcount, 1)
3024 && !uatomic_read(&chan->nb_init_stream_left)) {
3025 consumer_del_channel(chan);
3026 }
03e43155
MD
3027 } else {
3028 ERR("Unexpected poll events %u for sock %d", revents, pollfd);
3029 rcu_read_unlock();
3030 goto end;
d8ef542d
MD
3031 }
3032
3033 /* Release RCU lock for the channel looked up */
3034 rcu_read_unlock();
3035 }
3036 }
3037
1fc79fb4
MD
3038 /* All is OK */
3039 err = 0;
d8ef542d
MD
3040end:
3041 lttng_poll_clean(&events);
3042end_poll:
3043 destroy_channel_ht(channel_ht);
3044end_ht:
2d57de81 3045error_testpoint:
d8ef542d 3046 DBG("Channel poll thread exiting");
1fc79fb4
MD
3047 if (err) {
3048 health_error();
3049 ERR("Health error occurred in %s", __func__);
3050 }
3051 health_unregister(health_consumerd);
d8ef542d
MD
3052 rcu_unregister_thread();
3053 return NULL;
3054}
3055
331744e3
JD
3056static int set_metadata_socket(struct lttng_consumer_local_data *ctx,
3057 struct pollfd *sockpoll, int client_socket)
3058{
3059 int ret;
3060
3061 assert(ctx);
3062 assert(sockpoll);
3063
84382d49
MD
3064 ret = lttng_consumer_poll_socket(sockpoll);
3065 if (ret) {
331744e3
JD
3066 goto error;
3067 }
3068 DBG("Metadata connection on client_socket");
3069
3070 /* Blocking call, waiting for transmission */
3071 ctx->consumer_metadata_socket = lttcomm_accept_unix_sock(client_socket);
3072 if (ctx->consumer_metadata_socket < 0) {
3073 WARN("On accept metadata");
3074 ret = -1;
3075 goto error;
3076 }
3077 ret = 0;
3078
3079error:
3080 return ret;
3081}
3082
3bd1e081
MD
3083/*
3084 * This thread listens on the consumerd socket and receives the file
3085 * descriptors from the session daemon.
3086 */
7d980def 3087void *consumer_thread_sessiond_poll(void *data)
3bd1e081 3088{
1fc79fb4 3089 int sock = -1, client_socket, ret, err = -1;
3bd1e081
MD
3090 /*
3091 * structure to poll for incoming data on communication socket avoids
3092 * making blocking sockets.
3093 */
3094 struct pollfd consumer_sockpoll[2];
3095 struct lttng_consumer_local_data *ctx = data;
3096
e7b994a3
DG
3097 rcu_register_thread();
3098
1fc79fb4
MD
3099 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_SESSIOND);
3100
2d57de81
MD
3101 if (testpoint(consumerd_thread_sessiond)) {
3102 goto error_testpoint;
3103 }
3104
9ce5646a
MD
3105 health_code_update();
3106
3bd1e081
MD
3107 DBG("Creating command socket %s", ctx->consumer_command_sock_path);
3108 unlink(ctx->consumer_command_sock_path);
3109 client_socket = lttcomm_create_unix_sock(ctx->consumer_command_sock_path);
3110 if (client_socket < 0) {
3111 ERR("Cannot create command socket");
3112 goto end;
3113 }
3114
3115 ret = lttcomm_listen_unix_sock(client_socket);
3116 if (ret < 0) {
3117 goto end;
3118 }
3119
32258573 3120 DBG("Sending ready command to lttng-sessiond");
f73fabfd 3121 ret = lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_COMMAND_SOCK_READY);
3bd1e081
MD
3122 /* return < 0 on error, but == 0 is not fatal */
3123 if (ret < 0) {
32258573 3124 ERR("Error sending ready command to lttng-sessiond");
3bd1e081
MD
3125 goto end;
3126 }
3127
3bd1e081
MD
3128 /* prepare the FDs to poll : to client socket and the should_quit pipe */
3129 consumer_sockpoll[0].fd = ctx->consumer_should_quit[0];
3130 consumer_sockpoll[0].events = POLLIN | POLLPRI;
3131 consumer_sockpoll[1].fd = client_socket;
3132 consumer_sockpoll[1].events = POLLIN | POLLPRI;
3133
84382d49
MD
3134 ret = lttng_consumer_poll_socket(consumer_sockpoll);
3135 if (ret) {
3136 if (ret > 0) {
3137 /* should exit */
3138 err = 0;
3139 }
3bd1e081
MD
3140 goto end;
3141 }
3142 DBG("Connection on client_socket");
3143
3144 /* Blocking call, waiting for transmission */
3145 sock = lttcomm_accept_unix_sock(client_socket);
534d2592 3146 if (sock < 0) {
3bd1e081
MD
3147 WARN("On accept");
3148 goto end;
3149 }
3bd1e081 3150
331744e3
JD
3151 /*
3152 * Setup metadata socket which is the second socket connection on the
3153 * command unix socket.
