Rename LTTng index in CTF index
[lttng-tools.git] / src / common / consumer.c
1 /*
2 * Copyright (C) 2011 - Julien Desfossez <julien.desfossez@polymtl.ca>
3 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 * 2012 - David Goulet <dgoulet@efficios.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License, version 2 only,
8 * as published by the Free Software Foundation.
9 *
10 * This program is distributed in the hope that it will be useful, but WITHOUT
11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
13 * more details.
14 *
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
18 */
19
20 #define _GNU_SOURCE
21 #include <assert.h>
22 #include <poll.h>
23 #include <pthread.h>
24 #include <stdlib.h>
25 #include <string.h>
26 #include <sys/mman.h>
27 #include <sys/socket.h>
28 #include <sys/types.h>
29 #include <unistd.h>
30 #include <inttypes.h>
31 #include <signal.h>
32
33 #include <bin/lttng-consumerd/health-consumerd.h>
34 #include <common/common.h>
35 #include <common/utils.h>
36 #include <common/compat/poll.h>
37 #include <common/index/index.h>
38 #include <common/kernel-ctl/kernel-ctl.h>
39 #include <common/sessiond-comm/relayd.h>
40 #include <common/sessiond-comm/sessiond-comm.h>
41 #include <common/kernel-consumer/kernel-consumer.h>
42 #include <common/relayd/relayd.h>
43 #include <common/ust-consumer/ust-consumer.h>
44 #include <common/consumer-timer.h>
45
46 #include "consumer.h"
47 #include "consumer-stream.h"
48
49 struct lttng_consumer_global_data consumer_data = {
50 .stream_count = 0,
51 .need_update = 1,
52 .type = LTTNG_CONSUMER_UNKNOWN,
53 };
54
55 enum consumer_channel_action {
56 CONSUMER_CHANNEL_ADD,
57 CONSUMER_CHANNEL_DEL,
58 CONSUMER_CHANNEL_QUIT,
59 };
60
61 struct consumer_channel_msg {
62 enum consumer_channel_action action;
63 struct lttng_consumer_channel *chan; /* add */
64 uint64_t key; /* del */
65 };
66
67 /*
68 * Flag to inform the polling thread to quit when all fd hung up. Updated by
69 * the consumer_thread_receive_fds when it notices that all fds has hung up.
70 * Also updated by the signal handler (consumer_should_exit()). Read by the
71 * polling threads.
72 */
73 volatile int consumer_quit;
74
75 /*
76 * Global hash table containing respectively metadata and data streams. The
77 * stream element in this ht should only be updated by the metadata poll thread
78 * for the metadata and the data poll thread for the data.
79 */
80 static struct lttng_ht *metadata_ht;
81 static struct lttng_ht *data_ht;
82
83 /*
84 * Notify a thread lttng pipe to poll back again. This usually means that some
85 * global state has changed so we just send back the thread in a poll wait
86 * call.
87 */
88 static void notify_thread_lttng_pipe(struct lttng_pipe *pipe)
89 {
90 struct lttng_consumer_stream *null_stream = NULL;
91
92 assert(pipe);
93
94 (void) lttng_pipe_write(pipe, &null_stream, sizeof(null_stream));
95 }
96
97 static void notify_health_quit_pipe(int *pipe)
98 {
99 ssize_t ret;
100
101 ret = lttng_write(pipe[1], "4", 1);
102 if (ret < 1) {
103 PERROR("write consumer health quit");
104 }
105 }
106
107 static void notify_channel_pipe(struct lttng_consumer_local_data *ctx,
108 struct lttng_consumer_channel *chan,
109 uint64_t key,
110 enum consumer_channel_action action)
111 {
112 struct consumer_channel_msg msg;
113 ssize_t ret;
114
115 memset(&msg, 0, sizeof(msg));
116
117 msg.action = action;
118 msg.chan = chan;
119 msg.key = key;
120 ret = lttng_write(ctx->consumer_channel_pipe[1], &msg, sizeof(msg));
121 if (ret < sizeof(msg)) {
122 PERROR("notify_channel_pipe write error");
123 }
124 }
125
126 void notify_thread_del_channel(struct lttng_consumer_local_data *ctx,
127 uint64_t key)
128 {
129 notify_channel_pipe(ctx, NULL, key, CONSUMER_CHANNEL_DEL);
130 }
131
132 static int read_channel_pipe(struct lttng_consumer_local_data *ctx,
133 struct lttng_consumer_channel **chan,
134 uint64_t *key,
135 enum consumer_channel_action *action)
136 {
137 struct consumer_channel_msg msg;
138 ssize_t ret;
139
140 ret = lttng_read(ctx->consumer_channel_pipe[0], &msg, sizeof(msg));
141 if (ret < sizeof(msg)) {
142 ret = -1;
143 goto error;
144 }
145 *action = msg.action;
146 *chan = msg.chan;
147 *key = msg.key;
148 error:
149 return (int) ret;
150 }
151
152 /*
153 * Find a stream. The consumer_data.lock must be locked during this
154 * call.
155 */
156 static struct lttng_consumer_stream *find_stream(uint64_t key,
157 struct lttng_ht *ht)
158 {
159 struct lttng_ht_iter iter;
160 struct lttng_ht_node_u64 *node;
161 struct lttng_consumer_stream *stream = NULL;
162
163 assert(ht);
164
165 /* -1ULL keys are lookup failures */
166 if (key == (uint64_t) -1ULL) {
167 return NULL;
168 }
169
170 rcu_read_lock();
171
172 lttng_ht_lookup(ht, &key, &iter);
173 node = lttng_ht_iter_get_node_u64(&iter);
174 if (node != NULL) {
175 stream = caa_container_of(node, struct lttng_consumer_stream, node);
176 }
177
178 rcu_read_unlock();
179
180 return stream;
181 }
182
183 static void steal_stream_key(uint64_t key, struct lttng_ht *ht)
184 {
185 struct lttng_consumer_stream *stream;
186
187 rcu_read_lock();
188 stream = find_stream(key, ht);
189 if (stream) {
190 stream->key = (uint64_t) -1ULL;
191 /*
192 * We don't want the lookup to match, but we still need
193 * to iterate on this stream when iterating over the hash table. Just
194 * change the node key.
195 */
196 stream->node.key = (uint64_t) -1ULL;
197 }
198 rcu_read_unlock();
199 }
200
201 /*
202 * Return a channel object for the given key.
203 *
204 * RCU read side lock MUST be acquired before calling this function and
205 * protects the channel ptr.
206 */
207 struct lttng_consumer_channel *consumer_find_channel(uint64_t key)
208 {
209 struct lttng_ht_iter iter;
210 struct lttng_ht_node_u64 *node;
211 struct lttng_consumer_channel *channel = NULL;
212
213 /* -1ULL keys are lookup failures */
214 if (key == (uint64_t) -1ULL) {
215 return NULL;
216 }
217
218 lttng_ht_lookup(consumer_data.channel_ht, &key, &iter);
219 node = lttng_ht_iter_get_node_u64(&iter);
220 if (node != NULL) {
221 channel = caa_container_of(node, struct lttng_consumer_channel, node);
222 }
223
224 return channel;
225 }
226
227 static void free_stream_rcu(struct rcu_head *head)
228 {
229 struct lttng_ht_node_u64 *node =
230 caa_container_of(head, struct lttng_ht_node_u64, head);
231 struct lttng_consumer_stream *stream =
232 caa_container_of(node, struct lttng_consumer_stream, node);
233
234 free(stream);
235 }
236
237 static void free_channel_rcu(struct rcu_head *head)
238 {
239 struct lttng_ht_node_u64 *node =
240 caa_container_of(head, struct lttng_ht_node_u64, head);
241 struct lttng_consumer_channel *channel =
242 caa_container_of(node, struct lttng_consumer_channel, node);
243
244 free(channel);
245 }
246
247 /*
248 * RCU protected relayd socket pair free.
249 */
250 static void free_relayd_rcu(struct rcu_head *head)
251 {
252 struct lttng_ht_node_u64 *node =
253 caa_container_of(head, struct lttng_ht_node_u64, head);
254 struct consumer_relayd_sock_pair *relayd =
255 caa_container_of(node, struct consumer_relayd_sock_pair, node);
256
257 /*
258 * Close all sockets. This is done in the call RCU since we don't want the
259 * socket fds to be reassigned thus potentially creating bad state of the
260 * relayd object.
261 *
262 * We do not have to lock the control socket mutex here since at this stage
263 * there is no one referencing to this relayd object.
264 */
265 (void) relayd_close(&relayd->control_sock);
266 (void) relayd_close(&relayd->data_sock);
267
268 free(relayd);
269 }
270
271 /*
272 * Destroy and free relayd socket pair object.
