Implement snapshot commands in lttng-sessiond
[lttng-tools.git] / src / common / sessiond-comm / sessiond-comm.h
CommitLineData
6e3805e2
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 * Julien Desfossez <julien.desfossez@polymtl.ca>
773168b7 4 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
fac6795d 5 *
d14d33bf
AM
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License, version 2 only,
8 * as published by the Free Software Foundation.
fac6795d 9 *
990570ed
DG
10 * This program is distributed in the hope that it will be useful, but WITHOUT
11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
d14d33bf 12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
990570ed 13 * more details.
fac6795d 14 *
d14d33bf
AM
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
fac6795d
DG
18 */
19
773168b7 20/*
990570ed
DG
21 * This header is meant for liblttng and libust internal use ONLY. These
22 * declarations should NOT be considered stable API.
773168b7 23 */
fac6795d 24
990570ed
DG
25#ifndef _LTTNG_SESSIOND_COMM_H
26#define _LTTNG_SESSIOND_COMM_H
27
d19d9ada 28#define _GNU_SOURCE
fac6795d 29#include <limits.h>
f3ed775e 30#include <lttng/lttng.h>
da3c9ec1 31#include <lttng/snapshot-internal.h>
b17231c6 32#include <common/compat/socket.h>
a4b92340 33#include <common/uri.h>
ce2a9e76 34#include <common/defaults.h>
ffe60014 35#include <common/compat/uuid.h>
5e16da05 36
6364a07a
DG
37#include <arpa/inet.h>
38#include <netinet/in.h>
39#include <sys/un.h>
40
41#include "inet.h"
42#include "inet6.h"
0d37f2bc
DG
43#include "unix.h"
44
fac6795d 45/* Queue size of listen(2) */
f158a754 46#define LTTNG_SESSIOND_COMM_MAX_LISTEN 64
fac6795d 47
990570ed
DG
48/* Maximum number of FDs that can be sent over a Unix socket */
49#define LTTCOMM_MAX_SEND_FDS 4
50
3817e7df
DG
51/*
52 * Get the error code index from 0 since LTTCOMM_OK start at 1000
fac6795d 53 */
f73fabfd 54#define LTTCOMM_ERR_INDEX(code) (code - LTTCOMM_CONSUMERD_COMMAND_SOCK_READY)
fac6795d 55
6abb15de 56enum lttcomm_sessiond_command {
0d0c377a 57 /* Tracer command */
7c9534d6
JD
58 LTTNG_ADD_CONTEXT = 0,
59 LTTNG_CALIBRATE = 1,
60 LTTNG_DISABLE_CHANNEL = 2,
61 LTTNG_DISABLE_EVENT = 3,
62 LTTNG_DISABLE_ALL_EVENT = 4,
63 LTTNG_ENABLE_CHANNEL = 5,
64 LTTNG_ENABLE_EVENT = 6,
65 LTTNG_ENABLE_ALL_EVENT = 7,
0d0c377a 66 /* Session daemon command */
7c9534d6
JD
67 LTTNG_CREATE_SESSION = 8,
68 LTTNG_DESTROY_SESSION = 9,
69 LTTNG_LIST_CHANNELS = 10,
70 LTTNG_LIST_DOMAINS = 11,
71 LTTNG_LIST_EVENTS = 12,