3154 */
3155 ret = set_metadata_socket(ctx, consumer_sockpoll, client_socket);
84382d49
MD
3156 if (ret) {
3157 if (ret > 0) {
3158 /* should exit */
3159 err = 0;
3160 }
331744e3
JD
3161 goto end;
3162 }
3163
d96f09c6
DG
3164 /* This socket is not useful anymore. */
3165 ret = close(client_socket);
3166 if (ret < 0) {
3167 PERROR("close client_socket");
3168 }
3169 client_socket = -1;
3170
3bd1e081
MD
3171 /* update the polling structure to poll on the established socket */
3172 consumer_sockpoll[1].fd = sock;
3173 consumer_sockpoll[1].events = POLLIN | POLLPRI;
3174
3175 while (1) {
9ce5646a
MD
3176 health_code_update();
3177
3178 health_poll_entry();
3179 ret = lttng_consumer_poll_socket(consumer_sockpoll);
3180 health_poll_exit();
84382d49
MD
3181 if (ret) {
3182 if (ret > 0) {
3183 /* should exit */
3184 err = 0;
3185 }
3bd1e081
MD
3186 goto end;
3187 }
3188 DBG("Incoming command on sock");
3189 ret = lttng_consumer_recv_cmd(ctx, sock, consumer_sockpoll);
4cbc1a04
DG
3190 if (ret <= 0) {
3191 /*
3192 * This could simply be a session daemon quitting. Don't output
3193 * ERR() here.
3194 */
3195 DBG("Communication interrupted on command socket");
41ba6035 3196 err = 0;
3bd1e081
MD
3197 goto end;
3198 }
3199 if (consumer_quit) {
3200 DBG("consumer_thread_receive_fds received quit from signal");
1fc79fb4 3201 err = 0; /* All is OK */
3bd1e081
MD
3202 goto end;
3203 }
ffe60014 3204 DBG("received command on sock");
3bd1e081 3205 }
1fc79fb4
MD
3206 /* All is OK */
3207 err = 0;
3208
3bd1e081 3209end:
ffe60014 3210 DBG("Consumer thread sessiond poll exiting");
3bd1e081 3211
d88aee68
DG
3212 /*
3213 * Close metadata streams since the producer is the session daemon which
3214 * just died.
3215 *
3216 * NOTE: for now, this only applies to the UST tracer.
3217 */
6d574024 3218 lttng_consumer_close_all_metadata();
d88aee68 3219
3bd1e081
MD
3220 /*
3221 * when all fds have hung up, the polling thread
3222 * can exit cleanly
3223 */
3224 consumer_quit = 1;
3225
04fdd819 3226 /*
c869f647 3227 * Notify the data poll thread to poll back again and test the
8994307f 3228 * consumer_quit state that we just set so to quit gracefully.
