Send ust and kernel domain directory handle to consumer
[lttng-tools.git] / src / common / relayd / relayd.c
CommitLineData
00e2e675
DG
1/*
2 * Copyright (C) 2012 - David Goulet <dgoulet@efficios.com>
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License, version 2 only, as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 51
15 * Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
16 */
17
6c1c0768 18#define _LGPL_SOURCE
00e2e675
DG
19#include <assert.h>
20#include <stdio.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/stat.h>
77c7c900 24#include <inttypes.h>
00e2e675
DG
25
26#include <common/common.h>
27#include <common/defaults.h>
f263b7fd 28#include <common/compat/endian.h>
27283937 29#include <common/compat/string.h>
00e2e675 30#include <common/sessiond-comm/relayd.h>
50adc264 31#include <common/index/ctf-index.h>
d2956687 32#include <common/trace-chunk.h>
c35f9726 33#include <common/string-utils/format.h>
00e2e675
DG
34
35#include "relayd.h"
36
070b6a86
MD
37static
38bool relayd_supports_chunks(const struct lttcomm_relayd_sock *sock)
39{
40 if (sock->major > 2) {
41 return true;
42 } else if (sock->major == 2 && sock->minor >= 11) {
43 return true;
44 }
45 return false;
46}
47
00e2e675
DG
48/*
49 * Send command. Fill up the header and append the data.
50 */
6151a90f 51static int send_command(struct lttcomm_relayd_sock *rsock,
76b9afaa 52 enum lttcomm_relayd_command cmd, const void *data, size_t size,
00e2e675
DG
53 int flags)
54{
55 int ret;
56 struct lttcomm_relayd_hdr header;
57 char *buf;
58 uint64_t buf_size = sizeof(header);
59
f96e4545
MD
60 if (rsock->sock.fd < 0) {
61 return -ECONNRESET;
62 }
63
00e2e675
DG
64 if (data) {
65 buf_size += size;
66 }
67
68 buf = zmalloc(buf_size);
69 if (buf == NULL) {
70 PERROR("zmalloc relayd send command buf");
71 ret = -1;
72 goto alloc_error;
73 }
74
53efb85a 75 memset(&header, 0, sizeof(header));
00e2e675
DG
76 header.cmd = htobe32(cmd);
77 header.data_size = htobe64(size);
78
79 /* Zeroed for now since not used. */
80 header.cmd_version = 0;
81 header.circuit_id = 0;
82
83 /* Prepare buffer to send. */
84 memcpy(buf, &header, sizeof(header));
85 if (data) {
86 memcpy(buf + sizeof(header), data, size);
87 }
88
06586bbe 89 DBG3("Relayd sending command %d of size %" PRIu64, (int) cmd, buf_size);
6151a90f 90 ret = rsock->sock.ops->sendmsg(&rsock->sock, buf, buf_size, flags);
00e2e675 91 if (ret < 0) {
06586bbe
JG
92 PERROR("Failed to send command %d of size %" PRIu64,
93 (int) cmd, buf_size);
8994307f 94 ret = -errno;
00e2e675
DG
95 goto error;
96 }
00e2e675
DG
97error:
98 free(buf);
99alloc_error:
100 return ret;
101}
102
103/*
104 * Receive reply data on socket. This MUST be call after send_command or else
105 * could result in unexpected behavior(s).
106 */
6151a90f 107static int recv_reply(struct lttcomm_relayd_sock *rsock, void *data, size_t size)
00e2e675
DG
108{
109 int ret;
110
f96e4545
MD
111 if (rsock->sock.fd < 0) {
112 return -ECONNRESET;
113 }
114
8fd623e0 115 DBG3("Relayd waiting for reply of size %zu", size);
00e2e675 116
6151a90f 117 ret = rsock->sock.ops->recvmsg(&rsock->sock, data, size, 0);
20275fe8
DG
118 if (ret <= 0 || ret != size) {
119 if (ret == 0) {
120 /* Orderly shutdown. */
6151a90f 121 DBG("Socket %d has performed an orderly shutdown", rsock->sock.fd);
20275fe8 122 } else {
8fd623e0 123 DBG("Receiving reply failed on sock %d for size %zu with ret %d",
6151a90f 124 rsock->sock.fd, size, ret);
20275fe8
DG
125 }
126 /* Always return -1 here and the caller can use errno. */
127 ret = -1;
00e2e675
DG
128 goto error;
129 }
130
131error:
132 return ret;
133}
134
d3e2ba59 135/*
6fa5fe7c
MD
136 * Starting from 2.11, RELAYD_CREATE_SESSION payload (session_name,
137 * hostname, and base_path) have no length restriction on the sender side.
f86f6389
JR
138 * Length for both payloads is stored in the msg struct. A new dynamic size
139 * payload size is introduced.
140 */
141static int relayd_create_session_2_11(struct lttcomm_relayd_sock *rsock,
fb9a95c4 142 const char *session_name, const char *hostname,
6fa5fe7c
MD
143 const char *base_path, int session_live_timer,
144 unsigned int snapshot, uint64_t sessiond_session_id,
145 const lttng_uuid sessiond_uuid, const uint64_t *current_chunk_id,
ecd1a12f
MD
146 time_t creation_time, bool session_name_contains_creation_time,
147 struct lttcomm_relayd_create_session_reply_2_11 *reply,
148 char *output_path)
f86f6389
JR
149{
150 int ret;
151 struct lttcomm_relayd_create_session_2_11 *msg = NULL;
152 size_t session_name_len;
153 size_t hostname_len;
6fa5fe7c 154 size_t base_path_len;
f86f6389 155 size_t msg_length;
6fa5fe7c 156 char *dst;
f86f6389 157
46ef2188
MD
158 if (!base_path) {
159 base_path = "";
160 }
161 /* The three names are sent with a '\0' delimiter between them. */
f86f6389
JR
162 session_name_len = strlen(session_name) + 1;
163 hostname_len = strlen(hostname) + 1;
17e736a5 164 base_path_len = strlen(base_path) + 1;
f86f6389 165
6fa5fe7c 166 msg_length = sizeof(*msg) + session_name_len + hostname_len + base_path_len;
f86f6389
JR
167 msg = zmalloc(msg_length);
168 if (!msg) {
169 PERROR("zmalloc create_session_2_11 command message");
170 ret = -1;
171 goto error;
172 }
173
174 assert(session_name_len <= UINT32_MAX);
175 msg->session_name_len = htobe32(session_name_len);
176
177 assert(hostname_len <= UINT32_MAX);
178 msg->hostname_len = htobe32(hostname_len);
179
6fa5fe7c
MD
180 assert(base_path_len <= UINT32_MAX);
181 msg->base_path_len = htobe32(base_path_len);
182
183 dst = msg->names;
184 if (lttng_strncpy(dst, session_name, session_name_len)) {
185 ret = -1;
186 goto error;
187 }
188 dst += session_name_len;
189 if (lttng_strncpy(dst, hostname, hostname_len)) {
f86f6389
JR
190 ret = -1;
191 goto error;
192 }
6fa5fe7c 193 dst += hostname_len;
36f9f13b 194 if (lttng_strncpy(dst, base_path, base_path_len)) {
f86f6389
JR
195 ret = -1;
196 goto error;
197 }
198
199 msg->live_timer = htobe32(session_live_timer);
200 msg->snapshot = !!snapshot;
201
658f12fa
JG
202 lttng_uuid_copy(msg->sessiond_uuid, sessiond_uuid);
203 msg->session_id = htobe64(sessiond_session_id);
46ef2188 204 msg->session_name_contains_creation_time = session_name_contains_creation_time;
f39bd140
JG
205 if (current_chunk_id) {
206 LTTNG_OPTIONAL_SET(&msg->current_chunk_id,
207 htobe64(*current_chunk_id));
208 }
209
db1da059
JG
210 msg->creation_time = htobe64((uint64_t) creation_time);
211
f86f6389
JR
212 /* Send command */
213 ret = send_command(rsock, RELAYD_CREATE_SESSION, msg, msg_length, 0);
214 if (ret < 0) {
215 goto error;
216 }
ecd1a12f
MD
217 /* Receive response */
218 ret = recv_reply(rsock, reply, sizeof(*reply));
219 if (ret < 0) {
220 goto error;
221 }
222 reply->generic.session_id = be64toh(reply->generic.session_id);
223 reply->generic.ret_code = be32toh(reply->generic.ret_code);
224 reply->output_path_length = be32toh(reply->output_path_length);
225 if (reply->output_path_length >= LTTNG_PATH_MAX) {
226 ERR("Invalid session output path length in reply (%" PRIu32 " bytes) exceeds maximal allowed length (%d bytes)",
227 reply->output_path_length, LTTNG_PATH_MAX);
228 ret = -1;
229 goto error;
230 }
231 ret = recv_reply(rsock, output_path, reply->output_path_length);
232 if (ret < 0) {
233 goto error;
234 }
f86f6389
JR
235error:
236 free(msg);
237 return ret;
238}
239/*
240 * From 2.4 to 2.10, RELAYD_CREATE_SESSION takes additional parameters to
d3e2ba59
JD
241 * support the live reading capability.