72 LTTNG_LIST_SESSIONS = 13,
73 LTTNG_LIST_TRACEPOINTS = 14,
74 LTTNG_REGISTER_CONSUMER = 15,
75 LTTNG_START_TRACE = 16,
76 LTTNG_STOP_TRACE = 17,
77 LTTNG_LIST_TRACEPOINT_FIELDS = 18,
53a80697 78
de5e9086 79 /* Consumer */
7c9534d6
JD
80 LTTNG_DISABLE_CONSUMER = 19,
81 LTTNG_ENABLE_CONSUMER = 20,
82 LTTNG_SET_CONSUMER_URI = 21,
83 LTTNG_ENABLE_EVENT_WITH_FILTER = 22,
84 LTTNG_HEALTH_CHECK = 23,
85 LTTNG_DATA_PENDING = 24,
da3c9ec1
DG
86 LTTNG_SNAPSHOT_ADD_OUTPUT = 25,
87 LTTNG_SNAPSHOT_DEL_OUTPUT = 26,
88 LTTNG_SNAPSHOT_LIST_OUTPUT = 27,
89 LTTNG_SNAPSHOT_RECORD = 28,
7c9534d6
JD
90};
91
92enum lttcomm_relayd_command {
93 RELAYD_ADD_STREAM = 1,
94 RELAYD_CREATE_SESSION = 2,
95 RELAYD_START_DATA = 3,
96 RELAYD_UPDATE_SYNC_INFO = 4,
97 RELAYD_VERSION = 5,
98 RELAYD_SEND_METADATA = 6,
99 RELAYD_CLOSE_STREAM = 7,
100 RELAYD_DATA_PENDING = 8,
101 RELAYD_QUIESCENT_CONTROL = 9,
102 RELAYD_BEGIN_DATA_PENDING = 10,
103 RELAYD_END_DATA_PENDING = 11,
fac6795d
DG
104};
105
106/*
107 * lttcomm error code.
108 */
109enum lttcomm_return_code {
f73fabfd
DG
110 LTTCOMM_CONSUMERD_COMMAND_SOCK_READY = 1, /* Command socket ready */
111 LTTCOMM_CONSUMERD_SUCCESS_RECV_FD, /* Success on receiving fds */
112 LTTCOMM_CONSUMERD_ERROR_RECV_FD, /* Error on receiving fds */
113 LTTCOMM_CONSUMERD_ERROR_RECV_CMD, /* Error on receiving command */
114 LTTCOMM_CONSUMERD_POLL_ERROR, /* Error in polling thread */
115 LTTCOMM_CONSUMERD_POLL_NVAL, /* Poll on closed fd */
116 LTTCOMM_CONSUMERD_POLL_HUP, /* All fds have hungup */
117 LTTCOMM_CONSUMERD_EXIT_SUCCESS, /* Consumerd exiting normally */
118 LTTCOMM_CONSUMERD_EXIT_FAILURE, /* Consumerd exiting on error */
119 LTTCOMM_CONSUMERD_OUTFD_ERROR, /* Error opening the tracefile */
120 LTTCOMM_CONSUMERD_SPLICE_EBADF, /* EBADF from splice(2) */
121 LTTCOMM_CONSUMERD_SPLICE_EINVAL, /* EINVAL from splice(2) */
122 LTTCOMM_CONSUMERD_SPLICE_ENOMEM, /* ENOMEM from splice(2) */
123 LTTCOMM_CONSUMERD_SPLICE_ESPIPE, /* ESPIPE from splice(2) */
ffe60014 124 LTTCOMM_CONSUMERD_ENOMEM, /* Consumer is out of memory */
d88aee68
DG
125 LTTCOMM_CONSUMERD_ERROR_METADATA, /* Error with metadata. */
126 LTTCOMM_CONSUMERD_FATAL, /* Fatal error. */
80e327fa 127
20fe2104
DG
128 /* MUST be last element */
129 LTTCOMM_NR, /* Last element */
fac6795d
DG
130};
131
de5e9086
DG
132/* lttng socket protocol. */
133enum lttcomm_sock_proto {
134 LTTCOMM_SOCK_UDP,
135 LTTCOMM_SOCK_TCP,
136};
137
138/*
139 * Index in the net_families array below. Please keep in sync!
