Make code simpler for send buffer header size
[lttng-tools.git] / ltt-sessiond / ltt-sessiond.c
1 /*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version 2
7 * of the License, or (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
17 */
18
19 #define _GNU_SOURCE
20 #include <fcntl.h>
21 #include <getopt.h>
22 #include <grp.h>
23 #include <limits.h>
24 #include <pthread.h>
25 #include <signal.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <sys/ipc.h>
30 #include <sys/shm.h>
31 #include <sys/socket.h>
32 #include <sys/stat.h>
33 #include <sys/types.h>
34 #include <unistd.h>
35
36 #include <urcu/list.h> /* URCU list library (-lurcu) */
37 #include <ust/ustctl.h> /* UST control lib (-lust) */
38 #include <lttng/liblttngctl.h>
39
40 #include "liblttsessiondcomm.h"
41 #include "ltt-sessiond.h"
42 #include "lttngerr.h"
43
44 /* Const values */
45 const char default_home_dir[] = DEFAULT_HOME_DIR;
46 const char default_tracing_group[] = DEFAULT_TRACING_GROUP;
47 const char default_ust_sock_dir[] = DEFAULT_UST_SOCK_DIR;
48 const char default_global_apps_pipe[] = DEFAULT_GLOBAL_APPS_PIPE;
49
50 /* Static functions */
51 static int set_signal_handler(void);
52 static int set_socket_perms(void);
53 static void sighandler(int sig);
54 static void cleanup(void);
55 static void copy_common_data(struct lttcomm_lttng_msg *llm, struct lttcomm_session_msg *lsm);
56 static int check_existing_daemon(void);
57 static int notify_apps(const char* name);
58 static int connect_app(pid_t pid);
59 static int find_app_by_pid(pid_t pid);
60 static int init_daemon_socket(void);
61 static int process_client_msg(int sock, struct lttcomm_session_msg*);
62 static int send_unix_sock(int sock, void *buf, size_t len);
63 static int setup_data_buffer(char **buf, size_t size, struct lttcomm_lttng_msg *llm);
64 static void add_traceable_app(struct ltt_traceable_app *lta);
65 static void del_traceable_app(struct ltt_traceable_app *lta);
66 static void add_session_list(struct ltt_session *ls);
67 static void del_session_list(struct ltt_session *ls);
68
69 /* Command function */
70 static void get_list_apps(pid_t *pids);
71 static void get_list_sessions(struct lttng_session *lt);
72
73 static void *thread_manage_clients(void *data);
74 static void *thread_manage_apps(void *data);
75
76 static int create_session(char *name, uuid_t *session_id);
77 static int destroy_session(uuid_t *uuid);
78
79 static struct ltt_session *find_session_by_uuid(uuid_t session_id);
80 static struct ltt_session *find_session_by_name(char *name);
81
82 /* Variables */
83 const char *progname;
84 const char *opt_tracing_group;
85 static int opt_sig_parent;
86 static int opt_daemon;
87 int opt_verbose;
88 int opt_quiet;
89 static int is_root; /* Set to 1 if the daemon is running as root */
90 static pid_t ppid;
91
92 static char apps_unix_sock_path[PATH_MAX]; /* Global application Unix socket path */
93 static char client_unix_sock_path[PATH_MAX]; /* Global client Unix socket path */
94
95 static int client_socket;
96 static int apps_socket;
97
98 static struct ltt_session *current_session;
99
100 /* Number of element for the list below. */
101 static unsigned int session_count;
102 static unsigned int traceable_app_count;
103
104 /* Init session's list */
105 static struct ltt_session_list ltt_session_list = {
106 .head = CDS_LIST_HEAD_INIT(ltt_session_list.head),
107 };
108
109 /* Init ust traceabl application's list */
110 static struct ltt_traceable_app_list ltt_traceable_app_list = {
111 .head = CDS_LIST_HEAD_INIT(ltt_traceable_app_list.head),
112 };
113
114 /* List mutex */
115 pthread_mutex_t ltt_traceable_app_list_mutex;
116
117 /*
118 * thread_manage_apps
119 *
120 * This thread manage the application socket communication
121 */
122 static void *thread_manage_apps(void *data)
123 {
124 int sock, ret;
125 struct ltt_traceable_app *lta;
126
127 /* TODO: Something more elegant is needed but fine for now */
128 struct {
129 int reg; /* 1:register, 0:unregister */
130 pid_t pid;
131 uid_t uid;
132 } reg_msg;
133
134 /* Notify all applications to register */
135 notify_apps(default_global_apps_pipe);
136
137 ret = lttcomm_listen_unix_sock(apps_socket);
138 if (ret < 0) {
139 goto error;
140 }
141
142 while (1) {
143 /* Blocking call, waiting for transmission */
144 sock = lttcomm_accept_unix_sock(apps_socket);
145 if (sock < 0) {
146 goto error;
147 }
148
149 /* Basic recv here to handle the very simple data
150 * that the libust send to register (reg_msg).