242 */
243static int relayd_create_session_2_4(struct lttcomm_relayd_sock *rsock,
fb9a95c4 244 const char *session_name, const char *hostname,
ecd1a12f
MD
245 int session_live_timer, unsigned int snapshot,
246 struct lttcomm_relayd_status_session *reply)
d3e2ba59
JD
247{
248 int ret;
249 struct lttcomm_relayd_create_session_2_4 msg;
250
3a13ffd5
MD
251 if (lttng_strncpy(msg.session_name, session_name,
252 sizeof(msg.session_name))) {
246777db
MD
253 ret = -1;
254 goto error;
255 }
3a13ffd5 256 if (lttng_strncpy(msg.hostname, hostname, sizeof(msg.hostname))) {
246777db
MD
257 ret = -1;
258 goto error;
259 }
d3e2ba59 260 msg.live_timer = htobe32(session_live_timer);
7d2f7452 261 msg.snapshot = htobe32(snapshot);
d3e2ba59
JD
262
263 /* Send command */
264 ret = send_command(rsock, RELAYD_CREATE_SESSION, &msg, sizeof(msg), 0);
265 if (ret < 0) {
266 goto error;
267 }
268
ecd1a12f
MD
269 /* Receive response */
270 ret = recv_reply(rsock, reply, sizeof(*reply));
271 if (ret < 0) {
272 goto error;
273 }
274 reply->session_id = be64toh(reply->session_id);
275 reply->ret_code = be32toh(reply->ret_code);
d3e2ba59
JD
276error:
277 return ret;
278}
279
280/*
281 * RELAYD_CREATE_SESSION from 2.1 to 2.3.
282 */
ecd1a12f
MD
283static int relayd_create_session_2_1(struct lttcomm_relayd_sock *rsock,
284 struct lttcomm_relayd_status_session *reply)
d3e2ba59
JD
285{
286 int ret;
287
288 /* Send command */
289 ret = send_command(rsock, RELAYD_CREATE_SESSION, NULL, 0, 0);
290 if (ret < 0) {
291 goto error;
292 }
293
ecd1a12f
MD
294 /* Receive response */
295 ret = recv_reply(rsock, reply, sizeof(*reply));
296 if (ret < 0) {
297 goto error;
298 }
299 reply->session_id = be64toh(reply->session_id);
300 reply->ret_code = be32toh(reply->ret_code);
d3e2ba59
JD
301error:
302 return ret;
303}
304
c5b6f4f0
DG
305/*
306 * Send a RELAYD_CREATE_SESSION command to the relayd with the given socket and
307 * set session_id of the relayd if we have a successful reply from the relayd.
308 *
20275fe8
DG
309 * On success, return 0 else a negative value which is either an errno error or
310 * a lttng error code from the relayd.
c5b6f4f0 311 */
fb9a95c4
JG
312int relayd_create_session(struct lttcomm_relayd_sock *rsock,
313 uint64_t *relayd_session_id,
314 const char *session_name, const char *hostname,
6fa5fe7c 315 const char *base_path, int session_live_timer,
658f12fa 316 unsigned int snapshot, uint64_t sessiond_session_id,
f39bd140 317 const lttng_uuid sessiond_uuid,
db1da059 318 const uint64_t *current_chunk_id,
ecd1a12f
MD
319 time_t creation_time, bool session_name_contains_creation_time,
320 char *output_path)
c5b6f4f0
DG
321{
322 int ret;
ecd1a12f 323 struct lttcomm_relayd_create_session_reply_2_11 reply = {};
c5b6f4f0 324
6151a90f 325 assert(rsock);
658f12fa 326 assert(relayd_session_id);
c5b6f4f0
DG
327
328 DBG("Relayd create session");
329
f86f6389
JR
330 if (rsock->minor < 4) {
331 /* From 2.1 to 2.3 */
ecd1a12f 332 ret = relayd_create_session_2_1(rsock, &reply.generic);
f86f6389
JR
333 } else if (rsock->minor >= 4 && rsock->minor < 11) {
334 /* From 2.4 to 2.10 */
335 ret = relayd_create_session_2_4(rsock, session_name,
ecd1a12f
MD
336 hostname, session_live_timer, snapshot,
337 &reply.generic);
f86f6389
JR
338 } else {
339 /* From 2.11 to ... */
340 ret = relayd_create_session_2_11(rsock, session_name,
6fa5fe7c 341 hostname, base_path, session_live_timer, snapshot,
f39bd140 342 sessiond_session_id, sessiond_uuid,
46ef2188 343 current_chunk_id, creation_time,
ecd1a12f
MD
344 session_name_contains_creation_time,
345 &reply, output_path);
c5b6f4f0
DG
346 }
347
c5b6f4f0
DG
348 if (ret < 0) {
349 goto error;
350 }
351
c5b6f4f0 352 /* Return session id or negative ret code. */
ecd1a12f 353 if (reply.generic.ret_code != LTTNG_OK) {
bb63afd9 354 ret = -1;
ecd1a12f
MD
355 ERR("Relayd create session replied error %d",
356 reply.generic.ret_code);
c5b6f4f0
DG
357 goto error;
358 } else {
359 ret = 0;
ecd1a12f 360 *relayd_session_id = reply.generic.session_id;
c5b6f4f0
DG
361 }
362
ecd1a12f 363 DBG("Relayd session created with id %" PRIu64, reply.generic.session_id);
c5b6f4f0
DG
364
365error:
366 return ret;
367}
368
2f21a469
JR
369static int relayd_add_stream_2_1(struct lttcomm_relayd_sock *rsock,
370 const char *channel_name, const char *pathname)
371{
372 int ret;
373 struct lttcomm_relayd_add_stream msg;
374
375 memset(&msg, 0, sizeof(msg));
376 if (lttng_strncpy(msg.channel_name, channel_name,
377 sizeof(msg.channel_name))) {
378 ret = -1;
379 goto error;
380 }
381
382 if (lttng_strncpy(msg.pathname, pathname,
383 sizeof(msg.pathname))) {
384 ret = -1;
385 goto error;
386 }
387
388 /* Send command */
389 ret = send_command(rsock, RELAYD_ADD_STREAM, (void *) &msg, sizeof(msg), 0);
390 if (ret < 0) {
391 ret = -1;
392 goto error;
393 }
394 ret = 0;
395error:
396 return ret;
397}
398
399static int relayd_add_stream_2_2(struct lttcomm_relayd_sock *rsock,
400 const char *channel_name, const char *pathname,
401 uint64_t tracefile_size, uint64_t tracefile_count)
402{
403 int ret;
404 struct lttcomm_relayd_add_stream_2_2 msg;
405
406 memset(&msg, 0, sizeof(msg));
407 /* Compat with relayd 2.2 to 2.10 */
408 if (lttng_strncpy(msg.channel_name, channel_name,
409 sizeof(msg.channel_name))) {