04fdd819 3229 */
acdb9057 3230 notify_thread_lttng_pipe(ctx->consumer_data_pipe);
c869f647 3231
a0cbdd2e 3232 notify_channel_pipe(ctx, NULL, -1, CONSUMER_CHANNEL_QUIT);
d8ef542d 3233
5c635c72
MD
3234 notify_health_quit_pipe(health_quit_pipe);
3235
d96f09c6
DG
3236 /* Cleaning up possibly open sockets. */
3237 if (sock >= 0) {
3238 ret = close(sock);
3239 if (ret < 0) {
3240 PERROR("close sock sessiond poll");
3241 }
3242 }
3243 if (client_socket >= 0) {
38476d24 3244 ret = close(client_socket);
d96f09c6
DG
3245 if (ret < 0) {
3246 PERROR("close client_socket sessiond poll");
3247 }
3248 }
3249
2d57de81 3250error_testpoint:
1fc79fb4
MD
3251 if (err) {
3252 health_error();
3253 ERR("Health error occurred in %s", __func__);
3254 }
3255 health_unregister(health_consumerd);
3256
e7b994a3 3257 rcu_unregister_thread();
3bd1e081
MD
3258 return NULL;
3259}
d41f73b7 3260
4078b776 3261ssize_t lttng_consumer_read_subbuffer(struct lttng_consumer_stream *stream,
d41f73b7
MD
3262 struct lttng_consumer_local_data *ctx)
3263{
74251bb8
DG
3264 ssize_t ret;
3265
3266 pthread_mutex_lock(&stream->lock);
94d49140
JD
3267 if (stream->metadata_flag) {
3268 pthread_mutex_lock(&stream->metadata_rdv_lock);
3269 }
74251bb8 3270
d41f73b7
MD
3271 switch (consumer_data.type) {
3272 case LTTNG_CONSUMER_KERNEL:
74251bb8
DG
3273 ret = lttng_kconsumer_read_subbuffer(stream, ctx);
3274 break;
7753dea8
MD
3275 case LTTNG_CONSUMER32_UST:
3276 case LTTNG_CONSUMER64_UST:
74251bb8
DG
3277 ret = lttng_ustconsumer_read_subbuffer(stream, ctx);
3278 break;
d41f73b7
MD
3279 default:
3280 ERR("Unknown consumer_data type");
3281 assert(0);
74251bb8
DG
3282 ret = -ENOSYS;
3283 break;
d41f73b7 3284 }
74251bb8 3285
94d49140
JD
3286 if (stream->metadata_flag) {
3287 pthread_cond_broadcast(&stream->metadata_rdv);
3288 pthread_mutex_unlock(&stream->metadata_rdv_lock);
3289 }
74251bb8
DG
3290 pthread_mutex_unlock(&stream->lock);
3291 return ret;
d41f73b7
MD
3292}
3293
3294int lttng_consumer_on_recv_stream(struct lttng_consumer_stream *stream)
3295{
3296 switch (consumer_data.type) {
3297 case LTTNG_CONSUMER_KERNEL:
3298 return lttng_kconsumer_on_recv_stream(stream);
7753dea8
MD
3299 case LTTNG_CONSUMER32_UST:
3300 case LTTNG_CONSUMER64_UST:
d41f73b7
MD
3301 return lttng_ustconsumer_on_recv_stream(stream);
3302 default:
3303 ERR("Unknown consumer_data type");
3304 assert(0);
3305 return -ENOSYS;
3306 }
3307}
e4421fec
DG
3308
3309/*
3310 * Allocate and set consumer data hash tables.