140 */
141enum lttcomm_sock_domain {
01d0a631
CB
142 LTTCOMM_INET = 0,
143 LTTCOMM_INET6 = 1,
de5e9086
DG
144};
145
331744e3
JD
146enum lttcomm_metadata_command {
147 LTTCOMM_METADATA_REQUEST = 1,
148};
149
150/*
151 * Commands sent from the consumerd to the sessiond to request if new metadata
152 * is available. This message is used to find the per UID _or_ per PID registry
153 * for the channel key. For per UID lookup, the triplet
154 * bits_per_long/uid/session_id is used. On lookup failure, we search for the
155 * per PID registry indexed by session id ignoring the other values.
156 */
157struct lttcomm_metadata_request_msg {
158 unsigned int session_id; /* Tracing session id */
159 uint32_t bits_per_long; /* Consumer ABI */
160 uint32_t uid;
161 uint64_t key; /* Metadata channel key. */
162} LTTNG_PACKED;
163
de5e9086
DG
164struct lttcomm_sockaddr {
165 enum lttcomm_sock_domain type;
166 union {
167 struct sockaddr_in sin;
168 struct sockaddr_in6 sin6;
169 } addr;
fc5e05b7 170} LTTNG_PACKED;
de5e9086
DG
171
172struct lttcomm_sock {
d88aee68 173 int32_t fd;
de5e9086
DG
174 enum lttcomm_sock_proto proto;
175 struct lttcomm_sockaddr sockaddr;
176 const struct lttcomm_proto_ops *ops;
fc5e05b7 177} LTTNG_PACKED;
de5e9086 178
6151a90f
JD
179/*
180 * Relayd sock. Adds the protocol version to use for the communications with
181 * the relayd.
182 */
183struct lttcomm_relayd_sock {
184 struct lttcomm_sock sock;
185 uint32_t major;
186 uint32_t minor;
187} LTTNG_PACKED;
188
de5e9086
DG
189struct lttcomm_net_family {
190 int family;
191 int (*create) (struct lttcomm_sock *sock, int type, int proto);
192};
193
194struct lttcomm_proto_ops {
195 int (*bind) (struct lttcomm_sock *sock);
196 int (*close) (struct lttcomm_sock *sock);
197 int (*connect) (struct lttcomm_sock *sock);
198 struct lttcomm_sock *(*accept) (struct lttcomm_sock *sock);
199 int (*listen) (struct lttcomm_sock *sock, int backlog);
200 ssize_t (*recvmsg) (struct lttcomm_sock *sock, void *buf, size_t len,
201 int flags);
202 ssize_t (*sendmsg) (struct lttcomm_sock *sock, void *buf, size_t len,
203 int flags);
204};
205
fac6795d 206/*
9bda164d 207 * Data structure received from lttng client to session daemon.
fac6795d
DG
208 */
209struct lttcomm_session_msg {
d0b96690 210 uint32_t cmd_type; /* enum lttcomm_sessiond_command */
42abccdb 211 struct lttng_session session;
9f19cc17 212 struct lttng_domain domain;
fac6795d
DG
213 union {
214 struct {
db8870ed 215 char channel_name[LTTNG_SYMBOL_NAME_LEN];
f3ed775e 216 char name[NAME_MAX];
fc5e05b7 217 } LTTNG_PACKED disable;
f3ed775e 218 /* Event data */
fac6795d 219 struct {
db8870ed 220 char channel_name[LTTNG_SYMBOL_NAME_LEN];
f3ed775e 221 struct lttng_event event;