410 ret = -1;
411 goto error;
412 }
413 if (lttng_strncpy(msg.pathname, pathname,
414 sizeof(msg.pathname))) {
415 ret = -1;
416 goto error;
417 }
418 msg.tracefile_size = htobe64(tracefile_size);
419 msg.tracefile_count = htobe64(tracefile_count);
420
421 /* Send command */
422 ret = send_command(rsock, RELAYD_ADD_STREAM, (void *) &msg, sizeof(msg), 0);
423 if (ret < 0) {
424 goto error;
425 }
426 ret = 0;
427error:
428 return ret;
429}
430
431static int relayd_add_stream_2_11(struct lttcomm_relayd_sock *rsock,
432 const char *channel_name, const char *pathname,
b00e554e
JG
433 uint64_t tracefile_size, uint64_t tracefile_count,
434 uint64_t trace_archive_id)
2f21a469
JR
435{
436 int ret;
437 struct lttcomm_relayd_add_stream_2_11 *msg = NULL;
438 size_t channel_name_len;
439 size_t pathname_len;
440 size_t msg_length;
441
442 /* The two names are sent with a '\0' delimiter between them. */
443 channel_name_len = strlen(channel_name) + 1;
444 pathname_len = strlen(pathname) + 1;
445
446 msg_length = sizeof(*msg) + channel_name_len + pathname_len;
447 msg = zmalloc(msg_length);
448 if (!msg) {
449 PERROR("zmalloc add_stream_2_11 command message");
450 ret = -1;
451 goto error;
452 }
453
454 assert(channel_name_len <= UINT32_MAX);
455 msg->channel_name_len = htobe32(channel_name_len);
456
457 assert(pathname_len <= UINT32_MAX);
458 msg->pathname_len = htobe32(pathname_len);
459
460 if (lttng_strncpy(msg->names, channel_name, channel_name_len)) {
461 ret = -1;
462 goto error;
463 }
464 if (lttng_strncpy(msg->names + channel_name_len, pathname, pathname_len)) {
465 ret = -1;
466 goto error;
467 }
468
469 msg->tracefile_size = htobe64(tracefile_size);
470 msg->tracefile_count = htobe64(tracefile_count);
348a81dc 471 msg->trace_chunk_id = htobe64(trace_archive_id);
2f21a469
JR
472
473 /* Send command */
474 ret = send_command(rsock, RELAYD_ADD_STREAM, (void *) msg, msg_length, 0);
475 if (ret < 0) {
476 goto error;
477 }
478 ret = 0;
479error:
480 free(msg);
481 return ret;
482}
483
00e2e675
DG
484/*
485 * Add stream on the relayd and assign stream handle to the stream_id argument.
486 *
070b6a86
MD
487 * Chunks are not supported by relayd prior to 2.11, but are used to
488 * internally between session daemon and consumer daemon to keep track
489 * of the channel and stream output path.
490 *
00e2e675
DG
491 * On success return 0 else return ret_code negative value.
492 */
6151a90f 493int relayd_add_stream(struct lttcomm_relayd_sock *rsock, const char *channel_name,
5da88b0f 494 const char *domain_name, const char *_pathname, uint64_t *stream_id,
0b50e4b3 495 uint64_t tracefile_size, uint64_t tracefile_count,
d2956687 496 struct lttng_trace_chunk *trace_chunk)
00e2e675
DG
497{
498 int ret;
00e2e675 499 struct lttcomm_relayd_status_stream reply;
5da88b0f
MD
500 char pathname[RELAYD_COMM_LTTNG_PATH_MAX];
501 char *separator;
00e2e675
DG
502
503 /* Code flow error. Safety net. */
6151a90f 504 assert(rsock);
00e2e675 505 assert(channel_name);
5da88b0f
MD
506 assert(domain_name);
507 assert(_pathname);
070b6a86 508 assert(trace_chunk);
00e2e675
DG
509
510 DBG("Relayd adding stream for channel name %s", channel_name);
511
5da88b0f
MD
512 if (_pathname[0] == '\0') {
513 separator = "";
514 } else {
515 separator = "/";
516 }
517 ret = snprintf(pathname, RELAYD_COMM_LTTNG_PATH_MAX, "%s%s%s",
518 domain_name, separator, _pathname);
519 if (ret <= 0 || ret >= RELAYD_COMM_LTTNG_PATH_MAX) {
520 ERR("stream path too long.");
521 ret = -1;
522 goto error;
523 }
524
0f907de1
JD
525 /* Compat with relayd 2.1 */
526 if (rsock->minor == 1) {
2f21a469
JR
527 /* For 2.1 */
528 ret = relayd_add_stream_2_1(rsock, channel_name, pathname);
529
530 } else if (rsock->minor > 1 && rsock->minor < 11) {
531 /* From 2.2 to 2.10 */
532 ret = relayd_add_stream_2_2(rsock, channel_name, pathname,
533 tracefile_size, tracefile_count);
0f907de1 534 } else {
d2956687
JG
535 enum lttng_trace_chunk_status chunk_status;
536 uint64_t chunk_id;
537
d2956687
JG
538 chunk_status = lttng_trace_chunk_get_id(trace_chunk,
539 &chunk_id);
540 assert(chunk_status == LTTNG_TRACE_CHUNK_STATUS_OK);
541
2f21a469
JR
542 /* From 2.11 to ...*/
543 ret = relayd_add_stream_2_11(rsock, channel_name, pathname,
b00e554e 544 tracefile_size, tracefile_count,
d2956687 545 chunk_id);
2f21a469 546 }
0f907de1 547
2f21a469
JR
548 if (ret) {
549 ret = -1;
550 goto error;
00e2e675
DG
551 }
552
633d0084 553 /* Waiting for reply */
6151a90f 554 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
00e2e675
DG
555 if (ret < 0) {
556 goto error;
557 }
558
559 /* Back to host bytes order. */
560 reply.handle = be64toh(reply.handle);
561 reply.ret_code = be32toh(reply.ret_code);
562
563 /* Return session id or negative ret code. */
f73fabfd 564 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
565 ret = -1;
566 ERR("Relayd add stream replied error %d", reply.ret_code);
00e2e675
DG
567 } else {
568 /* Success */
569 ret = 0;
570 *stream_id = reply.handle;
571 }
572
77c7c900 573 DBG("Relayd stream added successfully with handle %" PRIu64,
2f21a469 574 reply.handle);
00e2e675
DG
575
576error:
577 return ret;
578}
579
a4baae1b
JD
580/*
581 * Inform the relay that all the streams for the current channel has been sent.
