Use a "comm" variant of the LTTNG_OPTIONAL helper in sessiond-comm
[lttng-tools.git] / src / common / relayd / relayd.c
CommitLineData
00e2e675
DG
1/*
2 * Copyright (C) 2012 - David Goulet <dgoulet@efficios.com>
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License, version 2 only, as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 51
15 * Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
16 */
17
6c1c0768 18#define _LGPL_SOURCE
00e2e675
DG
19#include <assert.h>
20#include <stdio.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/stat.h>
77c7c900 24#include <inttypes.h>
00e2e675
DG
25
26#include <common/common.h>
27#include <common/defaults.h>
f263b7fd 28#include <common/compat/endian.h>
27283937 29#include <common/compat/string.h>
00e2e675 30#include <common/sessiond-comm/relayd.h>
50adc264 31#include <common/index/ctf-index.h>
d2956687 32#include <common/trace-chunk.h>
00e2e675
DG
33
34#include "relayd.h"
35
36/*
37 * Send command. Fill up the header and append the data.
38 */
6151a90f 39static int send_command(struct lttcomm_relayd_sock *rsock,
76b9afaa 40 enum lttcomm_relayd_command cmd, const void *data, size_t size,
00e2e675
DG
41 int flags)
42{
43 int ret;
44 struct lttcomm_relayd_hdr header;
45 char *buf;
46 uint64_t buf_size = sizeof(header);
47
f96e4545
MD
48 if (rsock->sock.fd < 0) {
49 return -ECONNRESET;
50 }
51
00e2e675
DG
52 if (data) {
53 buf_size += size;
54 }
55
56 buf = zmalloc(buf_size);
57 if (buf == NULL) {
58 PERROR("zmalloc relayd send command buf");
59 ret = -1;
60 goto alloc_error;
61 }
62
53efb85a 63 memset(&header, 0, sizeof(header));
00e2e675
DG
64 header.cmd = htobe32(cmd);
65 header.data_size = htobe64(size);
66
67 /* Zeroed for now since not used. */
68 header.cmd_version = 0;
69 header.circuit_id = 0;
70
71 /* Prepare buffer to send. */
72 memcpy(buf, &header, sizeof(header));
73 if (data) {
74 memcpy(buf + sizeof(header), data, size);
75 }
76
06586bbe 77 DBG3("Relayd sending command %d of size %" PRIu64, (int) cmd, buf_size);
6151a90f 78 ret = rsock->sock.ops->sendmsg(&rsock->sock, buf, buf_size, flags);
00e2e675 79 if (ret < 0) {
06586bbe
JG
80 PERROR("Failed to send command %d of size %" PRIu64,
81 (int) cmd, buf_size);
8994307f 82 ret = -errno;
00e2e675
DG
83 goto error;
84 }
00e2e675
DG
85error:
86 free(buf);
87alloc_error:
88 return ret;
89}
90
91/*
92 * Receive reply data on socket. This MUST be call after send_command or else
93 * could result in unexpected behavior(s).
94 */
6151a90f 95static int recv_reply(struct lttcomm_relayd_sock *rsock, void *data, size_t size)
00e2e675
DG
96{
97 int ret;
98
f96e4545
MD
99 if (rsock->sock.fd < 0) {
100 return -ECONNRESET;
101 }
102
8fd623e0 103 DBG3("Relayd waiting for reply of size %zu", size);
00e2e675 104
6151a90f 105 ret = rsock->sock.ops->recvmsg(&rsock->sock, data, size, 0);
20275fe8
DG
106 if (ret <= 0 || ret != size) {
107 if (ret == 0) {
108 /* Orderly shutdown. */
6151a90f 109 DBG("Socket %d has performed an orderly shutdown", rsock->sock.fd);
20275fe8 110 } else {
8fd623e0 111 DBG("Receiving reply failed on sock %d for size %zu with ret %d",
6151a90f 112 rsock->sock.fd, size, ret);
20275fe8
DG
113 }
114 /* Always return -1 here and the caller can use errno. */
115 ret = -1;
00e2e675
DG
116 goto error;
117 }
118
119error:
120 return ret;
121}
122
d3e2ba59 123/*
f86f6389
JR
124 * Starting from 2.11, RELAYD_CREATE_SESSION payload (session_name & hostname)
125 * have no length restriction on the sender side.
126 * Length for both payloads is stored in the msg struct. A new dynamic size
127 * payload size is introduced.