151 */
152 ret = recv(sock, &reg_msg, sizeof(reg_msg), 0);
153 if (ret < 0) {
154 perror("recv");
155 continue;
156 }
157
158 /* Add application to the global traceable list */
159 if (reg_msg.reg == 1) {
160 /* Registering */
161 lta = malloc(sizeof(struct ltt_traceable_app));
162 lta->pid = reg_msg.pid;
163 lta->uid = reg_msg.uid;
164 add_traceable_app(lta);
165 } else {
166 /* Unregistering */
167 cds_list_for_each_entry(lta, &ltt_traceable_app_list.head, list) {
168 if (lta->pid == reg_msg.pid && lta->uid == reg_msg.uid) {
169 del_traceable_app(lta);
170 free(lta);
171 break;
172 }
173 }
174 }
175 }
176
177 error:
178
179 return NULL;
180 }
181
182 /*
183 * thread_manage_clients
184 *
185 * This thread manage all clients request using the unix
186 * client socket for communication.
187 */
188 static void *thread_manage_clients(void *data)
189 {
190 int sock, ret;
191 struct lttcomm_session_msg lsm;
192
193 ret = lttcomm_listen_unix_sock(client_socket);
194 if (ret < 0) {
195 goto error;
196 }
197
198 /* Notify parent pid that we are ready
199 * to accept command for client side.
200 */
201 if (opt_sig_parent) {
202 kill(ppid, SIGCHLD);
203 }
204
205 while (1) {
206 /* Blocking call, waiting for transmission */
207 sock = lttcomm_accept_unix_sock(client_socket);
208 if (sock < 0) {
209 goto error;
210 }
211
212 /*
213 * Data is received from the lttng client. The struct
214 * lttcomm_session_msg (lsm) contains the command and data
215 * request of the client.
216 */
217 ret = lttcomm_recv_unix_sock(sock, &lsm, sizeof(lsm));
218 if (ret <= 0) {
219 continue;
220 }
221
222 /* This function dispatch the work to the LTTng or UST libs
223 * and then sends back the response to the client. This is needed
224 * because there might be more then one lttcomm_lttng_msg to
225 * send out so process_client_msg do both jobs.
226 */
227 ret = process_client_msg(sock, &lsm);
228 if (ret < 0) {
229 /* Error detected but still accept command */
230 continue;
231 }
232 }
233
234 error:
235 return NULL;
236 }
237
238 /*
239 * add_traceable_app
240 *
241 * Add a traceable application structure to the global
242 * list protected by a mutex.
243 */
244 static void add_traceable_app(struct ltt_traceable_app *lta)
245 {
246 pthread_mutex_lock(&ltt_traceable_app_list_mutex);
247 cds_list_add(&lta->list, &ltt_traceable_app_list.head);
248 traceable_app_count++;
249 pthread_mutex_unlock(&ltt_traceable_app_list_mutex);
250 }
251
252 /*
253 * del_traceable_app
254 *
255 * Delete a traceable application structure from the
256 * global list protected by a mutex.
257 */
258 static void del_traceable_app(struct ltt_traceable_app *lta)
259 {
260 pthread_mutex_lock(&ltt_traceable_app_list_mutex);
261 cds_list_del(&lta->list);
262 /* Sanity check */
263 if (traceable_app_count != 0) {
264 traceable_app_count--;
265 }
266 pthread_mutex_unlock(&ltt_traceable_app_list_mutex);
267 }
268
269 /*
270 * add_session_list
271 *
272 * Add a ltt_session structure to the global list.
273 */
274 static void add_session_list(struct ltt_session *ls)
275 {
276 cds_list_add(&ls->list, &ltt_session_list.head);
277 session_count++;
278 }
279
280 /*
281 * del_session_list
282 *
283 * Delete a ltt_session structure to the global list.