025faf73
DG
222 /* Length of following bytecode for filter. */
223 uint32_t bytecode_len;
fc5e05b7 224 } LTTNG_PACKED enable;
f3ed775e
DG
225 /* Create channel */
226 struct {
227 struct lttng_channel chan;
fc5e05b7 228 } LTTNG_PACKED channel;
d65106b1
DG
229 /* Context */
230 struct {
db8870ed 231 char channel_name[LTTNG_SYMBOL_NAME_LEN];
7d29a247 232 struct lttng_event_context ctx;
fc5e05b7 233 } LTTNG_PACKED context;
d9800920
DG
234 /* Use by register_consumer */
235 struct {
236 char path[PATH_MAX];
fc5e05b7 237 } LTTNG_PACKED reg;
9f19cc17
DG
238 /* List */
239 struct {
db8870ed 240 char channel_name[LTTNG_SYMBOL_NAME_LEN];
fc5e05b7 241 } LTTNG_PACKED list;
d0254c7c 242 struct lttng_calibrate calibrate;
a4b92340 243 /* Used by the set_consumer_url and used by create_session also call */
de5e9086 244 struct {
a4b92340
DG
245 /* Number of lttng_uri following */
246 uint32_t size;
fc5e05b7 247 } LTTNG_PACKED uri;
da3c9ec1
DG
248 struct {
249 struct lttng_snapshot_output output;
250 } LTTNG_PACKED snapshot_output;
251 struct {
252 uint32_t wait;
253 struct lttng_snapshot_output output;
254 } LTTNG_PACKED snapshot_record;
fac6795d 255 } u;
fc5e05b7 256} LTTNG_PACKED;
fac6795d 257
d93c4f1f 258#define LTTNG_FILTER_MAX_LEN 65536
53a80697
MD
259
260/*
261 * Filter bytecode data. The reloc table is located at the end of the
262 * bytecode. It is made of tuples: (uint16_t, var. len. string). It
263 * starts at reloc_table_offset.
264 */
b6bbed5f 265#define LTTNG_FILTER_PADDING 32
53a80697 266struct lttng_filter_bytecode {
d93c4f1f
CB
267 uint32_t len; /* len of data */
268 uint32_t reloc_table_offset;
f3f0db50 269 uint64_t seqnum;
b6bbed5f 270 char padding[LTTNG_FILTER_PADDING];
53a80697 271 char data[0];
fc5e05b7 272} LTTNG_PACKED;
53a80697 273
fac6795d 274/*
5e16da05 275 * Data structure for the response from sessiond to the lttng client.
fac6795d 276 */
5461b305 277struct lttcomm_lttng_msg {
d0b96690
DG
278 uint32_t cmd_type; /* enum lttcomm_sessiond_command */
279 uint32_t ret_code; /* enum lttcomm_return_code */
280 uint32_t pid; /* pid_t */
773168b7 281 uint32_t data_size;
5461b305
DG
282 /* Contains: trace_name + data */
283 char payload[];
fc5e05b7 284} LTTNG_PACKED;
fac6795d 285
da3c9ec1
DG
286struct lttcomm_lttng_output_id {
287 uint32_t id;
288} LTTNG_PACKED;
289
44a5e5eb
DG
290struct lttcomm_health_msg {
291 uint32_t component;
292 uint32_t cmd;
fc5e05b7 293} LTTNG_PACKED;
44a5e5eb
DG
294
295struct lttcomm_health_data {
296 uint32_t ret_code;
fc5e05b7 297} LTTNG_PACKED;
44a5e5eb 298
6e3805e2 299/*
3bd1e081
MD
300 * lttcomm_consumer_msg is the message sent from sessiond to consumerd
301 * to either add a channel, add a stream, update a stream, or stop
302 * operation.