128 */
129static int relayd_create_session_2_11(struct lttcomm_relayd_sock *rsock,
fb9a95c4 130 const char *session_name, const char *hostname,
658f12fa
JG
131 int session_live_timer, unsigned int snapshot,
132 uint64_t sessiond_session_id, const lttng_uuid sessiond_uuid)
f86f6389
JR
133{
134 int ret;
135 struct lttcomm_relayd_create_session_2_11 *msg = NULL;
136 size_t session_name_len;
137 size_t hostname_len;
138 size_t msg_length;
139
140 /* The two names are sent with a '\0' delimiter between them. */
141 session_name_len = strlen(session_name) + 1;
142 hostname_len = strlen(hostname) + 1;
143
144 msg_length = sizeof(*msg) + session_name_len + hostname_len;
145 msg = zmalloc(msg_length);
146 if (!msg) {
147 PERROR("zmalloc create_session_2_11 command message");
148 ret = -1;
149 goto error;
150 }
151
152 assert(session_name_len <= UINT32_MAX);
153 msg->session_name_len = htobe32(session_name_len);
154
155 assert(hostname_len <= UINT32_MAX);
156 msg->hostname_len = htobe32(hostname_len);
157
158 if (lttng_strncpy(msg->names, session_name, session_name_len)) {
159 ret = -1;
160 goto error;
161 }
162 if (lttng_strncpy(msg->names + session_name_len, hostname, hostname_len)) {
163 ret = -1;
164 goto error;
165 }
166
167 msg->live_timer = htobe32(session_live_timer);
168 msg->snapshot = !!snapshot;
169
658f12fa
JG
170 lttng_uuid_copy(msg->sessiond_uuid, sessiond_uuid);
171 msg->session_id = htobe64(sessiond_session_id);
172
f86f6389
JR
173 /* Send command */
174 ret = send_command(rsock, RELAYD_CREATE_SESSION, msg, msg_length, 0);
175 if (ret < 0) {
176 goto error;
177 }
178error:
179 free(msg);
180 return ret;
181}
182/*
183 * From 2.4 to 2.10, RELAYD_CREATE_SESSION takes additional parameters to
d3e2ba59
JD
184 * support the live reading capability.
185 */
186static int relayd_create_session_2_4(struct lttcomm_relayd_sock *rsock,
fb9a95c4
JG
187 const char *session_name, const char *hostname,
188 int session_live_timer, unsigned int snapshot)
d3e2ba59
JD
189{
190 int ret;
191 struct lttcomm_relayd_create_session_2_4 msg;
192
3a13ffd5
MD
193 if (lttng_strncpy(msg.session_name, session_name,
194 sizeof(msg.session_name))) {
246777db
MD
195 ret = -1;
196 goto error;
197 }
3a13ffd5 198 if (lttng_strncpy(msg.hostname, hostname, sizeof(msg.hostname))) {
246777db
MD
199 ret = -1;
200 goto error;
201 }
d3e2ba59 202 msg.live_timer = htobe32(session_live_timer);
7d2f7452 203 msg.snapshot = htobe32(snapshot);
d3e2ba59
JD
204
205 /* Send command */
206 ret = send_command(rsock, RELAYD_CREATE_SESSION, &msg, sizeof(msg), 0);
207 if (ret < 0) {
208 goto error;
209 }
210
211error:
212 return ret;
213}
214
215/*
216 * RELAYD_CREATE_SESSION from 2.1 to 2.3.
217 */
42e9a27b 218static int relayd_create_session_2_1(struct lttcomm_relayd_sock *rsock)
d3e2ba59
JD
219{
220 int ret;
221
222 /* Send command */
223 ret = send_command(rsock, RELAYD_CREATE_SESSION, NULL, 0, 0);
224 if (ret < 0) {
225 goto error;
226 }
227
228error:
229 return ret;
230}
231
c5b6f4f0
DG
232/*
233 * Send a RELAYD_CREATE_SESSION command to the relayd with the given socket and
234 * set session_id of the relayd if we have a successful reply from the relayd.
235 *
20275fe8
DG
236 * On success, return 0 else a negative value which is either an errno error or
237 * a lttng error code from the relayd.
c5b6f4f0 238 */
fb9a95c4
JG
239int relayd_create_session(struct lttcomm_relayd_sock *rsock,
240 uint64_t *relayd_session_id,
241 const char *session_name, const char *hostname,
242 int session_live_timer,
658f12fa
JG
243 unsigned int snapshot, uint64_t sessiond_session_id,
244 const lttng_uuid sessiond_uuid)
c5b6f4f0
DG
245{
246 int ret;
247 struct lttcomm_relayd_status_session reply;
248
6151a90f 249 assert(rsock);
658f12fa 250 assert(relayd_session_id);
c5b6f4f0
DG
251
252 DBG("Relayd create session");
253
f86f6389
JR
254 if (rsock->minor < 4) {
255 /* From 2.1 to 2.3 */
256 ret = relayd_create_session_2_1(rsock);
257 } else if (rsock->minor >= 4 && rsock->minor < 11) {
258 /* From 2.4 to 2.10 */
259 ret = relayd_create_session_2_4(rsock, session_name,
260 hostname, session_live_timer, snapshot);
261 } else {
262 /* From 2.11 to ... */