3311 */
282dadbc 3312int lttng_consumer_init(void)
e4421fec 3313{
d88aee68 3314 consumer_data.channel_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
282dadbc
MD
3315 if (!consumer_data.channel_ht) {
3316 goto error;
3317 }
3318
d88aee68 3319 consumer_data.relayd_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
282dadbc
MD
3320 if (!consumer_data.relayd_ht) {
3321 goto error;
3322 }
3323
d88aee68 3324 consumer_data.stream_list_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
282dadbc
MD
3325 if (!consumer_data.stream_list_ht) {
3326 goto error;
3327 }
3328
d8ef542d 3329 consumer_data.stream_per_chan_id_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
282dadbc
MD
3330 if (!consumer_data.stream_per_chan_id_ht) {
3331 goto error;
3332 }
3333
3334 data_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
3335 if (!data_ht) {
3336 goto error;
3337 }
3338
3339 metadata_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
3340 if (!metadata_ht) {
3341 goto error;
3342 }
3343
3344 return 0;
3345
3346error:
3347 return -1;
e4421fec 3348}
7735ef9e
DG
3349
3350/*
3351 * Process the ADD_RELAYD command receive by a consumer.
3352 *
3353 * This will create a relayd socket pair and add it to the relayd hash table.
3354 * The caller MUST acquire a RCU read side lock before calling it.
3355 */
da009f2c 3356int consumer_add_relayd_socket(uint64_t net_seq_idx, int sock_type,
7735ef9e 3357 struct lttng_consumer_local_data *ctx, int sock,
6151a90f 3358 struct pollfd *consumer_sockpoll,
d3e2ba59
JD
3359 struct lttcomm_relayd_sock *relayd_sock, uint64_t sessiond_id,
3360 uint64_t relayd_session_id)
7735ef9e 3361{
cd2b09ed 3362 int fd = -1, ret = -1, relayd_created = 0;
0c759fc9 3363 enum lttcomm_return_code ret_code = LTTCOMM_CONSUMERD_SUCCESS;
d4298c99 3364 struct consumer_relayd_sock_pair *relayd = NULL;
7735ef9e 3365
6151a90f
JD
3366 assert(ctx);
3367 assert(relayd_sock);
3368
da009f2c 3369 DBG("Consumer adding relayd socket (idx: %" PRIu64 ")", net_seq_idx);
7735ef9e
DG
3370
3371 /* Get relayd reference if exists. */
3372 relayd = consumer_find_relayd(net_seq_idx);
3373 if (relayd == NULL) {
da009f2c 3374 assert(sock_type == LTTNG_STREAM_CONTROL);
7735ef9e
DG
3375 /* Not found. Allocate one. */
3376 relayd = consumer_allocate_relayd_sock_pair(net_seq_idx);
3377 if (relayd == NULL) {
0d08d75e 3378 ret = -ENOMEM;
618a6a28
MD
3379 ret_code = LTTCOMM_CONSUMERD_ENOMEM;
3380 goto error;
0d08d75e 3381 } else {
30319bcb 3382 relayd->sessiond_session_id = sessiond_id;
0d08d75e 3383 relayd_created = 1;
7735ef9e 3384 }
0d08d75e
DG
3385
3386 /*
3387 * This code path MUST continue to the consumer send status message to
3388 * we can notify the session daemon and continue our work without
3389 * killing everything.
3390 */
da009f2c
MD
3391 } else {
3392 /*
3393 * relayd key should never be found for control socket.
3394 */
3395 assert(sock_type != LTTNG_STREAM_CONTROL);
0d08d75e
DG
3396 }
3397
3398 /* First send a status message before receiving the fds. */
0c759fc9 3399 ret = consumer_send_status_msg(sock, LTTCOMM_CONSUMERD_SUCCESS);
618a6a28 3400 if (ret < 0) {
0d08d75e 3401 /* Somehow, the session daemon is not responding anymore. */
618a6a28
MD
3402 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_FATAL);
3403 goto error_nosignal;
7735ef9e
DG
3404 }
3405
3406 /* Poll on consumer socket. */
84382d49
MD
3407 ret = lttng_consumer_poll_socket(consumer_sockpoll);
3408 if (ret) {
3409 /* Needing to exit in the middle of a command: error. */
0d08d75e 3410 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_POLL_ERROR);
7735ef9e 3411 ret = -EINTR;
618a6a28 3412 goto error_nosignal;
7735ef9e
DG
3413 }
3414
3415 /* Get relayd socket from session daemon */
3416 ret = lttcomm_recv_fds_unix_sock(sock, &fd, 1);
3417 if (ret != sizeof(fd)) {
7735ef9e 3418 ret = -1;
4028eeb9 3419 fd = -1; /* Just in case it gets set with an invalid value. */
0d08d75e
DG
3420
3421 /*
3422 * Failing to receive FDs might indicate a major problem such as
3423 * reaching a fd limit during the receive where the kernel returns a
3424 * MSG_CTRUNC and fails to cleanup the fd in the queue. Any case, we
3425 * don't take any chances and stop everything.