582 *
583 * On success return 0 else return ret_code negative value.
584 */
585int relayd_streams_sent(struct lttcomm_relayd_sock *rsock)
586{
587 int ret;
588 struct lttcomm_relayd_generic_reply reply;
589
590 /* Code flow error. Safety net. */
591 assert(rsock);
592
593 DBG("Relayd sending streams sent.");
594
595 /* This feature was introduced in 2.4, ignore it for earlier versions. */
596 if (rsock->minor < 4) {
597 ret = 0;
598 goto end;
599 }
600
601 /* Send command */
602 ret = send_command(rsock, RELAYD_STREAMS_SENT, NULL, 0, 0);
603 if (ret < 0) {
604 goto error;
605 }
606
607 /* Waiting for reply */
608 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
609 if (ret < 0) {
610 goto error;
611 }
612
613 /* Back to host bytes order. */
614 reply.ret_code = be32toh(reply.ret_code);
615
616 /* Return session id or negative ret code. */
617 if (reply.ret_code != LTTNG_OK) {
618 ret = -1;
619 ERR("Relayd streams sent replied error %d", reply.ret_code);
620 goto error;
621 } else {
622 /* Success */
623 ret = 0;
624 }
625
626 DBG("Relayd streams sent success");
627
628error:
629end:
630 return ret;
631}
632
00e2e675
DG
633/*
634 * Check version numbers on the relayd.
d4519fa3
JD
635 * If major versions are compatible, we assign minor_to_use to the
636 * minor version of the procotol we are going to use for this session.
00e2e675 637 *
67d5aa28
JD
638 * Return 0 if the two daemons are compatible, LTTNG_ERR_RELAYD_VERSION_FAIL
639 * otherwise, or a negative value on network errors.
00e2e675 640 */
6151a90f 641int relayd_version_check(struct lttcomm_relayd_sock *rsock)
00e2e675
DG
642{
643 int ret;
092b6259 644 struct lttcomm_relayd_version msg;
00e2e675
DG
645
646 /* Code flow error. Safety net. */
6151a90f 647 assert(rsock);
00e2e675 648
6151a90f
JD
649 DBG("Relayd version check for major.minor %u.%u", rsock->major,
650 rsock->minor);
00e2e675 651
53efb85a 652 memset(&msg, 0, sizeof(msg));
092b6259 653 /* Prepare network byte order before transmission. */
6151a90f
JD
654 msg.major = htobe32(rsock->major);
655 msg.minor = htobe32(rsock->minor);
092b6259 656
00e2e675 657 /* Send command */
6151a90f 658 ret = send_command(rsock, RELAYD_VERSION, (void *) &msg, sizeof(msg), 0);
00e2e675
DG
659 if (ret < 0) {
660 goto error;
661 }
662
20275fe8 663 /* Receive response */
6151a90f 664 ret = recv_reply(rsock, (void *) &msg, sizeof(msg));
00e2e675
DG
665 if (ret < 0) {
666 goto error;
667 }
668
669 /* Set back to host bytes order */
092b6259
DG
670 msg.major = be32toh(msg.major);
671 msg.minor = be32toh(msg.minor);
672
673 /*
674 * Only validate the major version. If the other side is higher,
675 * communication is not possible. Only major version equal can talk to each
676 * other. If the minor version differs, the lowest version is used by both
677 * sides.
092b6259 678 */
6151a90f 679 if (msg.major != rsock->major) {
d4519fa3 680 /* Not compatible */
67d5aa28 681 ret = LTTNG_ERR_RELAYD_VERSION_FAIL;
d4519fa3 682 DBG2("Relayd version is NOT compatible. Relayd version %u != %u (us)",
6151a90f 683 msg.major, rsock->major);
092b6259 684 goto error;
00e2e675
DG
685 }
686
092b6259 687 /*
6151a90f
JD
688 * If the relayd's minor version is higher, it will adapt to our version so
689 * we can continue to use the latest relayd communication data structure.
690 * If the received minor version is higher, the relayd should adapt to us.
092b6259 691 */
6151a90f
JD
692 if (rsock->minor > msg.minor) {
693 rsock->minor = msg.minor;
d4519fa3 694 }
092b6259 695
d4519fa3
JD
696 /* Version number compatible */
697 DBG2("Relayd version is compatible, using protocol version %u.%u",
6151a90f 698 rsock->major, rsock->minor);
d4519fa3 699 ret = 0;
00e2e675
DG
700
701error:
702 return ret;
703}
704
00e2e675
DG
705/*
706 * Add stream on the relayd and assign stream handle to the stream_id argument.
707 *
708 * On success return 0 else return ret_code negative value.
709 */
6151a90f 710int relayd_send_metadata(struct lttcomm_relayd_sock *rsock, size_t len)
00e2e675
DG
711{
712 int ret;
713
714 /* Code flow error. Safety net. */
6151a90f 715 assert(rsock);
00e2e675 716
77c7c900 717 DBG("Relayd sending metadata of size %zu", len);
00e2e675
DG
718
719 /* Send command */
6151a90f 720 ret = send_command(rsock, RELAYD_SEND_METADATA, NULL, len, 0);
00e2e675
DG
721 if (ret < 0) {
722 goto error;
723 }
724
725 DBG2("Relayd metadata added successfully");
726
727 /*
728 * After that call, the metadata data MUST be sent to the relayd so the
729 * receive size on the other end matches the len of the metadata packet
633d0084 730 * header. This is why we don't wait for a reply here.
00e2e675
DG
731 */
732
733error:
734 return ret;
735}
736
737/*
6151a90f 738 * Connect to relay daemon with an allocated lttcomm_relayd_sock.
00e2e675 739 */
6151a90f 740int relayd_connect(struct lttcomm_relayd_sock *rsock)
00e2e675
DG
741{
742 /* Code flow error. Safety net. */
6151a90f 743 assert(rsock);
00e2e675 744
f96e4545
MD
745 if (!rsock->sock.ops) {
746 /*
747 * Attempting a connect on a non-initialized socket.
748 */
749 return -ECONNRESET;
750 }
751
00e2e675
DG
752 DBG3("Relayd connect ...");
753
6151a90f 754 return rsock->sock.ops->connect(&rsock->sock);
00e2e675
DG
755}
756
757/*
6151a90f 758 * Close relayd socket with an allocated lttcomm_relayd_sock.
ffe60014
DG
759 *
760 * If no socket operations are found, simply return 0 meaning that everything
761 * is fine. Without operations, the socket can not possibly be opened or used.
762 * This is possible if the socket was allocated but not created. However, the
763 * caller could simply use it to store a valid file descriptor for instance
764 * passed over a Unix socket and call this to cleanup but still without a valid
765 * ops pointer.
766 *
767 * Return the close returned value. On error, a negative value is usually
768 * returned back from close(2).