263 ret = relayd_create_session_2_11(rsock, session_name,
658f12fa
JG
264 hostname, session_live_timer, snapshot,
265 sessiond_session_id, sessiond_uuid);
d3e2ba59
JD
266 }
267
c5b6f4f0
DG
268 if (ret < 0) {
269 goto error;
270 }
271
20275fe8 272 /* Receive response */
6151a90f 273 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
c5b6f4f0
DG
274 if (ret < 0) {
275 goto error;
276 }
277
278 reply.session_id = be64toh(reply.session_id);
279 reply.ret_code = be32toh(reply.ret_code);
280
281 /* Return session id or negative ret code. */
282 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
283 ret = -1;
284 ERR("Relayd create session replied error %d", reply.ret_code);
c5b6f4f0
DG
285 goto error;
286 } else {
287 ret = 0;
658f12fa 288 *relayd_session_id = reply.session_id;
c5b6f4f0
DG
289 }
290
291 DBG("Relayd session created with id %" PRIu64, reply.session_id);
292
293error:
294 return ret;
295}
296
2f21a469
JR
297static int relayd_add_stream_2_1(struct lttcomm_relayd_sock *rsock,
298 const char *channel_name, const char *pathname)
299{
300 int ret;
301 struct lttcomm_relayd_add_stream msg;
302
303 memset(&msg, 0, sizeof(msg));
304 if (lttng_strncpy(msg.channel_name, channel_name,
305 sizeof(msg.channel_name))) {
306 ret = -1;
307 goto error;
308 }
309
310 if (lttng_strncpy(msg.pathname, pathname,
311 sizeof(msg.pathname))) {
312 ret = -1;
313 goto error;
314 }
315
316 /* Send command */
317 ret = send_command(rsock, RELAYD_ADD_STREAM, (void *) &msg, sizeof(msg), 0);
318 if (ret < 0) {
319 ret = -1;
320 goto error;
321 }
322 ret = 0;
323error:
324 return ret;
325}
326
327static int relayd_add_stream_2_2(struct lttcomm_relayd_sock *rsock,
328 const char *channel_name, const char *pathname,
329 uint64_t tracefile_size, uint64_t tracefile_count)
330{
331 int ret;
332 struct lttcomm_relayd_add_stream_2_2 msg;
333
334 memset(&msg, 0, sizeof(msg));
335 /* Compat with relayd 2.2 to 2.10 */
336 if (lttng_strncpy(msg.channel_name, channel_name,
337 sizeof(msg.channel_name))) {
338 ret = -1;
339 goto error;
340 }
341 if (lttng_strncpy(msg.pathname, pathname,
342 sizeof(msg.pathname))) {
343 ret = -1;
344 goto error;
345 }
346 msg.tracefile_size = htobe64(tracefile_size);
347 msg.tracefile_count = htobe64(tracefile_count);
348
349 /* Send command */
350 ret = send_command(rsock, RELAYD_ADD_STREAM, (void *) &msg, sizeof(msg), 0);
351 if (ret < 0) {
352 goto error;
353 }
354 ret = 0;
355error:
356 return ret;
357}
358
359static int relayd_add_stream_2_11(struct lttcomm_relayd_sock *rsock,
360 const char *channel_name, const char *pathname,
b00e554e
JG
361 uint64_t tracefile_size, uint64_t tracefile_count,
362 uint64_t trace_archive_id)
2f21a469
JR
363{
364 int ret;
365 struct lttcomm_relayd_add_stream_2_11 *msg = NULL;
366 size_t channel_name_len;
367 size_t pathname_len;
368 size_t msg_length;
369
370 /* The two names are sent with a '\0' delimiter between them. */
371 channel_name_len = strlen(channel_name) + 1;
372 pathname_len = strlen(pathname) + 1;
373
374 msg_length = sizeof(*msg) + channel_name_len + pathname_len;
375 msg = zmalloc(msg_length);
376 if (!msg) {
377 PERROR("zmalloc add_stream_2_11 command message");
378 ret = -1;
379 goto error;
380 }
381
382 assert(channel_name_len <= UINT32_MAX);
383 msg->channel_name_len = htobe32(channel_name_len);
384
385 assert(pathname_len <= UINT32_MAX);
386 msg->pathname_len = htobe32(pathname_len);
387
388 if (lttng_strncpy(msg->names, channel_name, channel_name_len)) {
389 ret = -1;
390 goto error;
391 }
392 if (lttng_strncpy(msg->names + channel_name_len, pathname, pathname_len)) {
393 ret = -1;
394 goto error;
395 }
396
397 msg->tracefile_size = htobe64(tracefile_size);
398 msg->tracefile_count = htobe64(tracefile_count);
b00e554e 399 msg->trace_archive_id = htobe64(trace_archive_id);
2f21a469
JR
400
401 /* Send command */
402 ret = send_command(rsock, RELAYD_ADD_STREAM, (void *) msg, msg_length, 0);
403 if (ret < 0) {
404 goto error;
405 }
406 ret = 0;
407error:
408 free(msg);
409 return ret;
410}
411
00e2e675
DG
412/*
413 * Add stream on the relayd and assign stream handle to the stream_id argument.
414 *
415 * On success return 0 else return ret_code negative value.