6e3805e2 303 */
3bd1e081
MD
304struct lttcomm_consumer_msg {
305 uint32_t cmd_type; /* enum consumerd_command */
306 union {
307 struct {
d88aee68 308 uint64_t channel_key;
ffe60014
DG
309 uint64_t session_id;
310 char pathname[PATH_MAX];
d88aee68
DG
311 uint32_t uid;
312 uint32_t gid;
313 uint64_t relayd_id;
c30aaa51 314 /* nb_init_streams is the number of streams open initially. */
d88aee68 315 uint32_t nb_init_streams;
de5e9086 316 char name[LTTNG_SYMBOL_NAME_LEN];
ffe60014
DG
317 /* Use splice or mmap to consume this fd */
318 enum lttng_event_output output;
319 int type; /* Per cpu or metadata. */
1624d5b7
JD
320 uint64_t tracefile_size; /* bytes */
321 uint32_t tracefile_count; /* number of tracefiles */
ffe60014 322 } LTTNG_PACKED channel; /* Only used by Kernel. */
3bd1e081 323 struct {
d88aee68
DG
324 uint64_t stream_key;
325 uint64_t channel_key;
326 int32_t cpu; /* On which CPU this stream is assigned. */
6dc3064a
DG
327 /* Tells the consumer if the stream should be or not monitored. */
328 uint32_t no_monitor;
ffe60014 329 } LTTNG_PACKED stream; /* Only used by Kernel. */
de5e9086 330 struct {
d88aee68 331 uint64_t net_index;
de5e9086
DG
332 enum lttng_stream_type type;
333 /* Open socket to the relayd */
6151a90f 334 struct lttcomm_relayd_sock sock;
46e6455f
DG
335 /* Tracing session id associated to the relayd. */
336 uint64_t session_id;
fc5e05b7 337 } LTTNG_PACKED relayd_sock;
173af62f
DG
338 struct {
339 uint64_t net_seq_idx;
fc5e05b7 340 } LTTNG_PACKED destroy_relayd;
53632229
DG
341 struct {
342 uint64_t session_id;
fc5e05b7 343 } LTTNG_PACKED data_pending;
ffe60014 344 struct {
d0b96690
DG
345 uint64_t subbuf_size; /* bytes */
346 uint64_t num_subbuf; /* power of 2 */
d88aee68
DG
347 int32_t overwrite; /* 1: overwrite, 0: discard */
348 uint32_t switch_timer_interval; /* usec */
349 uint32_t read_timer_interval; /* usec */
350 int32_t output; /* splice, mmap */
351 int32_t type; /* metadata or per_cpu */
d0b96690
DG
352 uint64_t session_id; /* Tracing session id */
353 char pathname[PATH_MAX]; /* Channel file path. */
ffe60014 354 char name[LTTNG_SYMBOL_NAME_LEN]; /* Channel name. */
d88aee68
DG
355 uint32_t uid; /* User ID of the session */
356 uint32_t gid; /* Group ID ot the session */
357 uint64_t relayd_id; /* Relayd id if apply. */
358 uint64_t key; /* Unique channel key. */
b6d38284 359 unsigned char uuid[UUID_LEN]; /* uuid for ust tracer. */
7972aab2 360 uint32_t chan_id; /* Channel ID on the tracer side. */
1624d5b7
JD
361 uint64_t tracefile_size; /* bytes */
362 uint32_t tracefile_count; /* number of tracefiles */
ffe60014
DG
363 } LTTNG_PACKED ask_channel;
364 struct {
d88aee68 365 uint64_t key;
ffe60014
DG
366 } LTTNG_PACKED get_channel;
367 struct {
d88aee68 368 uint64_t key;
ffe60014 369 } LTTNG_PACKED destroy_channel;
d88aee68
DG
370 struct {
371 uint64_t key; /* Metadata channel key. */
372 uint64_t target_offset; /* Offset in the consumer */
373 uint64_t len; /* Length of metadata to be received. */
374 } LTTNG_PACKED push_metadata;
375 struct {
376 uint64_t key; /* Metadata channel key. */
377 } LTTNG_PACKED close_metadata;
378 struct {
379 uint64_t key; /* Metadata channel key. */
380 } LTTNG_PACKED setup_metadata;
7972aab2
DG
381 struct {
382 uint64_t key; /* Channel key. */
383 } LTTNG_PACKED flush_channel;
6dc3064a
DG
384 struct {
385 char pathname[PATH_MAX];
386 /* Indicate if the snapshot goes on the relayd or locally. */
387 uint32_t use_relayd;
388 uint32_t metadata; /* This a metadata snapshot. */
389 uint64_t relayd_id; /* Relayd id if apply. */
390 uint64_t key;
391 uint64_t max_size;
392 } LTTNG_PACKED snapshot_channel;
3bd1e081 393 } u;
fc5e05b7 394} LTTNG_PACKED;
6e3805e2 395
f50f23d9
DG
396/*
397 * Status message returned to the sessiond after a received command.