3426 *
3427 * XXX: Feature request #558 will fix that and avoid this possible
3428 * issue when reaching the fd limit.
3429 */
3430 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_ERROR_RECV_FD);
618a6a28 3431 ret_code = LTTCOMM_CONSUMERD_ERROR_RECV_FD;
f50f23d9
DG
3432 goto error;
3433 }
3434
7735ef9e
DG
3435 /* Copy socket information and received FD */
3436 switch (sock_type) {
3437 case LTTNG_STREAM_CONTROL:
3438 /* Copy received lttcomm socket */
6151a90f
JD
3439 lttcomm_copy_sock(&relayd->control_sock.sock, &relayd_sock->sock);
3440 ret = lttcomm_create_sock(&relayd->control_sock.sock);
4028eeb9 3441 /* Handle create_sock error. */
f66c074c 3442 if (ret < 0) {
618a6a28 3443 ret_code = LTTCOMM_CONSUMERD_ENOMEM;
4028eeb9 3444 goto error;
f66c074c 3445 }
da009f2c
MD
3446 /*
3447 * Close the socket created internally by
3448 * lttcomm_create_sock, so we can replace it by the one
3449 * received from sessiond.
3450 */
3451 if (close(relayd->control_sock.sock.fd)) {
3452 PERROR("close");
3453 }
7735ef9e
DG
3454
3455 /* Assign new file descriptor */
6151a90f 3456 relayd->control_sock.sock.fd = fd;
4b29f1ce 3457 fd = -1; /* For error path */
6151a90f
JD
3458 /* Assign version values. */
3459 relayd->control_sock.major = relayd_sock->major;
3460 relayd->control_sock.minor = relayd_sock->minor;
c5b6f4f0 3461
d3e2ba59 3462 relayd->relayd_session_id = relayd_session_id;
c5b6f4f0 3463
7735ef9e
DG
3464 break;
3465 case LTTNG_STREAM_DATA:
3466 /* Copy received lttcomm socket */
6151a90f
JD
3467 lttcomm_copy_sock(&relayd->data_sock.sock, &relayd_sock->sock);
3468 ret = lttcomm_create_sock(&relayd->data_sock.sock);
4028eeb9 3469 /* Handle create_sock error. */
f66c074c 3470 if (ret < 0) {
618a6a28 3471 ret_code = LTTCOMM_CONSUMERD_ENOMEM;
4028eeb9 3472 goto error;
f66c074c 3473 }
da009f2c
MD
3474 /*
3475 * Close the socket created internally by
3476 * lttcomm_create_sock, so we can replace it by the one
3477 * received from sessiond.