00e2e675 769 */
6151a90f 770int relayd_close(struct lttcomm_relayd_sock *rsock)
00e2e675 771{
ffe60014
DG
772 int ret;
773
00e2e675 774 /* Code flow error. Safety net. */
6151a90f 775 assert(rsock);
00e2e675 776
ffe60014 777 /* An invalid fd is fine, return success. */
6151a90f 778 if (rsock->sock.fd < 0) {
ffe60014
DG
779 ret = 0;
780 goto end;
781 }
782
6151a90f 783 DBG3("Relayd closing socket %d", rsock->sock.fd);
00e2e675 784
6151a90f
JD
785 if (rsock->sock.ops) {
786 ret = rsock->sock.ops->close(&rsock->sock);
ffe60014
DG
787 } else {
788 /* Default call if no specific ops found. */
6151a90f 789 ret = close(rsock->sock.fd);
ffe60014
DG
790 if (ret < 0) {
791 PERROR("relayd_close default close");
792 }
793 }
f96e4545 794 rsock->sock.fd = -1;
ffe60014
DG
795
796end:
797 return ret;
00e2e675
DG
798}
799
800/*
801 * Send data header structure to the relayd.
802 */
6151a90f 803int relayd_send_data_hdr(struct lttcomm_relayd_sock *rsock,
00e2e675
DG
804 struct lttcomm_relayd_data_hdr *hdr, size_t size)
805{
806 int ret;
807
808 /* Code flow error. Safety net. */
6151a90f 809 assert(rsock);
00e2e675
DG
810 assert(hdr);
811
f96e4545
MD
812 if (rsock->sock.fd < 0) {
813 return -ECONNRESET;
814 }
815
8fd623e0 816 DBG3("Relayd sending data header of size %zu", size);
00e2e675
DG
817
818 /* Again, safety net */
819 if (size == 0) {
820 size = sizeof(struct lttcomm_relayd_data_hdr);
821 }
822
823 /* Only send data header. */
6151a90f 824 ret = rsock->sock.ops->sendmsg(&rsock->sock, hdr, size, 0);
00e2e675 825 if (ret < 0) {
8994307f 826 ret = -errno;
00e2e675
DG
827 goto error;
828 }
829
830 /*
831 * The data MUST be sent right after that command for the receive on the
832 * other end to match the size in the header.
833 */
834
835error:
836 return ret;
837}
173af62f
DG
838
839/*
840 * Send close stream command to the relayd.
841 */
6151a90f 842int relayd_send_close_stream(struct lttcomm_relayd_sock *rsock, uint64_t stream_id,
173af62f
DG
843 uint64_t last_net_seq_num)
844{
845 int ret;
846 struct lttcomm_relayd_close_stream msg;
847 struct lttcomm_relayd_generic_reply reply;
848
849 /* Code flow error. Safety net. */
6151a90f 850 assert(rsock);
173af62f 851
77c7c900 852 DBG("Relayd closing stream id %" PRIu64, stream_id);
173af62f 853
53efb85a 854 memset(&msg, 0, sizeof(msg));
173af62f
DG
855 msg.stream_id = htobe64(stream_id);
856 msg.last_net_seq_num = htobe64(last_net_seq_num);
857
858 /* Send command */
6151a90f 859 ret = send_command(rsock, RELAYD_CLOSE_STREAM, (void *) &msg, sizeof(msg), 0);
173af62f
DG
860 if (ret < 0) {
861 goto error;
862 }
863
20275fe8 864 /* Receive response */
6151a90f 865 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
173af62f
DG
866 if (ret < 0) {
867 goto error;
868 }
869
870 reply.ret_code = be32toh(reply.ret_code);
871
872 /* Return session id or negative ret code. */
f73fabfd 873 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
874 ret = -1;
875 ERR("Relayd close stream replied error %d", reply.ret_code);
173af62f
DG
876 } else {
877 /* Success */
878 ret = 0;
879 }
880
77c7c900 881 DBG("Relayd close stream id %" PRIu64 " successfully", stream_id);
173af62f
DG
882
883error:
884 return ret;
885}
c8f59ee5
DG
886
887/*
888 * Check for data availability for a given stream id.
889 *
6d805429 890 * Return 0 if NOT pending, 1 if so and a negative value on error.
c8f59ee5 891 */
6151a90f 892int relayd_data_pending(struct lttcomm_relayd_sock *rsock, uint64_t stream_id,
c8f59ee5
DG
893 uint64_t last_net_seq_num)
894{
895 int ret;
6d805429 896 struct lttcomm_relayd_data_pending msg;
c8f59ee5
DG
897 struct lttcomm_relayd_generic_reply reply;
898
899 /* Code flow error. Safety net. */
6151a90f 900 assert(rsock);
c8f59ee5 901
6d805429 902 DBG("Relayd data pending for stream id %" PRIu64, stream_id);
c8f59ee5 903
53efb85a 904 memset(&msg, 0, sizeof(msg));
c8f59ee5
DG
905 msg.stream_id = htobe64(stream_id);
906 msg.last_net_seq_num = htobe64(last_net_seq_num);
907
908 /* Send command */
6151a90f 909 ret = send_command(rsock, RELAYD_DATA_PENDING, (void *) &msg,
c8f59ee5
DG
910 sizeof(msg), 0);
911 if (ret < 0) {
912 goto error;
913 }
914
20275fe8 915 /* Receive response */
6151a90f 916 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
c8f59ee5
DG
917 if (ret < 0) {
918 goto error;
919 }
920
921 reply.ret_code = be32toh(reply.ret_code);
922
923 /* Return session id or negative ret code. */
924 if (reply.ret_code >= LTTNG_OK) {
bb63afd9 925 ERR("Relayd data pending replied error %d", reply.ret_code);
c8f59ee5
DG
926 }
927
928 /* At this point, the ret code is either 1 or 0 */
929 ret = reply.ret_code;
930
6d805429 931 DBG("Relayd data is %s pending for stream id %" PRIu64,
9dd26bb9 932 ret == 1 ? "" : "NOT", stream_id);
c8f59ee5
DG
933
934error:
935 return ret;
936}
937
938/*
939 * Check on the relayd side for a quiescent state on the control socket.
940 */
6151a90f 941int relayd_quiescent_control(struct lttcomm_relayd_sock *rsock,
ad7051c0 942 uint64_t metadata_stream_id)
c8f59ee5
DG
943{
944 int ret;
ad7051c0 945 struct lttcomm_relayd_quiescent_control msg;
c8f59ee5
DG
946 struct lttcomm_relayd_generic_reply reply;
947
948 /* Code flow error. Safety net. */
6151a90f 949 assert(rsock);
c8f59ee5
DG
950
951 DBG("Relayd checking quiescent control state");
952
53efb85a 953 memset(&msg, 0, sizeof(msg));
ad7051c0
DG
954 msg.stream_id = htobe64(metadata_stream_id);
955
c8f59ee5 956 /* Send command */
6151a90f 957 ret = send_command(rsock, RELAYD_QUIESCENT_CONTROL, &msg, sizeof(msg), 0);
c8f59ee5
DG
958 if (ret < 0) {
959 goto error;
960 }
961
20275fe8 962 /* Receive response */
6151a90f 963 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
c8f59ee5
DG
964 if (ret < 0) {
965 goto error;
966 }
967
968 reply.ret_code = be32toh(reply.ret_code);
969
970 /* Return session id or negative ret code. */
971 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
972 ret = -1;
973 ERR("Relayd quiescent control replied error %d", reply.ret_code);
c8f59ee5
DG
974 goto error;
975 }
976
977 /* Control socket is quiescent */
6d805429 978 return 0;
c8f59ee5
DG
979
980error:
981 return ret;
982}
f7079f67
DG
983
984/*
985 * Begin a data pending command for a specific session id.