273 */
274 void consumer_destroy_relayd(struct consumer_relayd_sock_pair *relayd)
275 {
276 int ret;
277 struct lttng_ht_iter iter;
278
279 if (relayd == NULL) {
280 return;
281 }
282
283 DBG("Consumer destroy and close relayd socket pair");
284
285 iter.iter.node = &relayd->node.node;
286 ret = lttng_ht_del(consumer_data.relayd_ht, &iter);
287 if (ret != 0) {
288 /* We assume the relayd is being or is destroyed */
289 return;
290 }
291
292 /* RCU free() call */
293 call_rcu(&relayd->node.head, free_relayd_rcu);
294 }
295
296 /*
297 * Remove a channel from the global list protected by a mutex. This function is
298 * also responsible for freeing its data structures.
299 */
300 void consumer_del_channel(struct lttng_consumer_channel *channel)
301 {
302 int ret;
303 struct lttng_ht_iter iter;
304 struct lttng_consumer_stream *stream, *stmp;
305
306 DBG("Consumer delete channel key %" PRIu64, channel->key);
307
308 pthread_mutex_lock(&consumer_data.lock);
309 pthread_mutex_lock(&channel->lock);
310
311 /* Delete streams that might have been left in the stream list. */
312 cds_list_for_each_entry_safe(stream, stmp, &channel->streams.head,
313 send_node) {
314 cds_list_del(&stream->send_node);
315 /*
316 * Once a stream is added to this list, the buffers were created so
317 * we have a guarantee that this call will succeed.
318 */
319 consumer_stream_destroy(stream, NULL);
320 }
321
322 if (channel->live_timer_enabled == 1) {
323 consumer_timer_live_stop(channel);
324 }
325
326 switch (consumer_data.type) {
327 case LTTNG_CONSUMER_KERNEL:
328 break;
329 case LTTNG_CONSUMER32_UST:
330 case LTTNG_CONSUMER64_UST:
331 lttng_ustconsumer_del_channel(channel);
332 break;
333 default:
334 ERR("Unknown consumer_data type");
335 assert(0);
336 goto end;
337 }
338
339 rcu_read_lock();
340 iter.iter.node = &channel->node.node;
341 ret = lttng_ht_del(consumer_data.channel_ht, &iter);
342 assert(!ret);
343 rcu_read_unlock();
344
345 call_rcu(&channel->node.head, free_channel_rcu);
346 end:
347 pthread_mutex_unlock(&channel->lock);
348 pthread_mutex_unlock(&consumer_data.lock);
349 }
350
351 /*
352 * Iterate over the relayd hash table and destroy each element. Finally,
353 * destroy the whole hash table.
354 */
355 static void cleanup_relayd_ht(void)
356 {
357 struct lttng_ht_iter iter;
358 struct consumer_relayd_sock_pair *relayd;
359
360 rcu_read_lock();
361
362 cds_lfht_for_each_entry(consumer_data.relayd_ht->ht, &iter.iter, relayd,
363 node.node) {
364 consumer_destroy_relayd(relayd);
365 }
366
367 rcu_read_unlock();
368
369 lttng_ht_destroy(consumer_data.relayd_ht);
370 }
371
372 /*
373 * Update the end point status of all streams having the given network sequence
374 * index (relayd index).
375 *
376 * It's atomically set without having the stream mutex locked which is fine
377 * because we handle the write/read race with a pipe wakeup for each thread.
378 */
379 static void update_endpoint_status_by_netidx(uint64_t net_seq_idx,
380 enum consumer_endpoint_status status)
381 {
382 struct lttng_ht_iter iter;
383 struct lttng_consumer_stream *stream;
384
385 DBG("Consumer set delete flag on stream by idx %" PRIu64, net_seq_idx);
386
387 rcu_read_lock();
388
389 /* Let's begin with metadata */
390 cds_lfht_for_each_entry(metadata_ht->ht, &iter.iter, stream, node.node) {
391 if (stream->net_seq_idx == net_seq_idx) {
392 uatomic_set(&stream->endpoint_status, status);
393 DBG("Delete flag set to metadata stream %d", stream->wait_fd);
394 }
395 }
396
397 /* Follow up by the data streams */
398 cds_lfht_for_each_entry(data_ht->ht, &iter.iter, stream, node.node) {
399 if (stream->net_seq_idx == net_seq_idx) {
400 uatomic_set(&stream->endpoint_status, status);
401 DBG("Delete flag set to data stream %d", stream->wait_fd);
402 }
403 }
404 rcu_read_unlock();
405 }
406
407 /*
408 * Cleanup a relayd object by flagging every associated streams for deletion,
409 * destroying the object meaning removing it from the relayd hash table,
410 * closing the sockets and freeing the memory in a RCU call.
411 *
412 * If a local data context is available, notify the threads that the streams'
413 * state have changed.
414 */
415 static void cleanup_relayd(struct consumer_relayd_sock_pair *relayd,
416 struct lttng_consumer_local_data *ctx)
417 {
418 uint64_t netidx;
419
420 assert(relayd);
421
422 DBG("Cleaning up relayd sockets");
423
424 /* Save the net sequence index before destroying the object */
425 netidx = relayd->net_seq_idx;
426
427 /*
428 * Delete the relayd from the relayd hash table, close the sockets and free
429 * the object in a RCU call.
430 */
431 consumer_destroy_relayd(relayd);
432
433 /* Set inactive endpoint to all streams */
434 update_endpoint_status_by_netidx(netidx, CONSUMER_ENDPOINT_INACTIVE);
435
436 /*
437 * With a local data context, notify the threads that the streams' state
438 * have changed. The write() action on the pipe acts as an "implicit"
439 * memory barrier ordering the updates of the end point status from the
440 * read of this status which happens AFTER receiving this notify.
441 */
442 if (ctx) {
443 notify_thread_lttng_pipe(ctx->consumer_data_pipe);
444 notify_thread_lttng_pipe(ctx->consumer_metadata_pipe);
445 }
446 }
447
448 /*
449 * Flag a relayd socket pair for destruction. Destroy it if the refcount
450 * reaches zero.
451 *
452 * RCU read side lock MUST be aquired before calling this function.
453 */
454 void consumer_flag_relayd_for_destroy(struct consumer_relayd_sock_pair *relayd)
455 {
456 assert(relayd);
457
458 /* Set destroy flag for this object */
459 uatomic_set(&relayd->destroy_flag, 1);
460
461 /* Destroy the relayd if refcount is 0 */
462 if (uatomic_read(&relayd->refcount) == 0) {
463 consumer_destroy_relayd(relayd);
464 }
465 }
466
467 /*
468 * Completly destroy stream from every visiable data structure and the given
469 * hash table if one.
470 *
471 * One this call returns, the stream object is not longer usable nor visible.
472 */
473 void consumer_del_stream(struct lttng_consumer_stream *stream,
474 struct lttng_ht *ht)
475 {
476 consumer_stream_destroy(stream, ht);
477 }
478
479 /*
480 * XXX naming of del vs destroy is all mixed up.
481 */
482 void consumer_del_stream_for_data(struct lttng_consumer_stream *stream)
483 {
484 consumer_stream_destroy(stream, data_ht);
485 }
486
487 void consumer_del_stream_for_metadata(struct lttng_consumer_stream *stream)
488 {
489 consumer_stream_destroy(stream, metadata_ht);
490 }
491
492 struct lttng_consumer_stream *consumer_allocate_stream(uint64_t channel_key,
493 uint64_t stream_key,
494 enum lttng_consumer_stream_state state,
495 const char *channel_name,
496 uid_t uid,
497 gid_t gid,
498 uint64_t relayd_id,
499 uint64_t session_id,
500 int cpu,
501 int *alloc_ret,
502 enum consumer_channel_type type,
503 unsigned int monitor)
504 {
505 int ret;
506 struct lttng_consumer_stream *stream;
507
508 stream = zmalloc(sizeof(*stream));
509 if (stream == NULL) {
510 PERROR("malloc struct lttng_consumer_stream");
511 ret = -ENOMEM;
512 goto end;
513 }
514
515 rcu_read_lock();
516
517 stream->key = stream_key;
518 stream->out_fd = -1;
519 stream->out_fd_offset = 0;
520 stream->output_written = 0;
521 stream->state = state;
522 stream->uid = uid;
523 stream->gid = gid;
524 stream->net_seq_idx = relayd_id;
525 stream->session_id = session_id;
526 stream->monitor = monitor;
527 stream->endpoint_status = CONSUMER_ENDPOINT_ACTIVE;
528 stream->index_fd = -1;
529 pthread_mutex_init(&stream->lock, NULL);
530
531 /* If channel is the metadata, flag this stream as metadata. */
532 if (type == CONSUMER_CHANNEL_TYPE_METADATA) {
533 stream->metadata_flag = 1;
534 /* Metadata is flat out. */
535 strncpy(stream->name, DEFAULT_METADATA_NAME, sizeof(stream->name));
536 /* Live rendez-vous point. */
537 pthread_cond_init(&stream->metadata_rdv, NULL);
538 pthread_mutex_init(&stream->metadata_rdv_lock, NULL);
539 } else {
540 /* Format stream name to <channel_name>_<cpu_number> */
541 ret = snprintf(stream->name, sizeof(stream->name), "%s_%d",
542 channel_name, cpu);
543 if (ret < 0) {
544 PERROR("snprintf stream name");
545 goto error;
546 }
547 }
548
549 /* Key is always the wait_fd for streams. */
550 lttng_ht_node_init_u64(&stream->node, stream->key);
551
552 /* Init node per channel id key */
553 lttng_ht_node_init_u64(&stream->node_channel_id, channel_key);
554
555 /* Init session id node with the stream session id */
556 lttng_ht_node_init_u64(&stream->node_session_id, stream->session_id);
557
558 DBG3("Allocated stream %s (key %" PRIu64 ", chan_key %" PRIu64
559 " relayd_id %" PRIu64 ", session_id %" PRIu64,
560 stream->name, stream->key, channel_key,
561 stream->net_seq_idx, stream->session_id);
562
563 rcu_read_unlock();
564 return stream;
565
566 error:
567 rcu_read_unlock();
568 free(stream);
569 end:
570 if (alloc_ret) {
571 *alloc_ret = ret;
572 }
573 return NULL;
574 }
575
576 /*
577 * Add a stream to the global list protected by a mutex.