3478 */
3479 if (close(relayd->data_sock.sock.fd)) {
3480 PERROR("close");
3481 }
7735ef9e
DG
3482
3483 /* Assign new file descriptor */
6151a90f 3484 relayd->data_sock.sock.fd = fd;
4b29f1ce 3485 fd = -1; /* for eventual error paths */
6151a90f
JD
3486 /* Assign version values. */
3487 relayd->data_sock.major = relayd_sock->major;
3488 relayd->data_sock.minor = relayd_sock->minor;
7735ef9e
DG
3489 break;
3490 default:
3491 ERR("Unknown relayd socket type (%d)", sock_type);
59e71485 3492 ret = -1;
618a6a28 3493 ret_code = LTTCOMM_CONSUMERD_FATAL;
7735ef9e
DG
3494 goto error;
3495 }
3496
d88aee68 3497 DBG("Consumer %s socket created successfully with net idx %" PRIu64 " (fd: %d)",
7735ef9e
DG
3498 sock_type == LTTNG_STREAM_CONTROL ? "control" : "data",
3499 relayd->net_seq_idx, fd);
3500
618a6a28
MD
3501 /* We successfully added the socket. Send status back. */
3502 ret = consumer_send_status_msg(sock, ret_code);
3503 if (ret < 0) {
3504 /* Somehow, the session daemon is not responding anymore. */
3505 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_FATAL);
3506 goto error_nosignal;
3507 }
3508
7735ef9e
DG
3509 /*
3510 * Add relayd socket pair to consumer data hashtable. If object already
3511 * exists or on error, the function gracefully returns.
3512 */
d09e1200 3513 add_relayd(relayd);
7735ef9e
DG
3514
3515 /* All good! */
4028eeb9 3516 return 0;
7735ef9e
DG
3517
3518error:
618a6a28
MD
3519 if (consumer_send_status_msg(sock, ret_code) < 0) {
3520 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_FATAL);
3521 }
3522
3523error_nosignal:
4028eeb9
DG
3524 /* Close received socket if valid. */
3525 if (fd >= 0) {
3526 if (close(fd)) {
3527 PERROR("close received socket");
3528 }
3529 }
cd2b09ed
DG
3530
3531 if (relayd_created) {
cd2b09ed
DG
3532 free(relayd);
3533 }
3534
7735ef9e
DG
3535 return ret;
3536}
ca22feea 3537
4e9a4686
DG
3538/*
3539 * Try to lock the stream mutex.
3540 *
3541 * On success, 1 is returned else 0 indicating that the mutex is NOT lock.
3542 */
3543static int stream_try_lock(struct lttng_consumer_stream *stream)
3544{
3545 int ret;
3546
3547 assert(stream);
3548
3549 /*
3550 * Try to lock the stream mutex. On failure, we know that the stream is
3551 * being used else where hence there is data still being extracted.
3552 */
3553 ret = pthread_mutex_trylock(&stream->lock);
3554 if (ret) {
3555 /* For both EBUSY and EINVAL error, the mutex is NOT locked. */
3556 ret = 0;
3557 goto end;
3558 }
3559
3560 ret = 1;
3561
3562end:
3563 return ret;
3564}
3565
f7079f67
DG
3566/*
3567 * Search for a relayd associated to the session id and return the reference.
3568 *
3569 * A rcu read side lock MUST be acquire before calling this function and locked
3570 * until the relayd object is no longer necessary.
3571 */
3572static struct consumer_relayd_sock_pair *find_relayd_by_session_id(uint64_t id)
3573{
3574 struct lttng_ht_iter iter;
f7079f67 3575 struct consumer_relayd_sock_pair *relayd = NULL;
f7079f67
DG
3576
3577 /* Iterate over all relayd since they are indexed by net_seq_idx. */
3578 cds_lfht_for_each_entry(consumer_data.relayd_ht->ht, &iter.iter, relayd,
3579 node.node) {
18261bd1
DG
3580 /*
3581 * Check by sessiond id which is unique here where the relayd session
3582 * id might not be when having multiple relayd.
3583 */
3584 if (relayd->sessiond_session_id == id) {
f7079f67 3585 /* Found the relayd. There can be only one per id. */
18261bd1 3586 goto found;
f7079f67
DG
3587 }
3588 }
3589
18261bd1
DG
3590 return NULL;
3591
3592found:
f7079f67
DG
3593 return relayd;
3594}
3595
ca22feea
DG
3596/*
3597 * Check if for a given session id there is still data needed to be extract
3598 * from the buffers.