284 */
285 static void del_session_list(struct ltt_session *ls)
286 {
287 cds_list_del(&ls->list);
288 /* Sanity check */
289 if (session_count != 0) {
290 session_count--;
291 }
292 }
293
294 /*
295 * send_unix_sock
296 *
297 * Send data on a unix socket using the liblttsessiondcomm API.
298 *
299 * Return lttcomm error code.
300 */
301 static int send_unix_sock(int sock, void *buf, size_t len)
302 {
303 /* Check valid length */
304 if (len <= 0) {
305 return -1;
306 }
307
308 return lttcomm_send_unix_sock(sock, buf, len);
309 }
310
311 /*
312 * connect_app
313 *
314 * Return a socket connected to the libust communication socket
315 * of the application identified by the pid.
316 *
317 * If the pid is not found in the traceable list,
318 * return -1 to indicate error.
319 */
320 static int connect_app(pid_t pid)
321 {
322 int sock, ret;
323
324 ret = find_app_by_pid(pid);
325 if (ret == 0) {
326 return -1;
327 }
328
329 sock = ustctl_connect_pid(pid);
330 if (sock < 0) {
331 ERR("Fail connecting to the PID %d\n", pid);
332 }
333
334 return sock;
335 }
336
337 /*
338 * notify_apps
339 *
340 * Notify apps by writing 42 to a named pipe using name.
341 * Every applications waiting for a ltt-sessiond will be notified
342 * and re-register automatically to the session daemon.
343 *
344 * Return open or write error value.
345 */
346 static int notify_apps(const char *name)
347 {
348 int fd;
349 int ret = -1;
350
351 /* Try opening the global pipe */
352 fd = open(name, O_WRONLY);
353 if (fd < 0) {
354 goto error;
355 }
356
357 /* Notify by writing on the pipe */
358 ret = write(fd, "42", 2);
359 if (ret < 0) {
360 perror("write");
361 }
362
363 error:
364 return ret;
365 }
366
367 /*
368 * find_app_by_pid
369 *
370 * Iterate over the traceable apps list.
371 * On success, return 1, else return 0
372 */
373 static int find_app_by_pid(pid_t pid)
374 {
375 struct ltt_traceable_app *iter;
376
377 pthread_mutex_lock(&ltt_traceable_app_list_mutex);
378 cds_list_for_each_entry(iter, &ltt_traceable_app_list.head, list) {
379 if (iter->pid == pid) {
380 pthread_mutex_unlock(&ltt_traceable_app_list_mutex);
381 /* Found */
382 return 1;
383 }
384 }
385 pthread_mutex_unlock(&ltt_traceable_app_list_mutex);
386
387 return 0;
388 }
389
390 /*
391 * find_session_by_uuid
392 *
393 * Return a ltt_session structure ptr that matches the uuid.
394 */
395 static struct ltt_session *find_session_by_uuid(uuid_t session_id)
396 {
397 int found = 0;
398 struct ltt_session *iter;
399
400 /* Sanity check for NULL session_id */
401 if (uuid_is_null(session_id)) {
402 goto end;
403 }
404
405 cds_list_for_each_entry(iter, &ltt_session_list.head, list) {
406 if (uuid_compare(iter->uuid, session_id) == 0) {
407 found = 1;
408 break;
409 }
410 }
411
412 end:
413 if (!found) {
414 iter = NULL;
415 }
416 return iter;
417 }
418
419 /*
420 * find_session_by_name
421 *
422 * Return a ltt_session structure ptr that matches name.
423 * If no session found, NULL is returned.
424 */
425 static struct ltt_session *find_session_by_name(char *name)
426 {
427 int found = 0;
428 struct ltt_session *iter;
429
430 cds_list_for_each_entry(iter, &ltt_session_list.head, list) {
431 if (strncmp(iter->name, name, strlen(iter->name)) == 0) {
432 found = 1;
433 break;
434 }
435 }
436
437 if (!found) {
438 iter = NULL;
439 }
440
441 return iter;
442 }
443
444 /*
445 * destroy_session
446 *
447 * Delete session from the global session list
448 * and free the memory.
449 *
450 * Return -1 if no session is found.