578 */
579 int consumer_add_data_stream(struct lttng_consumer_stream *stream)
580 {
581 struct lttng_ht *ht = data_ht;
582 int ret = 0;
583
584 assert(stream);
585 assert(ht);
586
587 DBG3("Adding consumer stream %" PRIu64, stream->key);
588
589 pthread_mutex_lock(&consumer_data.lock);
590 pthread_mutex_lock(&stream->chan->lock);
591 pthread_mutex_lock(&stream->chan->timer_lock);
592 pthread_mutex_lock(&stream->lock);
593 rcu_read_lock();
594
595 /* Steal stream identifier to avoid having streams with the same key */
596 steal_stream_key(stream->key, ht);
597
598 lttng_ht_add_unique_u64(ht, &stream->node);
599
600 lttng_ht_add_u64(consumer_data.stream_per_chan_id_ht,
601 &stream->node_channel_id);
602
603 /*
604 * Add stream to the stream_list_ht of the consumer data. No need to steal
605 * the key since the HT does not use it and we allow to add redundant keys
606 * into this table.
607 */
608 lttng_ht_add_u64(consumer_data.stream_list_ht, &stream->node_session_id);
609
610 /*
611 * When nb_init_stream_left reaches 0, we don't need to trigger any action
612 * in terms of destroying the associated channel, because the action that
613 * causes the count to become 0 also causes a stream to be added. The
614 * channel deletion will thus be triggered by the following removal of this
615 * stream.
616 */
617 if (uatomic_read(&stream->chan->nb_init_stream_left) > 0) {
618 /* Increment refcount before decrementing nb_init_stream_left */
619 cmm_smp_wmb();
620 uatomic_dec(&stream->chan->nb_init_stream_left);
621 }
622
623 /* Update consumer data once the node is inserted. */
624 consumer_data.stream_count++;
625 consumer_data.need_update = 1;
626
627 rcu_read_unlock();
628 pthread_mutex_unlock(&stream->lock);
629 pthread_mutex_unlock(&stream->chan->timer_lock);
630 pthread_mutex_unlock(&stream->chan->lock);
631 pthread_mutex_unlock(&consumer_data.lock);
632
633 return ret;
634 }
635
636 void consumer_del_data_stream(struct lttng_consumer_stream *stream)
637 {
638 consumer_del_stream(stream, data_ht);
639 }
640
641 /*
642 * Add relayd socket to global consumer data hashtable. RCU read side lock MUST
643 * be acquired before calling this.
644 */
645 static int add_relayd(struct consumer_relayd_sock_pair *relayd)
646 {
647 int ret = 0;
648 struct lttng_ht_node_u64 *node;
649 struct lttng_ht_iter iter;
650
651 assert(relayd);
652
653 lttng_ht_lookup(consumer_data.relayd_ht,
654 &relayd->net_seq_idx, &iter);
655 node = lttng_ht_iter_get_node_u64(&iter);
656 if (node != NULL) {
657 goto end;
658 }
659 lttng_ht_add_unique_u64(consumer_data.relayd_ht, &relayd->node);
660
661 end:
662 return ret;
663 }
664
665 /*
666 * Allocate and return a consumer relayd socket.
667 */
668 struct consumer_relayd_sock_pair *consumer_allocate_relayd_sock_pair(
669 uint64_t net_seq_idx)
670 {
671 struct consumer_relayd_sock_pair *obj = NULL;
672
673 /* net sequence index of -1 is a failure */
674 if (net_seq_idx == (uint64_t) -1ULL) {
675 goto error;
676 }
677
678 obj = zmalloc(sizeof(struct consumer_relayd_sock_pair));
679 if (obj == NULL) {
680 PERROR("zmalloc relayd sock");
681 goto error;
682 }
683
684 obj->net_seq_idx = net_seq_idx;
685 obj->refcount = 0;
686 obj->destroy_flag = 0;
687 obj->control_sock.sock.fd = -1;
688 obj->data_sock.sock.fd = -1;
689 lttng_ht_node_init_u64(&obj->node, obj->net_seq_idx);
690 pthread_mutex_init(&obj->ctrl_sock_mutex, NULL);
691
692 error:
693 return obj;
694 }
695
696 /*
697 * Find a relayd socket pair in the global consumer data.
698 *
699 * Return the object if found else NULL.
700 * RCU read-side lock must be held across this call and while using the
701 * returned object.
702 */
703 struct consumer_relayd_sock_pair *consumer_find_relayd(uint64_t key)
704 {
705 struct lttng_ht_iter iter;
706 struct lttng_ht_node_u64 *node;
707 struct consumer_relayd_sock_pair *relayd = NULL;
708
709 /* Negative keys are lookup failures */
710 if (key == (uint64_t) -1ULL) {
711 goto error;
712 }
713
714 lttng_ht_lookup(consumer_data.relayd_ht, &key,
715 &iter);
716 node = lttng_ht_iter_get_node_u64(&iter);
717 if (node != NULL) {
718 relayd = caa_container_of(node, struct consumer_relayd_sock_pair, node);
719 }
720
721 error:
722 return relayd;
723 }
724
725 /*
726 * Find a relayd and send the stream
727 *
728 * Returns 0 on success, < 0 on error
729 */
730 int consumer_send_relayd_stream(struct lttng_consumer_stream *stream,
731 char *path)
732 {
733 int ret = 0;
734 struct consumer_relayd_sock_pair *relayd;
735
736 assert(stream);
737 assert(stream->net_seq_idx != -1ULL);
738 assert(path);
739
740 /* The stream is not metadata. Get relayd reference if exists. */
741 rcu_read_lock();
742 relayd = consumer_find_relayd(stream->net_seq_idx);
743 if (relayd != NULL) {
744 /* Add stream on the relayd */
745 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
746 ret = relayd_add_stream(&relayd->control_sock, stream->name,
747 path, &stream->relayd_stream_id,
748 stream->chan->tracefile_size, stream->chan->tracefile_count);
749 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
750 if (ret < 0) {
751 goto end;
752 }
753
754 uatomic_inc(&relayd->refcount);
755 stream->sent_to_relayd = 1;
756 } else {
757 ERR("Stream %" PRIu64 " relayd ID %" PRIu64 " unknown. Can't send it.",
758 stream->key, stream->net_seq_idx);
759 ret = -1;
760 goto end;
761 }
762
763 DBG("Stream %s with key %" PRIu64 " sent to relayd id %" PRIu64,
764 stream->name, stream->key, stream->net_seq_idx);
765
766 end:
767 rcu_read_unlock();
768 return ret;
769 }
770
771 /*
772 * Find a relayd and close the stream
773 */
774 void close_relayd_stream(struct lttng_consumer_stream *stream)
775 {
776 struct consumer_relayd_sock_pair *relayd;
777
778 /* The stream is not metadata. Get relayd reference if exists. */
779 rcu_read_lock();
780 relayd = consumer_find_relayd(stream->net_seq_idx);
781 if (relayd) {
782 consumer_stream_relayd_close(stream, relayd);
783 }
784 rcu_read_unlock();
785 }
786
787 /*
788 * Handle stream for relayd transmission if the stream applies for network
789 * streaming where the net sequence index is set.
790 *
791 * Return destination file descriptor or negative value on error.