3599 *
6d805429 3600 * Return 1 if data is pending or else 0 meaning ready to be read.
ca22feea 3601 */
6d805429 3602int consumer_data_pending(uint64_t id)
ca22feea
DG
3603{
3604 int ret;
3605 struct lttng_ht_iter iter;
3606 struct lttng_ht *ht;
3607 struct lttng_consumer_stream *stream;
f7079f67 3608 struct consumer_relayd_sock_pair *relayd = NULL;
6d805429 3609 int (*data_pending)(struct lttng_consumer_stream *);
ca22feea 3610
6d805429 3611 DBG("Consumer data pending command on session id %" PRIu64, id);
ca22feea 3612
6f6eda74 3613 rcu_read_lock();
ca22feea
DG
3614 pthread_mutex_lock(&consumer_data.lock);
3615
3616 switch (consumer_data.type) {
3617 case LTTNG_CONSUMER_KERNEL:
6d805429 3618 data_pending = lttng_kconsumer_data_pending;
ca22feea
DG
3619 break;
3620 case LTTNG_CONSUMER32_UST:
3621 case LTTNG_CONSUMER64_UST:
6d805429 3622 data_pending = lttng_ustconsumer_data_pending;
ca22feea
DG
3623 break;
3624 default:
3625 ERR("Unknown consumer data type");
3626 assert(0);
3627 }
3628
3629 /* Ease our life a bit */
3630 ht = consumer_data.stream_list_ht;
3631
f7079f67
DG
3632 relayd = find_relayd_by_session_id(id);
3633 if (relayd) {
3634 /* Send init command for data pending. */
3635 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
3636 ret = relayd_begin_data_pending(&relayd->control_sock,
3637 relayd->relayd_session_id);
3638 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
3639 if (ret < 0) {
3640 /* Communication error thus the relayd so no data pending. */
3641 goto data_not_pending;
3642 }
3643 }
3644
c8f59ee5 3645 cds_lfht_for_each_entry_duplicate(ht->ht,
d88aee68
DG
3646 ht->hash_fct(&id, lttng_ht_seed),
3647 ht->match_fct, &id,
ca22feea 3648 &iter.iter, stream, node_session_id.node) {
4e9a4686
DG
3649 /* If this call fails, the stream is being used hence data pending. */
3650 ret = stream_try_lock(stream);
3651 if (!ret) {
f7079f67 3652 goto data_pending;
ca22feea 3653 }
ca22feea 3654
4e9a4686
DG
3655 /*
3656 * A removed node from the hash table indicates that the stream has
3657 * been deleted thus having a guarantee that the buffers are closed
3658 * on the consumer side. However, data can still be transmitted
3659 * over the network so don't skip the relayd check.
3660 */
3661 ret = cds_lfht_is_node_deleted(&stream->node.node);
3662 if (!ret) {
3663 /* Check the stream if there is data in the buffers. */
6d805429
DG
3664 ret = data_pending(stream);
3665 if (ret == 1) {
4e9a4686 3666 pthread_mutex_unlock(&stream->lock);
f7079f67 3667 goto data_pending;
4e9a4686
DG
3668 }
3669 }
3670
3671 /* Relayd check */
f7079f67 3672 if (relayd) {
c8f59ee5
DG
3673 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
3674 if (stream->metadata_flag) {
ad7051c0
DG
3675 ret = relayd_quiescent_control(&relayd->control_sock,
3676 stream->relayd_stream_id);
c8f59ee5 3677 } else {
6d805429 3678 ret = relayd_data_pending(&relayd->control_sock,
39df6d9f
DG
3679 stream->relayd_stream_id,
3680 stream->next_net_seq_num - 1);
c8f59ee5
DG
3681 }
3682 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
6d805429 3683 if (ret == 1) {
4e9a4686 3684 pthread_mutex_unlock(&stream->lock);
f7079f67 3685 goto data_pending;
c8f59ee5
DG
3686 }
3687 }
4e9a4686 3688 pthread_mutex_unlock(&stream->lock);
c8f59ee5 3689 }
ca22feea 3690
f7079f67
DG
3691 if (relayd) {
3692 unsigned int is_data_inflight = 0;
3693
3694 /* Send init command for data pending. */
3695 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
3696 ret = relayd_end_data_pending(&relayd->control_sock,
3697 relayd->relayd_session_id, &is_data_inflight);
3698 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
bdd88757 3699 if (ret < 0) {
f7079f67
DG
3700 goto data_not_pending;
3701 }
bdd88757
DG
3702 if (is_data_inflight) {
3703 goto data_pending;
3704 }
f7079f67
DG
3705 }
3706
ca22feea 3707 /*
f7079f67
DG
3708 * Finding _no_ node in the hash table and no inflight data means that the
3709 * stream(s) have been removed thus data is guaranteed to be available for
3710 * analysis from the trace files.