451 * On success, return 1;
452 */
453 static int destroy_session(uuid_t *uuid)
454 {
455 int found = -1;
456 struct ltt_session *iter;
457
458 cds_list_for_each_entry(iter, &ltt_session_list.head, list) {
459 if (uuid_compare(iter->uuid, *uuid) == 0) {
460 del_session_list(iter);
461 free(iter);
462 found = 1;
463 break;
464 }
465 }
466
467 return found;
468 }
469
470 /*
471 * create_session
472 *
473 * Create a brand new session and add it to the
474 * global session list.
475 */
476 static int create_session(char *name, uuid_t *session_id)
477 {
478 struct ltt_session *new_session;
479
480 new_session = find_session_by_name(name);
481 if (new_session != NULL) {
482 goto error;
483 }
484
485 /* Allocate session data structure */
486 new_session = malloc(sizeof(struct ltt_session));
487 if (new_session == NULL) {
488 perror("malloc");
489 goto error_mem;
490 }
491
492 if (name != NULL) {
493 if (asprintf(&new_session->name, "%s", name) < 0) {
494 goto error_mem;
495 }
496 } else {
497 /* Generate session name based on the session count */
498 if (asprintf(&new_session->name, "%s%d", "lttng-", session_count) < 0) {
499 goto error_mem;
500 }
501 }
502
503 /* UUID generation */
504 uuid_generate(new_session->uuid);
505 uuid_copy(*session_id, new_session->uuid);
506
507 /* Set consumer (identifier) to 0. This means that there is
508 * NO consumer attach to that session yet.
509 */
510 new_session->ust_consumer = 0;
511 new_session->lttng_consumer = 0;
512
513 /* Init list */
514 CDS_INIT_LIST_HEAD(&new_session->ust_traces);
515 CDS_INIT_LIST_HEAD(&new_session->lttng_traces);
516
517 /* Add new session to the global session list */
518 add_session_list(new_session);
519
520 return 0;
521
522 error:
523 return -1;
524
525 error_mem:
526 return -ENOMEM;
527 }
528
529 /*
530 * ust_create_trace
531 *
532 * Create an userspace trace using pid.
533 * This trace is then appended to the current session
534 * ust trace list.
535 */
536 static int ust_create_trace(pid_t pid)
537 {
538 int sock, ret;
539 struct ltt_ust_trace *trace;
540
541 trace = malloc(sizeof(struct ltt_ust_trace));
542 if (trace == NULL) {
543 perror("malloc");
544 ret = -1;
545 goto error;
546 }
547
548 /* Init */
549 trace->pid = pid;
550 trace->shmid = 0;
551
552 /* Connect to app using ustctl API */
553 sock = connect_app(pid);
554 if (sock < 0) {
555 ret = LTTCOMM_NO_TRACEABLE;
556 goto error;
557 }
558
559 ret = ustctl_create_trace(sock, "auto");
560 if (ret < 0) {
561 ret = LTTCOMM_CREATE_FAIL;
562 goto error;
563 }
564
565 /* Check if current session is valid */
566 if (current_session) {
567 cds_list_add(&trace->list, &current_session->ust_traces);
568 }
569
570 error:
571 return ret;
572 }
573
574 /*
575 * get_list_apps
576 *
577 * List traceable user-space application and fill an
578 * array of pids.
579 */
580 static void get_list_apps(pid_t *pids)
581 {
582 int i = 0;
583 struct ltt_traceable_app *iter;
584
585 /* Protected by a mutex here because the threads manage_client
586 * and manage_apps can access this list.
587 */
588 pthread_mutex_lock(&ltt_traceable_app_list_mutex);
589 cds_list_for_each_entry(iter, &ltt_traceable_app_list.head, list) {
590 pids[i] = iter->pid;
591 i++;
592 }
593 pthread_mutex_unlock(&ltt_traceable_app_list_mutex);
594 }
595
596 /*
597 * get_list_sessions
598 *
599 * List sessions and fill the data buffer.
600 */
601 static void get_list_sessions(struct lttng_session *lt)
602 {
603 int i = 0;
604 struct ltt_session *iter;
605 struct lttng_session lsess;
606
607 /* Iterate over session list and append data after
608 * the control struct in the buffer.