792 */
793 static int write_relayd_stream_header(struct lttng_consumer_stream *stream,
794 size_t data_size, unsigned long padding,
795 struct consumer_relayd_sock_pair *relayd)
796 {
797 int outfd = -1, ret;
798 struct lttcomm_relayd_data_hdr data_hdr;
799
800 /* Safety net */
801 assert(stream);
802 assert(relayd);
803
804 /* Reset data header */
805 memset(&data_hdr, 0, sizeof(data_hdr));
806
807 if (stream->metadata_flag) {
808 /* Caller MUST acquire the relayd control socket lock */
809 ret = relayd_send_metadata(&relayd->control_sock, data_size);
810 if (ret < 0) {
811 goto error;
812 }
813
814 /* Metadata are always sent on the control socket. */
815 outfd = relayd->control_sock.sock.fd;
816 } else {
817 /* Set header with stream information */
818 data_hdr.stream_id = htobe64(stream->relayd_stream_id);
819 data_hdr.data_size = htobe32(data_size);
820 data_hdr.padding_size = htobe32(padding);
821 /*
822 * Note that net_seq_num below is assigned with the *current* value of
823 * next_net_seq_num and only after that the next_net_seq_num will be
824 * increment. This is why when issuing a command on the relayd using
825 * this next value, 1 should always be substracted in order to compare
826 * the last seen sequence number on the relayd side to the last sent.
827 */
828 data_hdr.net_seq_num = htobe64(stream->next_net_seq_num);
829 /* Other fields are zeroed previously */
830
831 ret = relayd_send_data_hdr(&relayd->data_sock, &data_hdr,
832 sizeof(data_hdr));
833 if (ret < 0) {
834 goto error;
835 }
836
837 ++stream->next_net_seq_num;
838
839 /* Set to go on data socket */
840 outfd = relayd->data_sock.sock.fd;
841 }
842
843 error:
844 return outfd;
845 }
846
847 /*
848 * Allocate and return a new lttng_consumer_channel object using the given key
849 * to initialize the hash table node.
850 *
851 * On error, return NULL.
852 */
853 struct lttng_consumer_channel *consumer_allocate_channel(uint64_t key,
854 uint64_t session_id,
855 const char *pathname,
856 const char *name,
857 uid_t uid,
858 gid_t gid,
859 uint64_t relayd_id,
860 enum lttng_event_output output,
861 uint64_t tracefile_size,
862 uint64_t tracefile_count,
863 uint64_t session_id_per_pid,
864 unsigned int monitor,
865 unsigned int live_timer_interval)
866 {
867 struct lttng_consumer_channel *channel;
868
869 channel = zmalloc(sizeof(*channel));
870 if (channel == NULL) {
871 PERROR("malloc struct lttng_consumer_channel");
872 goto end;
873 }
874
875 channel->key = key;
876 channel->refcount = 0;
877 channel->session_id = session_id;
878 channel->session_id_per_pid = session_id_per_pid;
879 channel->uid = uid;
880 channel->gid = gid;
881 channel->relayd_id = relayd_id;
882 channel->tracefile_size = tracefile_size;
883 channel->tracefile_count = tracefile_count;
884 channel->monitor = monitor;
885 channel->live_timer_interval = live_timer_interval;
886 pthread_mutex_init(&channel->lock, NULL);
887 pthread_mutex_init(&channel->timer_lock, NULL);
888
889 switch (output) {
890 case LTTNG_EVENT_SPLICE:
891 channel->output = CONSUMER_CHANNEL_SPLICE;
892 break;
893 case LTTNG_EVENT_MMAP:
894 channel->output = CONSUMER_CHANNEL_MMAP;
895 break;
896 default:
897 assert(0);
898 free(channel);
899 channel = NULL;
900 goto end;
901 }
902
903 /*
904 * In monitor mode, the streams associated with the channel will be put in
905 * a special list ONLY owned by this channel. So, the refcount is set to 1
906 * here meaning that the channel itself has streams that are referenced.
907 *
908 * On a channel deletion, once the channel is no longer visible, the
909 * refcount is decremented and checked for a zero value to delete it. With
910 * streams in no monitor mode, it will now be safe to destroy the channel.
911 */
912 if (!channel->monitor) {
913 channel->refcount = 1;
914 }
915
916 strncpy(channel->pathname, pathname, sizeof(channel->pathname));
917 channel->pathname[sizeof(channel->pathname) - 1] = '\0';
918
919 strncpy(channel->name, name, sizeof(channel->name));
920 channel->name[sizeof(channel->name) - 1] = '\0';
921
922 lttng_ht_node_init_u64(&channel->node, channel->key);
923
924 channel->wait_fd = -1;
925
926 CDS_INIT_LIST_HEAD(&channel->streams.head);
927
928 DBG("Allocated channel (key %" PRIu64 ")", channel->key)
929
930 end:
931 return channel;
932 }
933
934 /*
935 * Add a channel to the global list protected by a mutex.
936 *
937 * On success 0 is returned else a negative value.
938 */
939 int consumer_add_channel(struct lttng_consumer_channel *channel,
940 struct lttng_consumer_local_data *ctx)
941 {
942 int ret = 0;
943 struct lttng_ht_node_u64 *node;
944 struct lttng_ht_iter iter;
945
946 pthread_mutex_lock(&consumer_data.lock);
947 pthread_mutex_lock(&channel->lock);
948 pthread_mutex_lock(&channel->timer_lock);
949 rcu_read_lock();
950
951 lttng_ht_lookup(consumer_data.channel_ht, &channel->key, &iter);
952 node = lttng_ht_iter_get_node_u64(&iter);
953 if (node != NULL) {
954 /* Channel already exist. Ignore the insertion */
955 ERR("Consumer add channel key %" PRIu64 " already exists!",
956 channel->key);
957 ret = -EEXIST;
958 goto end;
959 }
960
961 lttng_ht_add_unique_u64(consumer_data.channel_ht, &channel->node);
962
963 end:
964 rcu_read_unlock();
965 pthread_mutex_unlock(&channel->timer_lock);
966 pthread_mutex_unlock(&channel->lock);
967 pthread_mutex_unlock(&consumer_data.lock);
968
969 if (!ret && channel->wait_fd != -1 &&
970 channel->type == CONSUMER_CHANNEL_TYPE_DATA) {
971 notify_channel_pipe(ctx, channel, -1, CONSUMER_CHANNEL_ADD);
972 }
973 return ret;
974 }
975
976 /*
977 * Allocate the pollfd structure and the local view of the out fds to avoid
978 * doing a lookup in the linked list and concurrency issues when writing is
979 * needed. Called with consumer_data.lock held.
980 *
981 * Returns the number of fds in the structures.
982 */
983 static int update_poll_array(struct lttng_consumer_local_data *ctx,
984 struct pollfd **pollfd, struct lttng_consumer_stream **local_stream,
985 struct lttng_ht *ht)
986 {
987 int i = 0;
988 struct lttng_ht_iter iter;
989 struct lttng_consumer_stream *stream;
990
991 assert(ctx);
992 assert(ht);
993 assert(pollfd);
994 assert(local_stream);
995
996 DBG("Updating poll fd array");
997 rcu_read_lock();
998 cds_lfht_for_each_entry(ht->ht, &iter.iter, stream, node.node) {
999 /*
1000 * Only active streams with an active end point can be added to the
1001 * poll set and local stream storage of the thread.
1002 *
1003 * There is a potential race here for endpoint_status to be updated
1004 * just after the check. However, this is OK since the stream(s) will
1005 * be deleted once the thread is notified that the end point state has
1006 * changed where this function will be called back again.
1007 */
1008 if (stream->state != LTTNG_CONSUMER_ACTIVE_STREAM ||
1009 stream->endpoint_status == CONSUMER_ENDPOINT_INACTIVE) {
1010 continue;
1011 }
1012 /*
1013 * This clobbers way too much the debug output. Uncomment that if you
1014 * need it for debugging purposes.
1015 *
1016 * DBG("Active FD %d", stream->wait_fd);
1017 */
1018 (*pollfd)[i].fd = stream->wait_fd;
1019 (*pollfd)[i].events = POLLIN | POLLPRI;
1020 local_stream[i] = stream;
1021 i++;
1022 }
1023 rcu_read_unlock();
1024
1025 /*
1026 * Insert the consumer_data_pipe at the end of the array and don't
1027 * increment i so nb_fd is the number of real FD.
1028 */
1029 (*pollfd)[i].fd = lttng_pipe_get_readfd(ctx->consumer_data_pipe);
1030 (*pollfd)[i].events = POLLIN | POLLPRI;
1031 return i;
1032 }
1033
1034 /*
1035 * Poll on the should_quit pipe and the command socket return -1 on error and
1036 * should exit, 0 if data is available on the command socket
1037 */
1038 int lttng_consumer_poll_socket(struct pollfd *consumer_sockpoll)
1039 {
1040 int num_rdy;
1041
1042 restart:
1043 num_rdy = poll(consumer_sockpoll, 2, -1);
1044 if (num_rdy == -1) {
1045 /*
1046 * Restart interrupted system call.