416 */
6151a90f 417int relayd_add_stream(struct lttcomm_relayd_sock *rsock, const char *channel_name,
0f907de1 418 const char *pathname, uint64_t *stream_id,
0b50e4b3 419 uint64_t tracefile_size, uint64_t tracefile_count,
d2956687 420 struct lttng_trace_chunk *trace_chunk)
00e2e675
DG
421{
422 int ret;
00e2e675
DG
423 struct lttcomm_relayd_status_stream reply;
424
425 /* Code flow error. Safety net. */
6151a90f 426 assert(rsock);
00e2e675
DG
427 assert(channel_name);
428 assert(pathname);
429
430 DBG("Relayd adding stream for channel name %s", channel_name);
431
0f907de1
JD
432 /* Compat with relayd 2.1 */
433 if (rsock->minor == 1) {
2f21a469 434 /* For 2.1 */
d2956687 435 assert(!trace_chunk);
2f21a469
JR
436 ret = relayd_add_stream_2_1(rsock, channel_name, pathname);
437
438 } else if (rsock->minor > 1 && rsock->minor < 11) {
439 /* From 2.2 to 2.10 */
d2956687 440 assert(!trace_chunk);
2f21a469
JR
441 ret = relayd_add_stream_2_2(rsock, channel_name, pathname,
442 tracefile_size, tracefile_count);
0f907de1 443 } else {
d2956687
JG
444 enum lttng_trace_chunk_status chunk_status;
445 uint64_t chunk_id;
446
447 assert(trace_chunk);
448 chunk_status = lttng_trace_chunk_get_id(trace_chunk,
449 &chunk_id);
450 assert(chunk_status == LTTNG_TRACE_CHUNK_STATUS_OK);
451
2f21a469
JR
452 /* From 2.11 to ...*/
453 ret = relayd_add_stream_2_11(rsock, channel_name, pathname,
b00e554e 454 tracefile_size, tracefile_count,
d2956687 455 chunk_id);
2f21a469 456 }
0f907de1 457
2f21a469
JR
458 if (ret) {
459 ret = -1;
460 goto error;
00e2e675
DG
461 }
462
633d0084 463 /* Waiting for reply */
6151a90f 464 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
00e2e675
DG
465 if (ret < 0) {
466 goto error;
467 }
468
469 /* Back to host bytes order. */
470 reply.handle = be64toh(reply.handle);
471 reply.ret_code = be32toh(reply.ret_code);
472
473 /* Return session id or negative ret code. */
f73fabfd 474 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
475 ret = -1;
476 ERR("Relayd add stream replied error %d", reply.ret_code);
00e2e675
DG
477 } else {
478 /* Success */
479 ret = 0;
480 *stream_id = reply.handle;
481 }
482
77c7c900 483 DBG("Relayd stream added successfully with handle %" PRIu64,
2f21a469 484 reply.handle);
00e2e675
DG
485
486error:
487 return ret;
488}
489
a4baae1b
JD
490/*
491 * Inform the relay that all the streams for the current channel has been sent.
492 *
493 * On success return 0 else return ret_code negative value.
494 */
495int relayd_streams_sent(struct lttcomm_relayd_sock *rsock)
496{
497 int ret;
498 struct lttcomm_relayd_generic_reply reply;
499
500 /* Code flow error. Safety net. */
501 assert(rsock);
502
503 DBG("Relayd sending streams sent.");
504
505 /* This feature was introduced in 2.4, ignore it for earlier versions. */
506 if (rsock->minor < 4) {
507 ret = 0;
508 goto end;
509 }
510
511 /* Send command */
512 ret = send_command(rsock, RELAYD_STREAMS_SENT, NULL, 0, 0);
513 if (ret < 0) {
514 goto error;
515 }
516
517 /* Waiting for reply */
518 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
519 if (ret < 0) {
520 goto error;
521 }
522
523 /* Back to host bytes order. */
524 reply.ret_code = be32toh(reply.ret_code);
525
526 /* Return session id or negative ret code. */
527 if (reply.ret_code != LTTNG_OK) {
528 ret = -1;
529 ERR("Relayd streams sent replied error %d", reply.ret_code);
530 goto error;
531 } else {
532 /* Success */
533 ret = 0;
534 }
535
536 DBG("Relayd streams sent success");
537
538error:
539end:
540 return ret;
541}
542
00e2e675
DG
543/*
544 * Check version numbers on the relayd.
d4519fa3
JD
545 * If major versions are compatible, we assign minor_to_use to the
546 * minor version of the procotol we are going to use for this session.
00e2e675 547 *
67d5aa28
JD
548 * Return 0 if the two daemons are compatible, LTTNG_ERR_RELAYD_VERSION_FAIL
549 * otherwise, or a negative value on network errors.
00e2e675 550 */
6151a90f 551int relayd_version_check(struct lttcomm_relayd_sock *rsock)
00e2e675
DG
552{
553 int ret;
092b6259 554 struct lttcomm_relayd_version msg;
00e2e675
DG
555
556 /* Code flow error. Safety net. */
6151a90f 557 assert(rsock);
00e2e675 558
6151a90f
JD
559 DBG("Relayd version check for major.minor %u.%u", rsock->major,
560 rsock->minor);
00e2e675 561
53efb85a 562 memset(&msg, 0, sizeof(msg));
092b6259 563 /* Prepare network byte order before transmission. */
6151a90f
JD
564 msg.major = htobe32(rsock->major);
565 msg.minor = htobe32(rsock->minor);
092b6259 566
00e2e675 567 /* Send command */
6151a90f 568 ret = send_command(rsock, RELAYD_VERSION, (void *) &msg, sizeof(msg), 0);
00e2e675
DG
569 if (ret < 0) {
570 goto error;
571 }
572
20275fe8 573 /* Receive response */
6151a90f 574 ret = recv_reply(rsock, (void *) &msg, sizeof(msg));
00e2e675
DG
575 if (ret < 0) {
576 goto error;
577 }
578
579 /* Set back to host bytes order */
092b6259
DG
580 msg.major = be32toh(msg.major);
581 msg.minor = be32toh(msg.minor);
582
583 /*
584 * Only validate the major version. If the other side is higher,
585 * communication is not possible. Only major version equal can talk to each
586 * other. If the minor version differs, the lowest version is used by both
587 * sides.
092b6259 588 */
6151a90f 589 if (msg.major != rsock->major) {
d4519fa3 590 /* Not compatible */
67d5aa28 591 ret = LTTNG_ERR_RELAYD_VERSION_FAIL;
d4519fa3 592 DBG2("Relayd version is NOT compatible. Relayd version %u != %u (us)",
6151a90f 593 msg.major, rsock->major);
092b6259 594 goto error;
00e2e675
DG
595 }
596
092b6259 597 /*
6151a90f
JD
598 * If the relayd's minor version is higher, it will adapt to our version so
599 * we can continue to use the latest relayd communication data structure.