398 */
399struct lttcomm_consumer_status_msg {
400 enum lttng_error_code ret_code;
fc5e05b7 401} LTTNG_PACKED;
f50f23d9 402
ffe60014
DG
403struct lttcomm_consumer_status_channel {
404 enum lttng_error_code ret_code;
d88aee68 405 uint64_t key;
ffe60014
DG
406 unsigned int stream_count;
407} LTTNG_PACKED;
408
74d0b642 409#ifdef HAVE_LIBLTTNG_UST_CTL
3bd1e081 410
9df8df5e 411#include <lttng/ust-abi.h>
6e3805e2 412
3817e7df
DG
413/*
414 * Data structure for the commands sent from sessiond to UST.
415 */
416struct lttcomm_ust_msg {
3817e7df
DG
417 uint32_t handle;
418 uint32_t cmd;
419 union {
3817e7df 420 struct lttng_ust_channel channel;
00a17c97 421 struct lttng_ust_stream stream;
3817e7df
DG
422 struct lttng_ust_event event;
423 struct lttng_ust_context context;
00a17c97 424 struct lttng_ust_tracer_version version;
3817e7df 425 } u;
fc5e05b7 426} LTTNG_PACKED;
3817e7df
DG
427
428/*
429 * Data structure for the response from UST to the session daemon.
430 * cmd_type is sent back in the reply for validation.
431 */
432struct lttcomm_ust_reply {
433 uint32_t handle;
434 uint32_t cmd;
435 uint32_t ret_code; /* enum lttcomm_return_code */
436 uint32_t ret_val; /* return value */
437 union {
2b0bf864
DG
438 struct {
439 uint64_t memory_map_size;
fc5e05b7 440 } LTTNG_PACKED channel;
2b0bf864
DG
441 struct {
442 uint64_t memory_map_size;
fc5e05b7 443 } LTTNG_PACKED stream;
00a17c97 444 struct lttng_ust_tracer_version version;
3817e7df 445 } u;
fc5e05b7 446} LTTNG_PACKED;
3817e7df 447
74d0b642 448#endif /* HAVE_LIBLTTNG_UST_CTL */
3bd1e081 449
fac6795d
DG
450extern const char *lttcomm_get_readable_code(enum lttcomm_return_code code);
451
6364a07a
DG
452extern int lttcomm_init_inet_sockaddr(struct lttcomm_sockaddr *sockaddr,
453 const char *ip, unsigned int port);
454extern int lttcomm_init_inet6_sockaddr(struct lttcomm_sockaddr *sockaddr,
455 const char *ip, unsigned int port);
456
de5e9086
DG
457extern struct lttcomm_sock *lttcomm_alloc_sock(enum lttcomm_sock_proto proto);
458extern int lttcomm_create_sock(struct lttcomm_sock *sock);
459extern struct lttcomm_sock *lttcomm_alloc_sock_from_uri(struct lttng_uri *uri);
460extern void lttcomm_destroy_sock(struct lttcomm_sock *sock);
461extern struct lttcomm_sock *lttcomm_alloc_copy_sock(struct lttcomm_sock *src);
462extern void lttcomm_copy_sock(struct lttcomm_sock *dst,
463 struct lttcomm_sock *src);
6364a07a 464
6151a90f
JD
465/* Relayd socket object. */
466extern struct lttcomm_relayd_sock *lttcomm_alloc_relayd_sock(
467 struct lttng_uri *uri, uint32_t major, uint32_t minor);
468
773168b7 469#endif /* _LTTNG_SESSIOND_COMM_H */
This page took 0.058029 seconds and 4 git commands to generate.