1047 */
1048 if (errno == EINTR) {
1049 goto restart;
1050 }
1051 PERROR("Poll error");
1052 goto exit;
1053 }
1054 if (consumer_sockpoll[0].revents & (POLLIN | POLLPRI)) {
1055 DBG("consumer_should_quit wake up");
1056 goto exit;
1057 }
1058 return 0;
1059
1060 exit:
1061 return -1;
1062 }
1063
1064 /*
1065 * Set the error socket.
1066 */
1067 void lttng_consumer_set_error_sock(struct lttng_consumer_local_data *ctx,
1068 int sock)
1069 {
1070 ctx->consumer_error_socket = sock;
1071 }
1072
1073 /*
1074 * Set the command socket path.
1075 */
1076 void lttng_consumer_set_command_sock_path(
1077 struct lttng_consumer_local_data *ctx, char *sock)
1078 {
1079 ctx->consumer_command_sock_path = sock;
1080 }
1081
1082 /*
1083 * Send return code to the session daemon.
1084 * If the socket is not defined, we return 0, it is not a fatal error
1085 */
1086 int lttng_consumer_send_error(struct lttng_consumer_local_data *ctx, int cmd)
1087 {
1088 if (ctx->consumer_error_socket > 0) {
1089 return lttcomm_send_unix_sock(ctx->consumer_error_socket, &cmd,
1090 sizeof(enum lttcomm_sessiond_command));
1091 }
1092
1093 return 0;
1094 }
1095
1096 /*
1097 * Close all the tracefiles and stream fds and MUST be called when all
1098 * instances are destroyed i.e. when all threads were joined and are ended.
1099 */
1100 void lttng_consumer_cleanup(void)
1101 {
1102 struct lttng_ht_iter iter;
1103 struct lttng_consumer_channel *channel;
1104
1105 rcu_read_lock();
1106
1107 cds_lfht_for_each_entry(consumer_data.channel_ht->ht, &iter.iter, channel,
1108 node.node) {
1109 consumer_del_channel(channel);
1110 }
1111
1112 rcu_read_unlock();
1113
1114 lttng_ht_destroy(consumer_data.channel_ht);
1115
1116 cleanup_relayd_ht();
1117
1118 lttng_ht_destroy(consumer_data.stream_per_chan_id_ht);
1119
1120 /*
1121 * This HT contains streams that are freed by either the metadata thread or
1122 * the data thread so we do *nothing* on the hash table and simply destroy
1123 * it.
1124 */
1125 lttng_ht_destroy(consumer_data.stream_list_ht);
1126 }
1127
1128 /*
1129 * Called from signal handler.
1130 */
1131 void lttng_consumer_should_exit(struct lttng_consumer_local_data *ctx)
1132 {
1133 ssize_t ret;
1134
1135 consumer_quit = 1;
1136 ret = lttng_write(ctx->consumer_should_quit[1], "4", 1);
1137 if (ret < 1) {
1138 PERROR("write consumer quit");
1139 }
1140
1141 DBG("Consumer flag that it should quit");
1142 }
1143
1144 void lttng_consumer_sync_trace_file(struct lttng_consumer_stream *stream,
1145 off_t orig_offset)
1146 {
1147 int outfd = stream->out_fd;
1148
1149 /*
1150 * This does a blocking write-and-wait on any page that belongs to the
1151 * subbuffer prior to the one we just wrote.
1152 * Don't care about error values, as these are just hints and ways to
1153 * limit the amount of page cache used.
1154 */
1155 if (orig_offset < stream->max_sb_size) {
1156 return;
1157 }
1158 lttng_sync_file_range(outfd, orig_offset - stream->max_sb_size,
1159 stream->max_sb_size,
1160 SYNC_FILE_RANGE_WAIT_BEFORE
1161 | SYNC_FILE_RANGE_WRITE
1162 | SYNC_FILE_RANGE_WAIT_AFTER);
1163 /*
1164 * Give hints to the kernel about how we access the file:
1165 * POSIX_FADV_DONTNEED : we won't re-access data in a near future after
1166 * we write it.
1167 *
1168 * We need to call fadvise again after the file grows because the
1169 * kernel does not seem to apply fadvise to non-existing parts of the
1170 * file.
1171 *
1172 * Call fadvise _after_ having waited for the page writeback to
1173 * complete because the dirty page writeback semantic is not well
1174 * defined. So it can be expected to lead to lower throughput in
1175 * streaming.
1176 */
1177 posix_fadvise(outfd, orig_offset - stream->max_sb_size,
1178 stream->max_sb_size, POSIX_FADV_DONTNEED);
1179 }
1180
1181 /*
1182 * Initialise the necessary environnement :
1183 * - create a new context
1184 * - create the poll_pipe
1185 * - create the should_quit pipe (for signal handler)
1186 * - create the thread pipe (for splice)
1187 *
1188 * Takes a function pointer as argument, this function is called when data is
1189 * available on a buffer. This function is responsible to do the
1190 * kernctl_get_next_subbuf, read the data with mmap or splice depending on the
1191 * buffer configuration and then kernctl_put_next_subbuf at the end.
1192 *
1193 * Returns a pointer to the new context or NULL on error.
1194 */
1195 struct lttng_consumer_local_data *lttng_consumer_create(
1196 enum lttng_consumer_type type,
1197 ssize_t (*buffer_ready)(struct lttng_consumer_stream *stream,
1198 struct lttng_consumer_local_data *ctx),
1199 int (*recv_channel)(struct lttng_consumer_channel *channel),
1200 int (*recv_stream)(struct lttng_consumer_stream *stream),
1201 int (*update_stream)(uint64_t stream_key, uint32_t state))
1202 {
1203 int ret;
1204 struct lttng_consumer_local_data *ctx;
1205
1206 assert(consumer_data.type == LTTNG_CONSUMER_UNKNOWN ||
1207 consumer_data.type == type);
1208 consumer_data.type = type;
1209
1210 ctx = zmalloc(sizeof(struct lttng_consumer_local_data));
1211 if (ctx == NULL) {
1212 PERROR("allocating context");
1213 goto error;
1214 }
1215
1216 ctx->consumer_error_socket = -1;
1217 ctx->consumer_metadata_socket = -1;
1218 pthread_mutex_init(&ctx->metadata_socket_lock, NULL);
1219 /* assign the callbacks */
1220 ctx->on_buffer_ready = buffer_ready;
1221 ctx->on_recv_channel = recv_channel;
1222 ctx->on_recv_stream = recv_stream;
1223 ctx->on_update_stream = update_stream;
1224
1225 ctx->consumer_data_pipe = lttng_pipe_open(0);
1226 if (!ctx->consumer_data_pipe) {
1227 goto error_poll_pipe;
1228 }
1229
1230 ret = pipe(ctx->consumer_should_quit);
1231 if (ret < 0) {
1232 PERROR("Error creating recv pipe");
1233 goto error_quit_pipe;
1234 }
1235
1236 ret = pipe(ctx->consumer_thread_pipe);
1237 if (ret < 0) {
1238 PERROR("Error creating thread pipe");
1239 goto error_thread_pipe;
1240 }
1241
1242 ret = pipe(ctx->consumer_channel_pipe);
1243 if (ret < 0) {
1244 PERROR("Error creating channel pipe");
1245 goto error_channel_pipe;
1246 }
1247
1248 ctx->consumer_metadata_pipe = lttng_pipe_open(0);
1249 if (!ctx->consumer_metadata_pipe) {
1250 goto error_metadata_pipe;
1251 }
1252
1253 ret = utils_create_pipe(ctx->consumer_splice_metadata_pipe);
1254 if (ret < 0) {
1255 goto error_splice_pipe;
1256 }
1257
1258 return ctx;
1259
1260 error_splice_pipe:
1261 lttng_pipe_destroy(ctx->consumer_metadata_pipe);
1262 error_metadata_pipe:
1263 utils_close_pipe(ctx->consumer_channel_pipe);
1264 error_channel_pipe:
1265 utils_close_pipe(ctx->consumer_thread_pipe);
1266 error_thread_pipe:
1267 utils_close_pipe(ctx->consumer_should_quit);
1268 error_quit_pipe:
1269 lttng_pipe_destroy(ctx->consumer_data_pipe);
1270 error_poll_pipe:
1271 free(ctx);
1272 error:
1273 return NULL;
1274 }
1275
1276 /*
1277 * Close all fds associated with the instance and free the context.