609 */
610 cds_list_for_each_entry(iter, &ltt_session_list.head, list) {
611 /* Copy name and uuid */
612 uuid_unparse(iter->uuid, lsess.uuid);
613 strncpy(lsess.name, iter->name, sizeof(lsess.name));
614 lsess.name[sizeof(lsess.name) - 1] = '\0';
615 memcpy(&lt[i], &lsess, sizeof(lsess));
616 i++;
617 /* Reset struct for next pass */
618 memset(&lsess, 0, sizeof(lsess));
619 }
620 }
621
622 /*
623 * copy_common_data
624 *
625 * Copy common data between lttcomm_lttng_msg and lttcomm_session_msg
626 */
627 static void copy_common_data(struct lttcomm_lttng_msg *llm, struct lttcomm_session_msg *lsm)
628 {
629 llm->cmd_type = lsm->cmd_type;
630 llm->pid = lsm->pid;
631
632 /* Manage uuid */
633 if (!uuid_is_null(lsm->session_id)) {
634 uuid_copy(llm->session_id, lsm->session_id);
635 }
636
637 strncpy(llm->trace_name, lsm->trace_name, strlen(llm->trace_name));
638 llm->trace_name[strlen(llm->trace_name) - 1] = '\0';
639 }
640
641 /*
642 * setup_data_buffer
643 *
644 * Setup the outgoing data buffer for the response
645 * data allocating the right amount of memory.
646 *
647 * Return total size of the buffer pointed by buf.
648 */
649 static int setup_data_buffer(char **buf, size_t s_data, struct lttcomm_lttng_msg *llm)
650 {
651 int ret = 0;
652 size_t buf_size;
653
654 buf_size = sizeof(struct lttcomm_lttng_msg) + s_data;
655 *buf = malloc(buf_size);
656 if (*buf == NULL) {
657 perror("malloc");
658 ret = -1;
659 goto error;
660 }
661
662 /* Setup lttcomm_lttng_msg data and copy
663 * it to the newly allocated buffer.
664 */
665 llm->size_payload = s_data;
666 memcpy(*buf, llm, sizeof(struct lttcomm_lttng_msg));
667
668 return buf_size;
669
670 error:
671 return ret;
672 }
673
674 /*
675 * process_client_msg
676 *
677 * This takes the lttcomm_session_msg struct and process the command requested
678 * by the client. It then creates response(s) and send it back to the
679 * given socket (sock).
680 *
681 * Return any error encountered or 0 for success.
682 */
683 static int process_client_msg(int sock, struct lttcomm_session_msg *lsm)
684 {
685 int ret;
686 int buf_size;
687 size_t header_size;
688 char *send_buf = NULL;
689 struct lttcomm_lttng_msg llm;
690
691 /* Copy common data to identify the response
692 * on the lttng client side.
693 */
694 copy_common_data(&llm, lsm);
695
696 /* Check command that needs a session */
697 if (lsm->cmd_type != LTTNG_CREATE_SESSION &&
698 lsm->cmd_type != LTTNG_LIST_SESSIONS &&
699 lsm->cmd_type != UST_LIST_APPS)
700 {
701 current_session = find_session_by_uuid(lsm->session_id);
702 if (current_session == NULL) {
703 ret = LTTCOMM_SELECT_SESS;
704 goto end;
705 }
706 }
707
708 /* Default return code.
709 * In our world, everything is OK... right? ;)
710 */
711 llm.ret_code = LTTCOMM_OK;
712
713 header_size = sizeof(struct lttcomm_lttng_msg);
714
715 /* Process by command type */
716 switch (lsm->cmd_type) {
717 case LTTNG_CREATE_SESSION:
718 {
719 ret = create_session(lsm->session_name, &llm.session_id);
720 if (ret < 0) {
721 if (ret == -1) {
722 ret = LTTCOMM_EXIST_SESS;
723 } else {
724 ret = LTTCOMM_FATAL;
725 }
726 goto end;
727 }
728
729 buf_size = setup_data_buffer(&send_buf, 0, &llm);
730 if (buf_size < 0) {
731 ret = LTTCOMM_FATAL;
732 goto end;
733 }
734
735 break;
736 }
737 case LTTNG_DESTROY_SESSION:
738 {
739 ret = destroy_session(&lsm->session_id);
740 if (ret < 0) {
741 ret = LTTCOMM_NO_SESS;
742 } else {
743 ret = LTTCOMM_OK;
744 }
745
746 /* No auxiliary data so only send the llm struct. */
747 goto end;
748 }
749 case UST_CREATE_TRACE:
750 {
751 ret = ust_create_trace(lsm->pid);