986 */
6151a90f 987int relayd_begin_data_pending(struct lttcomm_relayd_sock *rsock, uint64_t id)
f7079f67
DG
988{
989 int ret;
990 struct lttcomm_relayd_begin_data_pending msg;
991 struct lttcomm_relayd_generic_reply reply;
992
993 /* Code flow error. Safety net. */
6151a90f 994 assert(rsock);
f7079f67
DG
995
996 DBG("Relayd begin data pending");
997
53efb85a 998 memset(&msg, 0, sizeof(msg));
f7079f67
DG
999 msg.session_id = htobe64(id);
1000
1001 /* Send command */
6151a90f 1002 ret = send_command(rsock, RELAYD_BEGIN_DATA_PENDING, &msg, sizeof(msg), 0);
f7079f67
DG
1003 if (ret < 0) {
1004 goto error;
1005 }
1006
20275fe8 1007 /* Receive response */
6151a90f 1008 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
f7079f67
DG
1009 if (ret < 0) {
1010 goto error;
1011 }
1012
1013 reply.ret_code = be32toh(reply.ret_code);
1014
1015 /* Return session id or negative ret code. */
1016 if (reply.ret_code != LTTNG_OK) {
bb63afd9
DG
1017 ret = -1;
1018 ERR("Relayd begin data pending replied error %d", reply.ret_code);
f7079f67
DG
1019 goto error;
1020 }
1021
1022 return 0;
1023
1024error:
1025 return ret;
1026}
1027
1028/*
1029 * End a data pending command for a specific session id.
1030 *
1031 * Return 0 on success and set is_data_inflight to 0 if no data is being
1032 * streamed or 1 if it is the case.
1033 */
6151a90f 1034int relayd_end_data_pending(struct lttcomm_relayd_sock *rsock, uint64_t id,
f7079f67
DG
1035 unsigned int *is_data_inflight)
1036{
af6c30b5 1037 int ret, recv_ret;
f7079f67
DG
1038 struct lttcomm_relayd_end_data_pending msg;
1039 struct lttcomm_relayd_generic_reply reply;
1040
1041 /* Code flow error. Safety net. */
6151a90f 1042 assert(rsock);
f7079f67
DG
1043
1044 DBG("Relayd end data pending");
1045
53efb85a 1046 memset(&msg, 0, sizeof(msg));
f7079f67
DG
1047 msg.session_id = htobe64(id);
1048
1049 /* Send command */
6151a90f 1050 ret = send_command(rsock, RELAYD_END_DATA_PENDING, &msg, sizeof(msg), 0);
f7079f67
DG
1051 if (ret < 0) {
1052 goto error;
1053 }
1054
20275fe8 1055 /* Receive response */
6151a90f 1056 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
f7079f67
DG
1057 if (ret < 0) {
1058 goto error;
1059 }
1060
af6c30b5
DG
1061 recv_ret = be32toh(reply.ret_code);
1062 if (recv_ret < 0) {
1063 ret = recv_ret;
f7079f67
DG
1064 goto error;
1065 }
1066
af6c30b5 1067 *is_data_inflight = recv_ret;
f7079f67 1068
af6c30b5 1069 DBG("Relayd end data pending is data inflight: %d", recv_ret);
f7079f67
DG
1070
1071 return 0;
1072
1073error:
1074 return ret;
1075}
1c20f0e2
JD
1076
1077/*
1078 * Send index to the relayd.
1079 */
1080int relayd_send_index(struct lttcomm_relayd_sock *rsock,
50adc264 1081 struct ctf_packet_index *index, uint64_t relay_stream_id,
1c20f0e2
JD
1082 uint64_t net_seq_num)
1083{
1084 int ret;
1085 struct lttcomm_relayd_index msg;
1086 struct lttcomm_relayd_generic_reply reply;
1087
1088 /* Code flow error. Safety net. */
1089 assert(rsock);
1090
1091 if (rsock->minor < 4) {
1092 DBG("Not sending indexes before protocol 2.4");
1093 ret = 0;
1094 goto error;
1095 }
1096
1097 DBG("Relayd sending index for stream ID %" PRIu64, relay_stream_id);
1098
53efb85a 1099 memset(&msg, 0, sizeof(msg));
1c20f0e2
JD
1100 msg.relay_stream_id = htobe64(relay_stream_id);
1101 msg.net_seq_num = htobe64(net_seq_num);
1102
1103 /* The index is already in big endian. */
1104 msg.packet_size = index->packet_size;
1105 msg.content_size = index->content_size;
1106 msg.timestamp_begin = index->timestamp_begin;
1107 msg.timestamp_end = index->timestamp_end;
1108 msg.events_discarded = index->events_discarded;
1109 msg.stream_id = index->stream_id;
1110
234cd636
JD
1111 if (rsock->minor >= 8) {
1112 msg.stream_instance_id = index->stream_instance_id;
1113 msg.packet_seq_num = index->packet_seq_num;
1114 }
1115
1c20f0e2 1116 /* Send command */
f8f3885c
MD
1117 ret = send_command(rsock, RELAYD_SEND_INDEX, &msg,
1118 lttcomm_relayd_index_len(lttng_to_index_major(rsock->major,
1119 rsock->minor),
1120 lttng_to_index_minor(rsock->major, rsock->minor)),
1121 0);
1c20f0e2
JD
1122 if (ret < 0) {
1123 goto error;
1124 }
1125
1126 /* Receive response */
1127 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
1128 if (ret < 0) {
1129 goto error;
1130 }
1131
1132 reply.ret_code = be32toh(reply.ret_code);
1133
1134 /* Return session id or negative ret code. */
1135 if (reply.ret_code != LTTNG_OK) {
1136 ret = -1;
1137 ERR("Relayd send index replied error %d", reply.ret_code);
1138 } else {
1139 /* Success */
1140 ret = 0;
1141 }
1142
1143error:
1144 return ret;
1145}
93ec662e
JD
1146
1147/*
1148 * Ask the relay to reset the metadata trace file (regeneration).