1278 */
1279 void lttng_consumer_destroy(struct lttng_consumer_local_data *ctx)
1280 {
1281 int ret;
1282
1283 DBG("Consumer destroying it. Closing everything.");
1284
1285 ret = close(ctx->consumer_error_socket);
1286 if (ret) {
1287 PERROR("close");
1288 }
1289 ret = close(ctx->consumer_metadata_socket);
1290 if (ret) {
1291 PERROR("close");
1292 }
1293 utils_close_pipe(ctx->consumer_thread_pipe);
1294 utils_close_pipe(ctx->consumer_channel_pipe);
1295 lttng_pipe_destroy(ctx->consumer_data_pipe);
1296 lttng_pipe_destroy(ctx->consumer_metadata_pipe);
1297 utils_close_pipe(ctx->consumer_should_quit);
1298 utils_close_pipe(ctx->consumer_splice_metadata_pipe);
1299
1300 unlink(ctx->consumer_command_sock_path);
1301 free(ctx);
1302 }
1303
1304 /*
1305 * Write the metadata stream id on the specified file descriptor.
1306 */
1307 static int write_relayd_metadata_id(int fd,
1308 struct lttng_consumer_stream *stream,
1309 struct consumer_relayd_sock_pair *relayd, unsigned long padding)
1310 {
1311 ssize_t ret;
1312 struct lttcomm_relayd_metadata_payload hdr;
1313
1314 hdr.stream_id = htobe64(stream->relayd_stream_id);
1315 hdr.padding_size = htobe32(padding);
1316 ret = lttng_write(fd, (void *) &hdr, sizeof(hdr));
1317 if (ret < sizeof(hdr)) {
1318 /*
1319 * This error means that the fd's end is closed so ignore the perror
1320 * not to clubber the error output since this can happen in a normal
1321 * code path.
1322 */
1323 if (errno != EPIPE) {
1324 PERROR("write metadata stream id");
1325 }
1326 DBG3("Consumer failed to write relayd metadata id (errno: %d)", errno);
1327 /*
1328 * Set ret to a negative value because if ret != sizeof(hdr), we don't
1329 * handle writting the missing part so report that as an error and
1330 * don't lie to the caller.
1331 */
1332 ret = -1;
1333 goto end;
1334 }
1335 DBG("Metadata stream id %" PRIu64 " with padding %lu written before data",
1336 stream->relayd_stream_id, padding);
1337
1338 end:
1339 return (int) ret;
1340 }
1341
1342 /*
1343 * Mmap the ring buffer, read it and write the data to the tracefile. This is a
1344 * core function for writing trace buffers to either the local filesystem or
1345 * the network.
1346 *
1347 * It must be called with the stream lock held.
1348 *
1349 * Careful review MUST be put if any changes occur!
1350 *
1351 * Returns the number of bytes written
1352 */
1353 ssize_t lttng_consumer_on_read_subbuffer_mmap(
1354 struct lttng_consumer_local_data *ctx,
1355 struct lttng_consumer_stream *stream, unsigned long len,
1356 unsigned long padding,
1357 struct ctf_packet_index *index)
1358 {
1359 unsigned long mmap_offset;
1360 void *mmap_base;
1361 ssize_t ret = 0, written = 0;
1362 off_t orig_offset = stream->out_fd_offset;
1363 /* Default is on the disk */
1364 int outfd = stream->out_fd;
1365 struct consumer_relayd_sock_pair *relayd = NULL;
1366 unsigned int relayd_hang_up = 0;
1367
1368 /* RCU lock for the relayd pointer */
1369 rcu_read_lock();
1370
1371 /* Flag that the current stream if set for network streaming. */
1372 if (stream->net_seq_idx != (uint64_t) -1ULL) {
1373 relayd = consumer_find_relayd(stream->net_seq_idx);
1374 if (relayd == NULL) {
1375 ret = -EPIPE;
1376 goto end;
1377 }
1378 }
1379
1380 /* get the offset inside the fd to mmap */
1381 switch (consumer_data.type) {
1382 case LTTNG_CONSUMER_KERNEL:
1383 mmap_base = stream->mmap_base;
1384 ret = kernctl_get_mmap_read_offset(stream->wait_fd, &mmap_offset);
1385 if (ret != 0) {
1386 PERROR("tracer ctl get_mmap_read_offset");
1387 written = -errno;
1388 goto end;
1389 }
1390 break;
1391 case LTTNG_CONSUMER32_UST:
1392 case LTTNG_CONSUMER64_UST:
1393 mmap_base = lttng_ustctl_get_mmap_base(stream);
1394 if (!mmap_base) {
1395 ERR("read mmap get mmap base for stream %s", stream->name);
1396 written = -EPERM;
1397 goto end;
1398 }
1399 ret = lttng_ustctl_get_mmap_read_offset(stream, &mmap_offset);
1400 if (ret != 0) {
1401 PERROR("tracer ctl get_mmap_read_offset");
1402 written = ret;
1403 goto end;
1404 }
1405 break;
1406 default:
1407 ERR("Unknown consumer_data type");
1408 assert(0);
1409 }
1410
1411 /* Handle stream on the relayd if the output is on the network */
1412 if (relayd) {
1413 unsigned long netlen = len;
1414
1415 /*
1416 * Lock the control socket for the complete duration of the function
1417 * since from this point on we will use the socket.
1418 */
1419 if (stream->metadata_flag) {
1420 /* Metadata requires the control socket. */
1421 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
1422 netlen += sizeof(struct lttcomm_relayd_metadata_payload);
1423 }
1424
1425 ret = write_relayd_stream_header(stream, netlen, padding, relayd);
1426 if (ret >= 0) {
1427 /* Use the returned socket. */
1428 outfd = ret;
1429
1430 /* Write metadata stream id before payload */
1431 if (stream->metadata_flag) {
1432 ret = write_relayd_metadata_id(outfd, stream, relayd, padding);
1433 if (ret < 0) {
1434 written = ret;
1435 /* Socket operation failed. We consider the relayd dead */
1436 if (ret == -EPIPE || ret == -EINVAL) {
1437 relayd_hang_up = 1;
1438 goto write_error;
1439 }
1440 goto end;
1441 }
1442 }
1443 } else {
1444 /* Socket operation failed. We consider the relayd dead */
1445 if (ret == -EPIPE || ret == -EINVAL) {
1446 relayd_hang_up = 1;
1447 goto write_error;
1448 }
1449 /* Else, use the default set before which is the filesystem. */
1450 }
1451 } else {
1452 /* No streaming, we have to set the len with the full padding */
1453 len += padding;
1454
1455 /*
1456 * Check if we need to change the tracefile before writing the packet.
1457 */
1458 if (stream->chan->tracefile_size > 0 &&
1459 (stream->tracefile_size_current + len) >
1460 stream->chan->tracefile_size) {
1461 ret = utils_rotate_stream_file(stream->chan->pathname,
1462 stream->name, stream->chan->tracefile_size,
1463 stream->chan->tracefile_count, stream->uid, stream->gid,
1464 stream->out_fd, &(stream->tracefile_count_current),
1465 &stream->out_fd);
1466 if (ret < 0) {
1467 ERR("Rotating output file");
1468 goto end;
1469 }
1470 outfd = stream->out_fd;
1471
1472 if (stream->index_fd >= 0) {
1473 ret = index_create_file(stream->chan->pathname,
1474 stream->name, stream->uid, stream->gid,
1475 stream->chan->tracefile_size,
1476 stream->tracefile_count_current);
1477 if (ret < 0) {
1478 goto end;
1479 }
1480 stream->index_fd = ret;
1481 }
1482
1483 /* Reset current size because we just perform a rotation. */
1484 stream->tracefile_size_current = 0;
1485 stream->out_fd_offset = 0;
1486 orig_offset = 0;
1487 }
1488 stream->tracefile_size_current += len;
1489 if (index) {
1490 index->offset = htobe64(stream->out_fd_offset);
1491 }
1492 }
1493
1494 while (len > 0) {
1495 ret = lttng_write(outfd, mmap_base + mmap_offset, len);
1496 DBG("Consumer mmap write() ret %zd (len %lu)", ret, len);
1497 if (ret < len) {
1498 /*
1499 * This is possible if the fd is closed on the other side (outfd)
1500 * or any write problem. It can be verbose a bit for a normal
1501 * execution if for instance the relayd is stopped abruptly. This
1502 * can happen so set this to a DBG statement.
1503 */
1504 DBG("Error in file write mmap");
1505 if (written == 0) {
1506 written = -errno;
1507 }
1508 /* Socket operation failed. We consider the relayd dead */
1509 if (errno == EPIPE || errno == EINVAL) {
1510 relayd_hang_up = 1;
1511 goto write_error;
1512 }
1513 goto end;
1514 } else if (ret > len) {
1515 PERROR("Error in file write (ret %zd > len %lu)", ret, len);
1516 written += ret;
1517 goto end;
1518 } else {
1519 len -= ret;
1520 mmap_offset += ret;
1521 }
1522
1523 /* This call is useless on a socket so better save a syscall. */
1524 if (!relayd) {
1525 /* This won't block, but will start writeout asynchronously */
1526 lttng_sync_file_range(outfd, stream->out_fd_offset, ret,
1527 SYNC_FILE_RANGE_WRITE);
1528 stream->out_fd_offset += ret;
1529 }
1530 stream->output_written += ret;
1531 written += ret;
1532 }
1533 lttng_consumer_sync_trace_file(stream, orig_offset);
1534
1535 write_error:
1536 /*
1537 * This is a special case that the relayd has closed its socket. Let's
1538 * cleanup the relayd object and all associated streams.