ca22feea
DG
3711 */
3712
f7079f67 3713data_not_pending:
ca22feea
DG
3714 /* Data is available to be read by a viewer. */
3715 pthread_mutex_unlock(&consumer_data.lock);
c8f59ee5 3716 rcu_read_unlock();
6d805429 3717 return 0;
ca22feea 3718
f7079f67 3719data_pending:
ca22feea
DG
3720 /* Data is still being extracted from buffers. */
3721 pthread_mutex_unlock(&consumer_data.lock);
c8f59ee5 3722 rcu_read_unlock();
6d805429 3723 return 1;
ca22feea 3724}
f50f23d9
DG
3725
3726/*
3727 * Send a ret code status message to the sessiond daemon.
3728 *
3729 * Return the sendmsg() return value.
3730 */
3731int consumer_send_status_msg(int sock, int ret_code)
3732{
3733 struct lttcomm_consumer_status_msg msg;
3734
53efb85a 3735 memset(&msg, 0, sizeof(msg));
f50f23d9
DG
3736 msg.ret_code = ret_code;
3737
3738 return lttcomm_send_unix_sock(sock, &msg, sizeof(msg));
3739}
ffe60014
DG
3740
3741/*
3742 * Send a channel status message to the sessiond daemon.
3743 *
3744 * Return the sendmsg() return value.
3745 */
3746int consumer_send_status_channel(int sock,
3747 struct lttng_consumer_channel *channel)
3748{
3749 struct lttcomm_consumer_status_channel msg;
3750
3751 assert(sock >= 0);
3752
53efb85a 3753 memset(&msg, 0, sizeof(msg));
ffe60014 3754 if (!channel) {
0c759fc9 3755 msg.ret_code = LTTCOMM_CONSUMERD_CHANNEL_FAIL;
ffe60014 3756 } else {
0c759fc9 3757 msg.ret_code = LTTCOMM_CONSUMERD_SUCCESS;
ffe60014
DG
3758 msg.key = channel->key;
3759 msg.stream_count = channel->streams.count;
3760 }
3761
3762 return lttcomm_send_unix_sock(sock, &msg, sizeof(msg));
3763}
5c786ded 3764
d07ceecd
MD
3765unsigned long consumer_get_consume_start_pos(unsigned long consumed_pos,
3766 unsigned long produced_pos, uint64_t nb_packets_per_stream,
3767 uint64_t max_sb_size)
5c786ded 3768{
d07ceecd 3769 unsigned long start_pos;
5c786ded 3770
d07ceecd
MD
3771 if (!nb_packets_per_stream) {
3772 return consumed_pos; /* Grab everything */
3773 }
3774 start_pos = produced_pos - offset_align_floor(produced_pos, max_sb_size);
3775 start_pos -= max_sb_size * nb_packets_per_stream;
3776 if ((long) (start_pos - consumed_pos) < 0) {
3777 return consumed_pos; /* Grab everything */
3778 }
3779 return start_pos;
5c786ded 3780}
This page took 0.278694 seconds and 4 git commands to generate.