600 * If the received minor version is higher, the relayd should adapt to us.
092b6259 601 */
6151a90f
JD
602 if (rsock->minor > msg.minor) {
603 rsock->minor = msg.minor;
d4519fa3 604 }
092b6259 605
d4519fa3
JD
606 /* Version number compatible */
607 DBG2("Relayd version is compatible, using protocol version %u.%u",
6151a90f 608 rsock->major, rsock->minor);
d4519fa3 609 ret = 0;
00e2e675
DG
610
611error:
612 return ret;
613}
614
00e2e675
DG
615/*
616 * Add stream on the relayd and assign stream handle to the stream_id argument.
617 *
618 * On success return 0 else return ret_code negative value.
619 */
6151a90f 620int relayd_send_metadata(struct lttcomm_relayd_sock *rsock, size_t len)
00e2e675
DG
621{
622 int ret;
623
624 /* Code flow error. Safety net. */
6151a90f 625 assert(rsock);
00e2e675 626
77c7c900 627 DBG("Relayd sending metadata of size %zu", len);
00e2e675
DG
628
629 /* Send command */
6151a90f 630 ret = send_command(rsock, RELAYD_SEND_METADATA, NULL, len, 0);
00e2e675
DG
631 if (ret < 0) {
632 goto error;
633 }
634
635 DBG2("Relayd metadata added successfully");
636
637 /*
638 * After that call, the metadata data MUST be sent to the relayd so the
639 * receive size on the other end matches the len of the metadata packet
633d0084 640 * header. This is why we don't wait for a reply here.
00e2e675
DG
641 */
642
643error:
644 return ret;
645}
646
647/*
6151a90f 648 * Connect to relay daemon with an allocated lttcomm_relayd_sock.
00e2e675 649 */
6151a90f 650int relayd_connect(struct lttcomm_relayd_sock *rsock)
00e2e675
DG
651{
652 /* Code flow error. Safety net. */
6151a90f 653 assert(rsock);
00e2e675 654
f96e4545
MD
655 if (!rsock->sock.ops) {
656 /*
657 * Attempting a connect on a non-initialized socket.
658 */
659 return -ECONNRESET;
660 }
661
00e2e675
DG
662 DBG3("Relayd connect ...");
663
6151a90f 664 return rsock->sock.ops->connect(&rsock->sock);
00e2e675
DG
665}
666
667/*
6151a90f 668 * Close relayd socket with an allocated lttcomm_relayd_sock.
ffe60014
DG
669 *
670 * If no socket operations are found, simply return 0 meaning that everything
671 * is fine. Without operations, the socket can not possibly be opened or used.
672 * This is possible if the socket was allocated but not created. However, the
673 * caller could simply use it to store a valid file descriptor for instance
674 * passed over a Unix socket and call this to cleanup but still without a valid
675 * ops pointer.
676 *
677 * Return the close returned value. On error, a negative value is usually
678 * returned back from close(2).
00e2e675 679 */
6151a90f 680int relayd_close(struct lttcomm_relayd_sock *rsock)
00e2e675 681{
ffe60014
DG
682 int ret;
683
00e2e675 684 /* Code flow error. Safety net. */
6151a90f 685 assert(rsock);
00e2e675 686
ffe60014 687 /* An invalid fd is fine, return success. */
6151a90f 688 if (rsock->sock.fd < 0) {
ffe60014
DG
689 ret = 0;
690 goto end;
691 }
692
6151a90f 693 DBG3("Relayd closing socket %d", rsock->sock.fd);
00e2e675 694
6151a90f
JD
695 if (rsock->sock.ops) {
696 ret = rsock->sock.ops->close(&rsock->sock);
ffe60014
DG
697 } else {
698 /* Default call if no specific ops found. */
6151a90f 699 ret = close(rsock->sock.fd);
ffe60014
DG
700 if (ret < 0) {
701 PERROR("relayd_close default close");
702 }
703 }
f96e4545 704 rsock->sock.fd = -1;
ffe60014
DG
705
706end:
707 return ret;
00e2e675
DG
708}
709
710/*
711 * Send data header structure to the relayd.
712 */
6151a90f 713int relayd_send_data_hdr(struct lttcomm_relayd_sock *rsock,
00e2e675
DG
714 struct lttcomm_relayd_data_hdr *hdr, size_t size)
715{
716 int ret;
717
718 /* Code flow error. Safety net. */
6151a90f 719 assert(rsock);
00e2e675
DG
720 assert(hdr);
721
f96e4545
MD
722 if (rsock->sock.fd < 0) {
723 return -ECONNRESET;
724 }
725
8fd623e0 726 DBG3("Relayd sending data header of size %zu", size);
00e2e675
DG
727
728 /* Again, safety net */
729 if (size == 0) {
730 size = sizeof(struct lttcomm_relayd_data_hdr);
731 }
732
733 /* Only send data header. */
6151a90f 734 ret = rsock->sock.ops->sendmsg(&rsock->sock, hdr, size, 0);
00e2e675 735 if (ret < 0) {
8994307f 736 ret = -errno;
00e2e675
DG
737 goto error;
738 }
739
740 /*
741 * The data MUST be sent right after that command for the receive on the
742 * other end to match the size in the header.