1539 */
1540 if (relayd && relayd_hang_up) {
1541 cleanup_relayd(relayd, ctx);
1542 }
1543
1544 end:
1545 /* Unlock only if ctrl socket used */
1546 if (relayd && stream->metadata_flag) {
1547 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
1548 }
1549
1550 rcu_read_unlock();
1551 return written;
1552 }
1553
1554 /*
1555 * Splice the data from the ring buffer to the tracefile.
1556 *
1557 * It must be called with the stream lock held.
1558 *
1559 * Returns the number of bytes spliced.
1560 */
1561 ssize_t lttng_consumer_on_read_subbuffer_splice(
1562 struct lttng_consumer_local_data *ctx,
1563 struct lttng_consumer_stream *stream, unsigned long len,
1564 unsigned long padding,
1565 struct ctf_packet_index *index)
1566 {
1567 ssize_t ret = 0, written = 0, ret_splice = 0;
1568 loff_t offset = 0;
1569 off_t orig_offset = stream->out_fd_offset;
1570 int fd = stream->wait_fd;
1571 /* Default is on the disk */
1572 int outfd = stream->out_fd;
1573 struct consumer_relayd_sock_pair *relayd = NULL;
1574 int *splice_pipe;
1575 unsigned int relayd_hang_up = 0;
1576
1577 switch (consumer_data.type) {
1578 case LTTNG_CONSUMER_KERNEL:
1579 break;
1580 case LTTNG_CONSUMER32_UST:
1581 case LTTNG_CONSUMER64_UST:
1582 /* Not supported for user space tracing */
1583 return -ENOSYS;
1584 default:
1585 ERR("Unknown consumer_data type");
1586 assert(0);
1587 }
1588
1589 /* RCU lock for the relayd pointer */
1590 rcu_read_lock();
1591
1592 /* Flag that the current stream if set for network streaming. */
1593 if (stream->net_seq_idx != (uint64_t) -1ULL) {
1594 relayd = consumer_find_relayd(stream->net_seq_idx);
1595 if (relayd == NULL) {
1596 ret = -EPIPE;
1597 goto end;
1598 }
1599 }
1600
1601 /*
1602 * Choose right pipe for splice. Metadata and trace data are handled by
1603 * different threads hence the use of two pipes in order not to race or
1604 * corrupt the written data.
1605 */
1606 if (stream->metadata_flag) {
1607 splice_pipe = ctx->consumer_splice_metadata_pipe;
1608 } else {
1609 splice_pipe = ctx->consumer_thread_pipe;
1610 }
1611
1612 /* Write metadata stream id before payload */
1613 if (relayd) {
1614 int total_len = len;
1615
1616 if (stream->metadata_flag) {
1617 /*
1618 * Lock the control socket for the complete duration of the function
1619 * since from this point on we will use the socket.
1620 */
1621 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
1622
1623 ret = write_relayd_metadata_id(splice_pipe[1], stream, relayd,
1624 padding);
1625 if (ret < 0) {
1626 written = ret;
1627 /* Socket operation failed. We consider the relayd dead */
1628 if (ret == -EBADF) {
1629 WARN("Remote relayd disconnected. Stopping");
1630 relayd_hang_up = 1;
1631 goto write_error;
1632 }
1633 goto end;
1634 }
1635
1636 total_len += sizeof(struct lttcomm_relayd_metadata_payload);
1637 }
1638
1639 ret = write_relayd_stream_header(stream, total_len, padding, relayd);
1640 if (ret >= 0) {
1641 /* Use the returned socket. */
1642 outfd = ret;
1643 } else {
1644 /* Socket operation failed. We consider the relayd dead */
1645 if (ret == -EBADF) {
1646 WARN("Remote relayd disconnected. Stopping");
1647 relayd_hang_up = 1;
1648 goto write_error;
1649 }
1650 goto end;
1651 }
1652 } else {
1653 /* No streaming, we have to set the len with the full padding */
1654 len += padding;
1655
1656 /*
1657 * Check if we need to change the tracefile before writing the packet.
1658 */
1659 if (stream->chan->tracefile_size > 0 &&
1660 (stream->tracefile_size_current + len) >
1661 stream->chan->tracefile_size) {
1662 ret = utils_rotate_stream_file(stream->chan->pathname,
1663 stream->name, stream->chan->tracefile_size,
1664 stream->chan->tracefile_count, stream->uid, stream->gid,
1665 stream->out_fd, &(stream->tracefile_count_current),
1666 &stream->out_fd);
1667 if (ret < 0) {
1668 ERR("Rotating output file");
1669 goto end;
1670 }
1671 outfd = stream->out_fd;
1672
1673 if (stream->index_fd >= 0) {
1674 ret = index_create_file(stream->chan->pathname,
1675 stream->name, stream->uid, stream->gid,
1676 stream->chan->tracefile_size,
1677 stream->tracefile_count_current);
1678 if (ret < 0) {
1679 goto end;
1680 }
1681 stream->index_fd = ret;
1682 }
1683
1684 /* Reset current size because we just perform a rotation. */
1685 stream->tracefile_size_current = 0;
1686 stream->out_fd_offset = 0;
1687 orig_offset = 0;
1688 }
1689 stream->tracefile_size_current += len;
1690 index->offset = htobe64(stream->out_fd_offset);
1691 }
1692
1693 while (len > 0) {
1694 DBG("splice chan to pipe offset %lu of len %lu (fd : %d, pipe: %d)",
1695 (unsigned long)offset, len, fd, splice_pipe[1]);
1696 ret_splice = splice(fd, &offset, splice_pipe[1], NULL, len,
1697 SPLICE_F_MOVE | SPLICE_F_MORE);
1698 DBG("splice chan to pipe, ret %zd", ret_splice);
1699 if (ret_splice < 0) {
1700 PERROR("Error in relay splice");
1701 if (written == 0) {
1702 written = ret_splice;
1703 }
1704 ret = errno;
1705 goto splice_error;
1706 }
1707
1708 /* Handle stream on the relayd if the output is on the network */
1709 if (relayd) {
1710 if (stream->metadata_flag) {
1711 size_t metadata_payload_size =
1712 sizeof(struct lttcomm_relayd_metadata_payload);
1713
1714 /* Update counter to fit the spliced data */
1715 ret_splice += metadata_payload_size;
1716 len += metadata_payload_size;
1717 /*
1718 * We do this so the return value can match the len passed as
1719 * argument to this function.
1720 */
1721 written -= metadata_payload_size;
1722 }
1723 }
1724
1725 /* Splice data out */
1726 ret_splice = splice(splice_pipe[0], NULL, outfd, NULL,
1727 ret_splice, SPLICE_F_MOVE | SPLICE_F_MORE);
1728 DBG("Consumer splice pipe to file, ret %zd", ret_splice);
1729 if (ret_splice < 0) {
1730 PERROR("Error in file splice");
1731 if (written == 0) {
1732 written = ret_splice;
1733 }
1734 /* Socket operation failed. We consider the relayd dead */
1735 if (errno == EBADF || errno == EPIPE) {
1736 WARN("Remote relayd disconnected. Stopping");
1737 relayd_hang_up = 1;
1738 goto write_error;
1739 }
1740 ret = errno;
1741 goto splice_error;
1742 } else if (ret_splice > len) {
1743 errno = EINVAL;
1744 PERROR("Wrote more data than requested %zd (len: %lu)",
1745 ret_splice, len);
1746 written += ret_splice;
1747 ret = errno;
1748 goto splice_error;
1749 }
1750 len -= ret_splice;
1751
1752 /* This call is useless on a socket so better save a syscall. */
1753 if (!relayd) {
1754 /* This won't block, but will start writeout asynchronously */
1755 lttng_sync_file_range(outfd, stream->out_fd_offset, ret_splice,
1756 SYNC_FILE_RANGE_WRITE);
1757 stream->out_fd_offset += ret_splice;
1758 }
1759 stream->output_written += ret_splice;
1760 written += ret_splice;
1761 }
1762 lttng_consumer_sync_trace_file(stream, orig_offset);
1763
1764 ret = ret_splice;
1765
1766 goto end;
1767
1768 write_error:
1769 /*
1770 * This is a special case that the relayd has closed its socket. Let's
1771 * cleanup the relayd object and all associated streams.