752 if (ret < 0) {
753 ret = LTTCOMM_CREATE_FAIL;
754 goto end;
755 }
756
757 /* No auxiliary data so only send the llm struct. */
758 goto end;
759 }
760 case UST_LIST_APPS:
761 {
762 /* Stop right now if no apps */
763 if (traceable_app_count == 0) {
764 ret = LTTCOMM_NO_APPS;
765 goto end;
766 }
767
768 /* Setup data buffer and details for transmission */
769 buf_size = setup_data_buffer(&send_buf,
770 sizeof(pid_t) * traceable_app_count, &llm);
771 if (buf_size < 0) {
772 ret = LTTCOMM_FATAL;
773 goto end;
774 }
775
776 get_list_apps((pid_t *)(send_buf + header_size));
777
778 break;
779 }
780 case LTTNG_LIST_SESSIONS:
781 {
782 /* Stop right now if no session */
783 if (session_count == 0) {
784 ret = LTTCOMM_NO_SESS;
785 goto end;
786 }
787
788 /* Setup data buffer and details for transmission */
789 buf_size = setup_data_buffer(&send_buf,
790 (sizeof(struct lttng_session) * session_count), &llm);
791 if (buf_size < 0) {
792 ret = LTTCOMM_FATAL;
793 goto end;
794 }
795
796 get_list_sessions((struct lttng_session *)(send_buf + header_size));
797
798 break;
799 }
800 default:
801 {
802 /* Undefined command */
803 ret = LTTCOMM_UND;
804 goto end;
805 }
806 }
807
808 ret = send_unix_sock(sock, send_buf, buf_size);
809
810 if (send_buf != NULL) {
811 free(send_buf);
812 }
813
814 return ret;
815
816 end:
817 /* Notify client of error */
818 llm.ret_code = ret;
819 llm.size_payload = 0;
820 send_unix_sock(sock, (void*) &llm, sizeof(llm));
821
822 return ret;
823 }
824
825 /*
826 * usage function on stderr
827 */
828 static void usage(void)
829 {
830 fprintf(stderr, "Usage: %s OPTIONS\n\nOptions:\n", progname);
831 fprintf(stderr, " -h, --help Display this usage.\n");
832 fprintf(stderr, " -c, --client-sock PATH Specify path for the client unix socket\n");
833 fprintf(stderr, " -a, --apps-sock PATH Specify path for apps unix socket.\n");
834 fprintf(stderr, " -d, --daemonize Start as a daemon.\n");
835 fprintf(stderr, " -g, --group NAME Specify the tracing group name. (default: tracing)\n");
836 fprintf(stderr, " -V, --version Show version number.\n");
837 fprintf(stderr, " -S, --sig-parent Send SIGCHLD to parent pid to notify readiness.\n");
838 fprintf(stderr, " -q, --quiet No output at all.\n");
839 }
840
841 /*
842 * daemon argument parsing
843 */
844 static int parse_args(int argc, char **argv)
845 {
846 int c;
847
848 static struct option long_options[] = {
849 { "client-sock", 1, 0, 'c' },
850 { "apps-sock", 1, 0, 'a' },
851 { "daemonize", 0, 0, 'd' },
852 { "sig-parent", 0, 0, 'S' },
853 { "help", 0, 0, 'h' },
854 { "group", 1, 0, 'g' },
855 { "version", 0, 0, 'V' },
856 { "quiet", 0, 0, 'q' },
857 { NULL, 0, 0, 0 }
858 };
859
860 while (1) {
861 int option_index = 0;
862 c = getopt_long(argc, argv, "dhqVS" "a:c:g:s:", long_options, &option_index);
863 if (c == -1) {
864 break;
865 }
866
867 switch (c) {
868 case 0:
869 fprintf(stderr, "option %s", long_options[option_index].name);
870 if (optarg) {
871 fprintf(stderr, " with arg %s\n", optarg);
872 }
873 break;
874 case 'c':
875 snprintf(client_unix_sock_path, PATH_MAX, "%s", optarg);
876 break;
877 case 'a':
878 snprintf(apps_unix_sock_path, PATH_MAX, "%s", optarg);
879 break;
880 case 'd':
881 opt_daemon = 1;
882 break;
883 case 'g':
884 opt_tracing_group = strdup(optarg);
885 break;
886 case 'h':
887 usage();
888 exit(EXIT_FAILURE);
889 case 'V':
890 fprintf(stdout, "%s\n", VERSION);
891 exit(EXIT_SUCCESS);
892 case 'S':
893 opt_sig_parent = 1;
894 break;
895 case 'q':
896 opt_quiet = 1;
897 break;
898 default:
899 /* Unknown option or other error.