743 */
744
745error:
746 return ret;
747}
173af62f
DG
748
749/*
750 * Send close stream command to the relayd.
751 */
6151a90f 752int relayd_send_close_stream(struct lttcomm_relayd_sock *rsock, uint64_t stream_id,
173af62f
DG
753 uint64_t last_net_seq_num)
754{
755 int ret;
756 struct lttcomm_relayd_close_stream msg;
757 struct lttcomm_relayd_generic_reply reply;
758
759 /* Code flow error. Safety net. */
6151a90f 760 assert(rsock);
173af62f 761
77c7c900 762 DBG("Relayd closing stream id %" PRIu64, stream_id);
173af62f 763
53efb85a 764 memset(&msg, 0, sizeof(msg));
173af62f
DG
765 msg.stream_id = htobe64(stream_id);
766 msg.last_net_seq_num = htobe64(last_net_seq_num);
767
768 /* Send command */
6151a90f 769 ret = send_command(rsock, RELAYD_CLOSE_STREAM, (void *) &msg, sizeof(msg), 0);
173af62f
DG
770 if (ret < 0) {
771 goto error;
772 }
773
20275fe8 774 /* Receive response */
6151a90f 775 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
173af62f
DG
776 if (ret < 0) {
777 goto error;
778 }
779
780 reply.ret_code = be32toh(reply.ret_code);
781
782 /* Return session id or negative ret code. */
f73fabfd 783 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
784 ret = -1;
785 ERR("Relayd close stream replied error %d", reply.ret_code);
173af62f
DG
786 } else {
787 /* Success */
788 ret = 0;
789 }
790
77c7c900 791 DBG("Relayd close stream id %" PRIu64 " successfully", stream_id);
173af62f
DG
792
793error:
794 return ret;
795}
c8f59ee5
DG
796
797/*
798 * Check for data availability for a given stream id.
799 *
6d805429 800 * Return 0 if NOT pending, 1 if so and a negative value on error.
c8f59ee5 801 */
6151a90f 802int relayd_data_pending(struct lttcomm_relayd_sock *rsock, uint64_t stream_id,
c8f59ee5
DG
803 uint64_t last_net_seq_num)
804{
805 int ret;
6d805429 806 struct lttcomm_relayd_data_pending msg;
c8f59ee5
DG
807 struct lttcomm_relayd_generic_reply reply;
808
809 /* Code flow error. Safety net. */
6151a90f 810 assert(rsock);
c8f59ee5 811
6d805429 812 DBG("Relayd data pending for stream id %" PRIu64, stream_id);
c8f59ee5 813
53efb85a 814 memset(&msg, 0, sizeof(msg));
c8f59ee5
DG
815 msg.stream_id = htobe64(stream_id);
816 msg.last_net_seq_num = htobe64(last_net_seq_num);
817
818 /* Send command */
6151a90f 819 ret = send_command(rsock, RELAYD_DATA_PENDING, (void *) &msg,
c8f59ee5
DG
820 sizeof(msg), 0);
821 if (ret < 0) {
822 goto error;
823 }
824
20275fe8 825 /* Receive response */
6151a90f 826 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
c8f59ee5
DG
827 if (ret < 0) {
828 goto error;
829 }
830
831 reply.ret_code = be32toh(reply.ret_code);
832
833 /* Return session id or negative ret code. */
834 if (reply.ret_code >= LTTNG_OK) {
bb63afd9 835 ERR("Relayd data pending replied error %d", reply.ret_code);
c8f59ee5
DG
836 }
837
838 /* At this point, the ret code is either 1 or 0 */
839 ret = reply.ret_code;
840
6d805429 841 DBG("Relayd data is %s pending for stream id %" PRIu64,
9dd26bb9 842 ret == 1 ? "" : "NOT", stream_id);
c8f59ee5
DG
843
844error:
845 return ret;
846}
847
848/*
849 * Check on the relayd side for a quiescent state on the control socket.
850 */
6151a90f 851int relayd_quiescent_control(struct lttcomm_relayd_sock *rsock,
ad7051c0 852 uint64_t metadata_stream_id)
c8f59ee5
DG
853{
854 int ret;
ad7051c0 855 struct lttcomm_relayd_quiescent_control msg;
c8f59ee5
DG
856 struct lttcomm_relayd_generic_reply reply;
857
858 /* Code flow error. Safety net. */
6151a90f 859 assert(rsock);
c8f59ee5
DG
860
861 DBG("Relayd checking quiescent control state");
862
53efb85a 863 memset(&msg, 0, sizeof(msg));
ad7051c0
DG
864 msg.stream_id = htobe64(metadata_stream_id);
865
c8f59ee5 866 /* Send command */
6151a90f 867 ret = send_command(rsock, RELAYD_QUIESCENT_CONTROL, &msg, sizeof(msg), 0);
c8f59ee5
DG
868 if (ret < 0) {
869 goto error;
870 }
871
20275fe8 872 /* Receive response */
6151a90f 873 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
c8f59ee5
DG
874 if (ret < 0) {
875 goto error;
876 }
877
878 reply.ret_code = be32toh(reply.ret_code);
879
880 /* Return session id or negative ret code. */
881 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
882 ret = -1;
883 ERR("Relayd quiescent control replied error %d", reply.ret_code);
c8f59ee5
DG
884 goto error;
885 }
886
887 /* Control socket is quiescent */
6d805429 888 return 0;
c8f59ee5
DG
889
890error:
891 return ret;
892}
f7079f67
DG
893
894/*
895 * Begin a data pending command for a specific session id.