1149 */
1150int relayd_reset_metadata(struct lttcomm_relayd_sock *rsock,
1151 uint64_t stream_id, uint64_t version)
1152{
1153 int ret;
1154 struct lttcomm_relayd_reset_metadata msg;
1155 struct lttcomm_relayd_generic_reply reply;
1156
1157 /* Code flow error. Safety net. */
1158 assert(rsock);
1159
1160 /* Should have been prevented by the sessiond. */
1161 if (rsock->minor < 8) {
1162 ERR("Metadata regeneration unsupported before 2.8");
1163 ret = -1;
1164 goto error;
1165 }
1166
1167 DBG("Relayd reset metadata stream id %" PRIu64, stream_id);
1168
1169 memset(&msg, 0, sizeof(msg));
1170 msg.stream_id = htobe64(stream_id);
1171 msg.version = htobe64(version);
1172
1173 /* Send command */
1174 ret = send_command(rsock, RELAYD_RESET_METADATA, (void *) &msg, sizeof(msg), 0);
1175 if (ret < 0) {
1176 goto error;
1177 }
1178
1179 /* Receive response */
1180 ret = recv_reply(rsock, (void *) &reply, sizeof(reply));
1181 if (ret < 0) {
1182 goto error;
1183 }
1184
1185 reply.ret_code = be32toh(reply.ret_code);
1186
1187 /* Return session id or negative ret code. */
1188 if (reply.ret_code != LTTNG_OK) {
1189 ret = -1;
1190 ERR("Relayd reset metadata replied error %d", reply.ret_code);
1191 } else {
1192 /* Success */
1193 ret = 0;
1194 }
1195
1196 DBG("Relayd reset metadata stream id %" PRIu64 " successfully", stream_id);
1197
1198error:
1199 return ret;
1200}
a1ae2ea5 1201
c35f9726 1202int relayd_rotate_streams(struct lttcomm_relayd_sock *sock,
ebb29c10 1203 unsigned int stream_count, const uint64_t *new_chunk_id,
c35f9726 1204 const struct relayd_stream_rotation_position *positions)
d73bf3d7
JD
1205{
1206 int ret;
c35f9726
JG
1207 unsigned int i;
1208 struct lttng_dynamic_buffer payload;
1209 struct lttcomm_relayd_generic_reply reply = {};
1210 const struct lttcomm_relayd_rotate_streams msg = {
1211 .stream_count = htobe32((uint32_t) stream_count),
1212 .new_chunk_id = (typeof(msg.new_chunk_id)) {
1213 .is_set = !!new_chunk_id,
1214 .value = htobe64(new_chunk_id ? *new_chunk_id : 0),
1215 },
1216 };
1217 char new_chunk_id_buf[MAX_INT_DEC_LEN(*new_chunk_id)] = {};
1218 const char *new_chunk_id_str;
d73bf3d7 1219
070b6a86
MD
1220 if (!relayd_supports_chunks(sock)) {
1221 DBG("Refusing to rotate remote streams: relayd does not support chunks");
1222 return 0;
1223 }
1224
c35f9726 1225 lttng_dynamic_buffer_init(&payload);
d73bf3d7 1226
c35f9726
JG
1227 /* Code flow error. Safety net. */
1228 assert(sock);
d73bf3d7 1229
c35f9726
JG
1230 if (new_chunk_id) {
1231 ret = snprintf(new_chunk_id_buf, sizeof(new_chunk_id_buf),
1232 "%" PRIu64, *new_chunk_id);
1233 if (ret == -1 || ret >= sizeof(new_chunk_id_buf)) {
1234 new_chunk_id_str = "formatting error";
1235 } else {
1236 new_chunk_id_str = new_chunk_id_buf;
1237 }
1238 } else {
1239 new_chunk_id_str = "none";
d73bf3d7
JD
1240 }
1241
c35f9726
JG
1242 DBG("Preparing \"rotate streams\" command payload: new_chunk_id = %s, stream_count = %u",
1243 new_chunk_id_str, stream_count);
d73bf3d7 1244
c35f9726
JG
1245 ret = lttng_dynamic_buffer_append(&payload, &msg, sizeof(msg));
1246 if (ret) {
1247 ERR("Failed to allocate \"rotate streams\" command payload");
d73bf3d7
JD
1248 goto error;
1249 }
1250
c35f9726
JG
1251 for (i = 0; i < stream_count; i++) {
1252 const struct relayd_stream_rotation_position *position =
1253 &positions[i];
1254 const struct lttcomm_relayd_stream_rotation_position comm_position = {
1255 .stream_id = htobe64(position->stream_id),
1256 .rotate_at_seq_num = htobe64(
1257 position->rotate_at_seq_num),
1258 };
1259
1260 DBG("Rotate stream %" PRIu64 "at sequence number %" PRIu64,
1261 position->stream_id,
1262 position->rotate_at_seq_num);
1263 ret = lttng_dynamic_buffer_append(&payload, &comm_position,
1264 sizeof(comm_position));
1265 if (ret) {
1266 ERR("Failed to allocate \"rotate streams\" command payload");
1267 goto error;
1268 }
1269 }
d73bf3d7
JD
1270
1271 /* Send command. */
c35f9726
JG
1272 ret = send_command(sock, RELAYD_ROTATE_STREAMS, payload.data,
1273 payload.size, 0);
d73bf3d7 1274 if (ret < 0) {
c35f9726 1275 ERR("Failed to send \"rotate stream\" command");
d73bf3d7
JD
1276 goto error;
1277 }
1278
1279 /* Receive response. */
c35f9726 1280 ret = recv_reply(sock, &reply, sizeof(reply));
d73bf3d7 1281 if (ret < 0) {
c35f9726 1282 ERR("Failed to receive \"rotate streams\" command reply");
d73bf3d7
JD
1283 goto error;
1284 }
1285
1286 reply.ret_code = be32toh(reply.ret_code);
d73bf3d7
JD
1287 if (reply.ret_code != LTTNG_OK) {
1288 ret = -1;
c35f9726 1289 ERR("Relayd rotate streams replied error %d", reply.ret_code);
d73bf3d7
JD
1290 } else {
1291 /* Success. */
1292 ret = 0;
c35f9726 1293 DBG("Relayd rotated streams successfully");
d73bf3d7
JD
1294 }
1295
1296error:
c35f9726 1297 lttng_dynamic_buffer_reset(&payload);
d73bf3d7
JD
1298 return ret;
1299}
e5add6d0
JG
1300
1301int relayd_create_trace_chunk(struct lttcomm_relayd_sock *sock,
1302 struct lttng_trace_chunk *chunk)
1303{
1304 int ret = 0;
1305 enum lttng_trace_chunk_status status;
1306 struct lttcomm_relayd_create_trace_chunk msg = {};
1307 struct lttcomm_relayd_generic_reply reply = {};
1308 struct lttng_dynamic_buffer payload;
1309 uint64_t chunk_id;
1310 time_t creation_timestamp;
1311 const char *chunk_name;
1312 size_t chunk_name_length;
913a542b 1313 bool overridden_name;
e5add6d0
JG
1314
1315 lttng_dynamic_buffer_init(&payload);
1316
070b6a86
MD
1317 if (!relayd_supports_chunks(sock)) {
1318 DBG("Refusing to create remote trace chunk: relayd does not support chunks");
1319 goto end;
1320 }
1321
e5add6d0
JG
1322 status = lttng_trace_chunk_get_id(chunk, &chunk_id);
1323 if (status != LTTNG_TRACE_CHUNK_STATUS_OK) {
1324 ret = -1;
1325 goto end;
1326 }
1327
1328 status = lttng_trace_chunk_get_creation_timestamp(
1329 chunk, &creation_timestamp);
1330 if (status != LTTNG_TRACE_CHUNK_STATUS_OK) {
1331 ret = -1;
1332 goto end;
1333 }
1334
1335 status = lttng_trace_chunk_get_name(
913a542b 1336 chunk, &chunk_name, &overridden_name);
e5add6d0
JG
1337 if (status != LTTNG_TRACE_CHUNK_STATUS_OK &&