900 * Error is printed by getopt, just return */
901 return -1;
902 }
903 }
904
905 return 0;
906 }
907
908 /*
909 * init_daemon_socket
910 *
911 * Creates the two needed socket by the daemon.
912 * apps_socket - The communication socket for all UST apps.
913 * client_socket - The communication of the cli tool (lttng).
914 */
915 static int init_daemon_socket()
916 {
917 int ret = 0;
918 mode_t old_umask;
919
920 old_umask = umask(0);
921
922 /* Create client tool unix socket */
923 client_socket = lttcomm_create_unix_sock(client_unix_sock_path);
924 if (client_socket < 0) {
925 ret = -1;
926 goto end;
927 }
928
929 /* File permission MUST be 660 */
930 ret = chmod(client_unix_sock_path, S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
931 if (ret < 0) {
932 perror("chmod");
933 goto end;
934 }
935
936 /* Create the application unix socket */
937 apps_socket = lttcomm_create_unix_sock(apps_unix_sock_path);
938 if (apps_socket < 0) {
939 ret = -1;
940 goto end;
941 }
942
943 /* File permission MUST be 660 */
944 ret = chmod(apps_unix_sock_path, S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH);
945 if (ret < 0) {
946 perror("chmod");
947 goto end;
948 }
949
950 end:
951 umask(old_umask);
952 return ret;
953 }
954
955 /*
956 * check_existing_daemon
957 *
958 * Check if the global socket is available.
959 * If yes, error is returned.
960 */
961 static int check_existing_daemon()
962 {
963 int ret;
964
965 ret = access(client_unix_sock_path, F_OK);
966 if (ret == 0) {
967 ret = access(apps_unix_sock_path, F_OK);
968 }
969
970 return ret;
971 }
972
973 /*
974 * get_home_dir
975 *
976 * Return pointer to home directory path using
977 * the env variable HOME.
978 *
979 * Default : /tmp
980 */
981 static const char *get_home_dir(void)
982 {
983 const char *home_path;
984
985 if ((home_path = (const char *) getenv("HOME")) == NULL) {
986 home_path = default_home_dir;
987 }
988
989 return home_path;
990 }
991
992 /*
993 * set_socket_perms
994 *
995 * Set the tracing group gid onto the client socket.
996 */
997 static int set_socket_perms(void)
998 {
999 int ret;
1000 struct group *grp;
1001
1002 /* Decide which group name to use */
1003 (opt_tracing_group != NULL) ?
1004 (grp = getgrnam(opt_tracing_group)) :
1005 (grp = getgrnam(default_tracing_group));
1006
1007 if (grp == NULL) {
1008 ERR("Missing tracing group. Aborting execution.\n");
1009 ret = -1;
1010 goto end;
1011 }
1012
1013 ret = chown(client_unix_sock_path, 0, grp->gr_gid);
1014 if (ret < 0) {
1015 perror("chown");
1016 }
1017
1018 end:
1019 return ret;
1020 }
1021
1022 /*
1023 * set_signal_handler
1024 *
1025 * Setup signal handler for :
1026 * SIGINT, SIGTERM, SIGPIPE
1027 */
1028 static int set_signal_handler(void)
1029 {
1030 int ret = 0;
1031 struct sigaction sa;
1032 sigset_t sigset;
1033
1034 if ((ret = sigemptyset(&sigset)) < 0) {
1035 perror("sigemptyset");
1036 return ret;
1037 }
1038
1039 sa.sa_handler = sighandler;
1040 sa.sa_mask = sigset;
1041 sa.sa_flags = 0;
1042 if ((ret = sigaction(SIGTERM, &sa, NULL)) < 0) {
1043 perror("sigaction");
1044 return ret;
1045 }
1046
1047 if ((ret = sigaction(SIGINT, &sa, NULL)) < 0) {
1048 perror("sigaction");
1049 return ret;
1050 }
1051
1052 if ((ret = sigaction(SIGPIPE, &sa, NULL)) < 0) {
1053 perror("sigaction");
1054 return ret;
1055 }
1056
1057 return ret;
1058 }
1059
1060 /**
1061 * sighandler
1062 *
1063 * Signal handler for the daemon