896 */
6151a90f 897int relayd_begin_data_pending(struct lttcomm_relayd_sock *rsock, uint64_t id)
f7079f67
DG
898{
899 int ret;
900 struct lttcomm_relayd_begin_data_pending msg;
901 struct lttcomm_relayd_generic_reply reply;
902
903 /* Code flow error. Safety net. */
6151a90f 904 assert(rsock);
f7079f67
DG
905
906 DBG("Relayd begin data pending");
907
53efb85a 908 memset(&msg, 0, sizeof(msg));
f7079f67
DG
909 msg.session_id = htobe64(id);
910
911 /* Send command */
6151a90f 912 ret = send_command(rsock, RELAYD_BEGIN_DATA_PENDING, &msg, sizeof(msg), 0);
f7079f67
DG
913 if (ret < 0) {
914 goto error;
915 }
916
20275fe8 917 /* Receive response */
6151a90f 918 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
f7079f67
DG
919 if (ret < 0) {
920 goto error;
921 }
922
923 reply.ret_code = be32toh(reply.ret_code);
924
925 /* Return session id or negative ret code. */
926 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
927 ret = -1;
928 ERR("Relayd begin data pending replied error %d", reply.ret_code);
f7079f67
DG
929 goto error;
930 }
931
932 return 0;
933
934error:
935 return ret;
936}
937
938/*
939 * End a data pending command for a specific session id.
940 *
941 * Return 0 on success and set is_data_inflight to 0 if no data is being
942 * streamed or 1 if it is the case.
943 */
6151a90f 944int relayd_end_data_pending(struct lttcomm_relayd_sock *rsock, uint64_t id,
f7079f67
DG
945 unsigned int *is_data_inflight)
946{
af6c30b5 947 int ret, recv_ret;
f7079f67
DG
948 struct lttcomm_relayd_end_data_pending msg;
949 struct lttcomm_relayd_generic_reply reply;
950
951 /* Code flow error. Safety net. */
6151a90f 952 assert(rsock);
f7079f67
DG
953
954 DBG("Relayd end data pending");
955
53efb85a 956 memset(&msg, 0, sizeof(msg));
f7079f67
DG
957 msg.session_id = htobe64(id);
958
959 /* Send command */
6151a90f 960 ret = send_command(rsock, RELAYD_END_DATA_PENDING, &msg, sizeof(msg), 0);
f7079f67
DG
961 if (ret < 0) {
962 goto error;
963 }
964
20275fe8 965 /* Receive response */
6151a90f 966 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
f7079f67
DG
967 if (ret < 0) {
968 goto error;
969 }
970
af6c30b5
DG
971 recv_ret = be32toh(reply.ret_code);
972 if (recv_ret < 0) {
973 ret = recv_ret;
f7079f67
DG
974 goto error;
975 }
976
af6c30b5 977 *is_data_inflight = recv_ret;
f7079f67 978
af6c30b5 979 DBG("Relayd end data pending is data inflight: %d", recv_ret);
f7079f67
DG
980
981 return 0;
982
983error:
984 return ret;
985}
1c20f0e2
JD
986
987/*
988 * Send index to the relayd.
989 */
990int relayd_send_index(struct lttcomm_relayd_sock *rsock,
50adc264 991 struct ctf_packet_index *index, uint64_t relay_stream_id,
1c20f0e2
JD
992 uint64_t net_seq_num)
993{
994 int ret;
995 struct lttcomm_relayd_index msg;
996 struct lttcomm_relayd_generic_reply reply;
997
998 /* Code flow error. Safety net. */
999 assert(rsock);
1000
1001 if (rsock->minor < 4) {
1002 DBG("Not sending indexes before protocol 2.4");
1003 ret = 0;
1004 goto error;
1005 }
1006
1007 DBG("Relayd sending index for stream ID %" PRIu64, relay_stream_id);
1008
53efb85a 1009 memset(&msg, 0, sizeof(msg));
1c20f0e2
JD
1010 msg.relay_stream_id = htobe64(relay_stream_id);
1011 msg.net_seq_num = htobe64(net_seq_num);
1012
1013 /* The index is already in big endian. */
1014 msg.packet_size = index->packet_size;
1015 msg.content_size = index->content_size;
1016 msg.timestamp_begin = index->timestamp_begin;
1017 msg.timestamp_end = index->timestamp_end;
1018 msg.events_discarded = index->events_discarded;
1019 msg.stream_id = index->stream_id;
1020
234cd636
JD
1021 if (rsock->minor >= 8) {
1022 msg.stream_instance_id = index->stream_instance_id;
1023 msg.packet_seq_num = index->packet_seq_num;
1024 }
1025
1c20f0e2 1026 /* Send command */
f8f3885c
MD
1027 ret = send_command(rsock, RELAYD_SEND_INDEX, &msg,
1028 lttcomm_relayd_index_len(lttng_to_index_major(rsock->major,
1029 rsock->minor),
1030 lttng_to_index_minor(rsock->major, rsock->minor)),
1031 0);
1c20f0e2
JD
1032 if (ret < 0) {
1033 goto error;
1034 }
1035
1036 /* Receive response */
1037 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
1038 if (ret < 0) {
1039 goto error;
1040 }
1041
1042 reply.ret_code = be32toh(reply.ret_code);
1043
1044 /* Return session id or negative ret code. */
1045 if (reply.ret_code != LTTNG_OK) {
1046 ret = -1;
1047 ERR("Relayd send index replied error %d", reply.ret_code);
1048 } else {
1049 /* Success */
1050 ret = 0;
1051 }
1052
1053error:
1054 return ret;
1055}
93ec662e
JD
1056
1057/*
1058 * Ask the relay to reset the metadata trace file (regeneration).