1338 status != LTTNG_TRACE_CHUNK_STATUS_NONE) {
1339 ret = -1;
1340 goto end;
1341 }
1342
913a542b 1343 chunk_name_length = overridden_name ? (strlen(chunk_name) + 1) : 0;
e5add6d0
JG
1344 msg = (typeof(msg)){
1345 .chunk_id = htobe64(chunk_id),
1346 .creation_timestamp = htobe64((uint64_t) creation_timestamp),
1347 .override_name_length = htobe32((uint32_t) chunk_name_length),
1348 };
1349
1350 ret = lttng_dynamic_buffer_append(&payload, &msg, sizeof(msg));
1351 if (ret) {
1352 goto end;
1353 }
1354 if (chunk_name_length) {
1355 ret = lttng_dynamic_buffer_append(
1356 &payload, chunk_name, chunk_name_length);
1357 if (ret) {
1358 goto end;
1359 }
1360 }
1361
bbc4768c
JG
1362 ret = send_command(sock, RELAYD_CREATE_TRACE_CHUNK, payload.data,
1363 payload.size, 0);
e5add6d0
JG
1364 if (ret < 0) {
1365 ERR("Failed to send trace chunk creation command to relay daemon");
1366 goto end;
1367 }
1368
1369 ret = recv_reply(sock, &reply, sizeof(reply));
1370 if (ret < 0) {
1371 ERR("Failed to receive relay daemon trace chunk creation command reply");
1372 goto end;
1373 }
1374
1375 reply.ret_code = be32toh(reply.ret_code);
1376 if (reply.ret_code != LTTNG_OK) {
1377 ret = -1;
1378 ERR("Relayd trace chunk create replied error %d",
1379 reply.ret_code);
1380 } else {
1381 ret = 0;
1382 DBG("Relayd successfully created trace chunk: chunk_id = %" PRIu64,
1383 chunk_id);
1384 }
1385
1386end:
1387 lttng_dynamic_buffer_reset(&payload);
1388 return ret;
1389}
bbc4768c
JG
1390
1391int relayd_close_trace_chunk(struct lttcomm_relayd_sock *sock,
ecd1a12f
MD
1392 struct lttng_trace_chunk *chunk,
1393 char *path)
bbc4768c
JG
1394{
1395 int ret = 0;
1396 enum lttng_trace_chunk_status status;
1397 struct lttcomm_relayd_close_trace_chunk msg = {};
ecd1a12f 1398 struct lttcomm_relayd_close_trace_chunk_reply reply = {};
bbc4768c
JG
1399 uint64_t chunk_id;
1400 time_t close_timestamp;
1401 LTTNG_OPTIONAL(enum lttng_trace_chunk_command_type) close_command = {};
1402
070b6a86
MD
1403 if (!relayd_supports_chunks(sock)) {
1404 DBG("Refusing to close remote trace chunk: relayd does not support chunks");
1405 goto end;
1406 }
1407
bbc4768c
JG
1408 status = lttng_trace_chunk_get_id(chunk, &chunk_id);
1409 if (status != LTTNG_TRACE_CHUNK_STATUS_OK) {
1410 ERR("Failed to get trace chunk id");
1411 ret = -1;
1412 goto end;
1413 }
1414
1415 status = lttng_trace_chunk_get_close_timestamp(chunk, &close_timestamp);
1416 if (status != LTTNG_TRACE_CHUNK_STATUS_OK) {
1417 ERR("Failed to get trace chunk close timestamp");
1418 ret = -1;
1419 goto end;
1420 }
1421
1422 status = lttng_trace_chunk_get_close_command(chunk,
1423 &close_command.value);
1424 switch (status) {
1425 case LTTNG_TRACE_CHUNK_STATUS_OK:
1426 close_command.is_set = 1;
1427 break;
1428 case LTTNG_TRACE_CHUNK_STATUS_NONE:
1429 break;
1430 default:
1431 ERR("Failed to get trace chunk close command");
1432 ret = -1;
1433 goto end;
1434 }
1435
1436 msg = (typeof(msg)){
1437 .chunk_id = htobe64(chunk_id),
1438 .close_timestamp = htobe64((uint64_t) close_timestamp),
1439 .close_command = {
1440 .value = htobe32((uint32_t) close_command.value),
1441 .is_set = close_command.is_set,
1442 },
1443 };
1444
1445 ret = send_command(sock, RELAYD_CLOSE_TRACE_CHUNK, &msg, sizeof(msg),
1446 0);
1447 if (ret < 0) {
1448 ERR("Failed to send trace chunk close command to relay daemon");
1449 goto end;
1450 }
1451
1452 ret = recv_reply(sock, &reply, sizeof(reply));
1453 if (ret < 0) {
1454 ERR("Failed to receive relay daemon trace chunk close command reply");
1455 goto end;
1456 }
1457
ecd1a12f
MD
1458 reply.path_length = be32toh(reply.path_length);
1459 if (reply.path_length >= LTTNG_PATH_MAX) {
1460 ERR("Chunk path too long");
1461 ret = -1;
1462 goto end;
1463 }
1464
1465 ret = recv_reply(sock, path, reply.path_length);
1466 if (ret < 0) {
1467 ERR("Failed to receive relay daemon trace chunk close command reply");
1468 goto end;
1469 }
1470 if (path[reply.path_length - 1] != '\0') {
1471 ERR("Invalid trace chunk path returned by relay daemon (not null-terminated)");
1472 ret = -1;
1473 goto end;
1474 }
1475
1476 reply.generic.ret_code = be32toh(reply.generic.ret_code);
1477 if (reply.generic.ret_code != LTTNG_OK) {
bbc4768c
JG
1478 ret = -1;
1479 ERR("Relayd trace chunk close replied error %d",
ecd1a12f 1480 reply.generic.ret_code);
bbc4768c
JG
1481 } else {
1482 ret = 0;
1483 DBG("Relayd successfully closed trace chunk: chunk_id = %" PRIu64,
1484 chunk_id);
1485 }
1486end:
1487 return ret;
1488}
c35f9726
JG
1489
1490int relayd_trace_chunk_exists(struct lttcomm_relayd_sock *sock,
1491 uint64_t chunk_id, bool *chunk_exists)
1492{
1493 int ret = 0;
1494 struct lttcomm_relayd_trace_chunk_exists msg = {};
1495 struct lttcomm_relayd_trace_chunk_exists_reply reply = {};
1496
070b6a86
MD
1497 if (!relayd_supports_chunks(sock)) {
1498 DBG("Refusing to check for trace chunk existence: relayd does not support chunks");
caa15afd
JR
1499 /* The chunk will never exist */
1500 *chunk_exists = false;
070b6a86
MD
1501 goto end;
1502 }
1503
c35f9726
JG
1504 msg = (typeof(msg)){
1505 .chunk_id = htobe64(chunk_id),
1506 };
1507
1508 ret = send_command(sock, RELAYD_TRACE_CHUNK_EXISTS, &msg, sizeof(msg),
1509 0);
1510 if (ret < 0) {
1511 ERR("Failed to send trace chunk exists command to relay daemon");
1512 goto end;
1513 }
1514
1515 ret = recv_reply(sock, &reply, sizeof(reply));
1516 if (ret < 0) {
1517 ERR("Failed to receive relay daemon trace chunk close command reply");
1518 goto end;
1519 }
1520
1521 reply.generic.ret_code = be32toh(reply.generic.ret_code);
1522 if (reply.generic.ret_code != LTTNG_OK) {
1523 ret = -1;
1524 ERR("Relayd trace chunk close replied error %d",
1525 reply.generic.ret_code);
1526 } else {
1527 ret = 0;
1528 DBG("Relayd successfully checked trace chunk existence: chunk_id = %" PRIu64
1529 ", exists = %s", chunk_id,
1530 reply.trace_chunk_exists ? "true" : "false");
1531 *chunk_exists = !!reply.trace_chunk_exists;
1532 }
1533end:
1534 return ret;
1535}
This page took 0.119192 seconds and 4 git commands to generate.