1064 */
1065 static void sighandler(int sig)
1066 {
1067 switch (sig) {
1068 case SIGPIPE:
1069 return;
1070 case SIGINT:
1071 case SIGTERM:
1072 cleanup();
1073 break;
1074 default:
1075 break;
1076 }
1077
1078 exit(EXIT_SUCCESS);
1079 }
1080
1081 /*
1082 * cleanup
1083 *
1084 * Cleanup the daemon on exit
1085 */
1086 static void cleanup()
1087 {
1088 /* <fun> */
1089 MSG("\n%c[%d;%dm*** assert failed *** ==> %c[%dm", 27,1,31,27,0);
1090 MSG("%c[%d;%dmMatthew, BEET driven development works!%c[%dm",27,1,33,27,0);
1091 /* </fun> */
1092
1093 unlink(client_unix_sock_path);
1094 unlink(apps_unix_sock_path);
1095 }
1096
1097 /*
1098 * main
1099 */
1100 int main(int argc, char **argv)
1101 {
1102 int i;
1103 int ret = 0;
1104 void *status;
1105 pthread_t threads[2];
1106
1107 /* Parse arguments */
1108 progname = argv[0];
1109 if ((ret = parse_args(argc, argv) < 0)) {
1110 goto error;
1111 }
1112
1113 /* Daemonize */
1114 if (opt_daemon) {
1115 ret = daemon(0, 0);
1116 if (ret < 0) {
1117 perror("daemon");
1118 goto error;
1119 }
1120 }
1121
1122 /* Check if daemon is UID = 0 */
1123 is_root = !getuid();
1124
1125 /* Set all sockets path */
1126 if (is_root) {
1127 if (strlen(apps_unix_sock_path) == 0) {
1128 (snprintf(apps_unix_sock_path, PATH_MAX,
1129 DEFAULT_GLOBAL_APPS_UNIX_SOCK));
1130 }
1131
1132 if (strlen(client_unix_sock_path) == 0) {
1133 (snprintf(client_unix_sock_path, PATH_MAX,
1134 DEFAULT_GLOBAL_CLIENT_UNIX_SOCK));
1135 }
1136 } else {
1137 if (strlen(apps_unix_sock_path) == 0) {
1138 (snprintf(apps_unix_sock_path, PATH_MAX,
1139 DEFAULT_HOME_APPS_UNIX_SOCK, get_home_dir()));
1140 }
1141
1142 /* Set the cli tool unix socket path */
1143 if (strlen(client_unix_sock_path) == 0) {
1144 (snprintf(client_unix_sock_path, PATH_MAX,
1145 DEFAULT_HOME_CLIENT_UNIX_SOCK, get_home_dir()));
1146 }
1147 }
1148
1149 /* See if daemon already exist. If any of the two
1150 * socket needed by the daemon are present, this test fails
1151 */
1152 if ((ret = check_existing_daemon()) == 0) {
1153 ERR("Already running daemon.\n");
1154 /* We do not goto error because we must not
1155 * cleanup() because a daemon is already working.
1156 */
1157 return EXIT_FAILURE;
1158 }
1159
1160 if (set_signal_handler() < 0) {
1161 goto error;
1162 }
1163
1164 /* Setup the two needed unix socket */
1165 if (init_daemon_socket() < 0) {
1166 goto error;
1167 }
1168
1169 /* Set credentials to socket */
1170 if (is_root && (set_socket_perms() < 0)) {
1171 goto error;
1172 }
1173
1174 /* Get parent pid if -S, --sig-parent is specified. */
1175 if (opt_sig_parent) {
1176 ppid = getppid();
1177 }
1178
1179 while (1) {
1180 /* Create thread to manage the client socket */
1181 ret = pthread_create(&threads[0], NULL, thread_manage_clients, (void *) NULL);
1182 if (ret != 0) {
1183 perror("pthread_create");
1184 goto error;
1185 }
1186
1187 /* Create thread to manage application socket */
1188 ret = pthread_create(&threads[1], NULL, thread_manage_apps, (void *) NULL);
1189 if (ret != 0) {
1190 perror("pthread_create");
1191 goto error;
1192 }
1193
1194 for (i = 0; i < 2; i++) {
1195 ret = pthread_join(threads[i], &status);
1196 if (ret != 0) {
1197 perror("pthread_join");
1198 goto error;
1199 }
1200 }
1201 }
1202
1203 cleanup();
1204 return 0;
1205
1206 error:
1207 cleanup();
1208
1209 return EXIT_FAILURE;
1210 }
This page took 0.082778 seconds and 5 git commands to generate.