1059 */
1060int relayd_reset_metadata(struct lttcomm_relayd_sock *rsock,
1061 uint64_t stream_id, uint64_t version)
1062{
1063 int ret;
1064 struct lttcomm_relayd_reset_metadata msg;
1065 struct lttcomm_relayd_generic_reply reply;
1066
1067 /* Code flow error. Safety net. */
1068 assert(rsock);
1069
1070 /* Should have been prevented by the sessiond. */
1071 if (rsock->minor < 8) {
1072 ERR("Metadata regeneration unsupported before 2.8");
1073 ret = -1;
1074 goto error;
1075 }
1076
1077 DBG("Relayd reset metadata stream id %" PRIu64, stream_id);
1078
1079 memset(&msg, 0, sizeof(msg));
1080 msg.stream_id = htobe64(stream_id);
1081 msg.version = htobe64(version);
1082
1083 /* Send command */
1084 ret = send_command(rsock, RELAYD_RESET_METADATA, (void *) &msg, sizeof(msg), 0);
1085 if (ret < 0) {
1086 goto error;
1087 }
1088
1089 /* Receive response */
1090 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
1091 if (ret < 0) {
1092 goto error;
1093 }
1094
1095 reply.ret_code = be32toh(reply.ret_code);
1096
1097 /* Return session id or negative ret code. */
1098 if (reply.ret_code != LTTNG_OK) {
1099 ret = -1;
1100 ERR("Relayd reset metadata replied error %d", reply.ret_code);
1101 } else {
1102 /* Success */
1103 ret = 0;
1104 }
1105
1106 DBG("Relayd reset metadata stream id %" PRIu64 " successfully", stream_id);
1107
1108error:
1109 return ret;
1110}
a1ae2ea5 1111
d73bf3d7 1112int relayd_rotate_stream(struct lttcomm_relayd_sock *rsock, uint64_t stream_id,
d2956687 1113 uint64_t new_chunk_id, uint64_t seq_num)
d73bf3d7
JD
1114{
1115 int ret;
1116 struct lttcomm_relayd_rotate_stream *msg = NULL;
1117 struct lttcomm_relayd_generic_reply reply;
1118 size_t len;
1119 int msg_len;
d2956687
JG
1120 /* FIXME */
1121 char *new_pathname = NULL;
d73bf3d7
JD
1122
1123 /* Code flow error. Safety net. */
1124 assert(rsock);
1125
1126 DBG("Sending rotate stream id %" PRIu64 " command to relayd", stream_id);
1127
1128 /* Account for the trailing NULL. */
27283937 1129 len = lttng_strnlen(new_pathname, LTTNG_PATH_MAX) + 1;
d73bf3d7
JD
1130 if (len > LTTNG_PATH_MAX) {
1131 ERR("Path used in relayd rotate stream command exceeds the maximal allowed length");
1132 ret = -1;
1133 goto error;
1134 }
1135
1136 msg_len = offsetof(struct lttcomm_relayd_rotate_stream, new_pathname) + len;
1137 msg = zmalloc(msg_len);
1138 if (!msg) {
1139 PERROR("Failed to allocate relayd rotate stream command of %d bytes",
1140 msg_len);
1141 ret = -1;
1142 goto error;
1143 }
1144
1145 if (lttng_strncpy(msg->new_pathname, new_pathname, len)) {
1146 ret = -1;
1147 ERR("Failed to copy relayd rotate stream command's new path name");
1148 goto error;
1149 }
1150
1151 msg->pathname_length = htobe32(len);
1152 msg->stream_id = htobe64(stream_id);
1153 msg->new_chunk_id = htobe64(new_chunk_id);
1154 /*
1155 * The seq_num is invalid for metadata streams, but it is ignored on
1156 * the relay.
1157 */
1158 msg->rotate_at_seq_num = htobe64(seq_num);
1159
1160 /* Send command. */
1161 ret = send_command(rsock, RELAYD_ROTATE_STREAM, (void *) msg, msg_len, 0);
1162 if (ret < 0) {
1163 ERR("Send rotate command");
1164 goto error;
1165 }
1166
1167 /* Receive response. */
1168 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
1169 if (ret < 0) {
1170 ERR("Receive rotate reply");
1171 goto error;
1172 }
1173
1174 reply.ret_code = be32toh(reply.ret_code);
1175
1176 /* Return session id or negative ret code. */
1177 if (reply.ret_code != LTTNG_OK) {
1178 ret = -1;
1179 ERR("Relayd rotate stream replied error %d", reply.ret_code);
1180 } else {
1181 /* Success. */
1182 ret = 0;
1183 DBG("Relayd rotated stream id %" PRIu64 " successfully", stream_id);
1184 }
1185
1186error:
1187 free(msg);
1188 return ret;
1189}
This page took 0.099399 seconds and 4 git commands to generate.