1772 */
1773 if (relayd && relayd_hang_up) {
1774 cleanup_relayd(relayd, ctx);
1775 /* Skip splice error so the consumer does not fail */
1776 goto end;
1777 }
1778
1779 splice_error:
1780 /* send the appropriate error description to sessiond */
1781 switch (ret) {
1782 case EINVAL:
1783 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_SPLICE_EINVAL);
1784 break;
1785 case ENOMEM:
1786 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_SPLICE_ENOMEM);
1787 break;
1788 case ESPIPE:
1789 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_SPLICE_ESPIPE);
1790 break;
1791 }
1792
1793 end:
1794 if (relayd && stream->metadata_flag) {
1795 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
1796 }
1797
1798 rcu_read_unlock();
1799 return written;
1800 }
1801
1802 /*
1803 * Take a snapshot for a specific fd
1804 *
1805 * Returns 0 on success, < 0 on error
1806 */
1807 int lttng_consumer_take_snapshot(struct lttng_consumer_stream *stream)
1808 {
1809 switch (consumer_data.type) {
1810 case LTTNG_CONSUMER_KERNEL:
1811 return lttng_kconsumer_take_snapshot(stream);
1812 case LTTNG_CONSUMER32_UST:
1813 case LTTNG_CONSUMER64_UST:
1814 return lttng_ustconsumer_take_snapshot(stream);
1815 default:
1816 ERR("Unknown consumer_data type");
1817 assert(0);
1818 return -ENOSYS;
1819 }
1820 }
1821
1822 /*
1823 * Get the produced position
1824 *
1825 * Returns 0 on success, < 0 on error
1826 */
1827 int lttng_consumer_get_produced_snapshot(struct lttng_consumer_stream *stream,
1828 unsigned long *pos)
1829 {
1830 switch (consumer_data.type) {
1831 case LTTNG_CONSUMER_KERNEL:
1832 return lttng_kconsumer_get_produced_snapshot(stream, pos);
1833 case LTTNG_CONSUMER32_UST:
1834 case LTTNG_CONSUMER64_UST:
1835 return lttng_ustconsumer_get_produced_snapshot(stream, pos);
1836 default:
1837 ERR("Unknown consumer_data type");
1838 assert(0);
1839 return -ENOSYS;
1840 }
1841 }
1842
1843 int lttng_consumer_recv_cmd(struct lttng_consumer_local_data *ctx,
1844 int sock, struct pollfd *consumer_sockpoll)
1845 {
1846 switch (consumer_data.type) {
1847 case LTTNG_CONSUMER_KERNEL:
1848 return lttng_kconsumer_recv_cmd(ctx, sock, consumer_sockpoll);
1849 case LTTNG_CONSUMER32_UST:
1850 case LTTNG_CONSUMER64_UST:
1851 return lttng_ustconsumer_recv_cmd(ctx, sock, consumer_sockpoll);
1852 default:
1853 ERR("Unknown consumer_data type");
1854 assert(0);
1855 return -ENOSYS;
1856 }
1857 }
1858
1859 /*
1860 * Iterate over all streams of the hashtable and free them properly.
1861 *
1862 * WARNING: *MUST* be used with data stream only.
1863 */
1864 static void destroy_data_stream_ht(struct lttng_ht *ht)
1865 {
1866 struct lttng_ht_iter iter;
1867 struct lttng_consumer_stream *stream;
1868
1869 if (ht == NULL) {
1870 return;
1871 }
1872
1873 rcu_read_lock();
1874 cds_lfht_for_each_entry(ht->ht, &iter.iter, stream, node.node) {
1875 /*
1876 * Ignore return value since we are currently cleaning up so any error
1877 * can't be handled.
1878 */
1879 (void) consumer_del_stream(stream, ht);
1880 }
1881 rcu_read_unlock();
1882
1883 lttng_ht_destroy(ht);
1884 }
1885
1886 /*
1887 * Iterate over all streams of the hashtable and free them properly.
1888 *
1889 * XXX: Should not be only for metadata stream or else use an other name.
1890 */
1891 static void destroy_stream_ht(struct lttng_ht *ht)
1892 {
1893 struct lttng_ht_iter iter;
1894 struct lttng_consumer_stream *stream;
1895
1896 if (ht == NULL) {
1897 return;
1898 }
1899
1900 rcu_read_lock();
1901 cds_lfht_for_each_entry(ht->ht, &iter.iter, stream, node.node) {
1902 /*
1903 * Ignore return value since we are currently cleaning up so any error
1904 * can't be handled.
1905 */
1906 (void) consumer_del_metadata_stream(stream, ht);
1907 }
1908 rcu_read_unlock();
1909
1910 lttng_ht_destroy(ht);
1911 }
1912
1913 void lttng_consumer_close_metadata(void)
1914 {
1915 switch (consumer_data.type) {
1916 case LTTNG_CONSUMER_KERNEL:
1917 /*
1918 * The Kernel consumer has a different metadata scheme so we don't
1919 * close anything because the stream will be closed by the session
1920 * daemon.
1921 */
1922 break;
1923 case LTTNG_CONSUMER32_UST:
1924 case LTTNG_CONSUMER64_UST:
1925 /*
1926 * Close all metadata streams. The metadata hash table is passed and
1927 * this call iterates over it by closing all wakeup fd. This is safe
1928 * because at this point we are sure that the metadata producer is
1929 * either dead or blocked.
1930 */
1931 lttng_ustconsumer_close_metadata(metadata_ht);
1932 break;
1933 default:
1934 ERR("Unknown consumer_data type");
1935 assert(0);
1936 }
1937 }
1938
1939 /*
1940 * Clean up a metadata stream and free its memory.
1941 */
1942 void consumer_del_metadata_stream(struct lttng_consumer_stream *stream,
1943 struct lttng_ht *ht)
1944 {
1945 int ret;
1946 struct lttng_ht_iter iter;
1947 struct lttng_consumer_channel *free_chan = NULL;
1948 struct consumer_relayd_sock_pair *relayd;
1949
1950 assert(stream);
1951 /*
1952 * This call should NEVER receive regular stream. It must always be
1953 * metadata stream and this is crucial for data structure synchronization.
1954 */
1955 assert(stream->metadata_flag);
1956
1957 DBG3("Consumer delete metadata stream %d", stream->wait_fd);
1958
1959 if (ht == NULL) {
1960 /* Means the stream was allocated but not successfully added */
1961 goto free_stream_rcu;
1962 }
1963
1964 pthread_mutex_lock(&consumer_data.lock);
1965 pthread_mutex_lock(&stream->chan->lock);
1966 pthread_mutex_lock(&stream->lock);
1967
1968 switch (consumer_data.type) {
1969 case LTTNG_CONSUMER_KERNEL:
1970 if (stream->mmap_base != NULL) {
1971 ret = munmap(stream->mmap_base, stream->mmap_len);
1972 if (ret != 0) {
1973 PERROR("munmap metadata stream");
1974 }
1975 }
1976 if (stream->wait_fd >= 0) {
1977 ret = close(stream->wait_fd);
1978 if (ret < 0) {
1979 PERROR("close kernel metadata wait_fd");
1980 }
1981 }
1982 break;
1983 case LTTNG_CONSUMER32_UST:
1984 case LTTNG_CONSUMER64_UST:
1985 if (stream->monitor) {
1986 /* close the write-side in close_metadata */
1987 ret = close(stream->ust_metadata_poll_pipe[0]);
1988 if (ret < 0) {
1989 PERROR("Close UST metadata read-side poll pipe");
1990 }
1991 }
1992 lttng_ustconsumer_del_stream(stream);
1993 break;
1994 default:
1995 ERR("Unknown consumer_data type");
1996 assert(0);
1997 goto end;
1998 }
1999
2000 rcu_read_lock();
2001 iter.iter.node = &stream->node.node;
2002 ret = lttng_ht_del(ht, &iter);
2003 assert(!ret);
2004
2005 iter.iter.node = &stream->node_channel_id.node;
2006 ret = lttng_ht_del(consumer_data.stream_per_chan_id_ht, &iter);
2007 assert(!ret);
2008
2009 iter.iter.node = &stream->node_session_id.node;
2010 ret = lttng_ht_del(consumer_data.stream_list_ht, &iter);
2011 assert(!ret);
2012 rcu_read_unlock();
2013
2014 if (stream->out_fd >= 0) {
2015 ret = close(stream->out_fd);
2016 if (ret) {
2017 PERROR("close");
2018 }
2019 }
2020
2021 /* Check and cleanup relayd */
2022 rcu_read_lock();
2023 relayd = consumer_find_relayd(stream->net_seq_idx);
2024 if (relayd != NULL) {
2025 uatomic_dec(&relayd->refcount);
2026 assert(uatomic_read(&relayd->refcount) >= 0);
2027
2028 /* Closing streams requires to lock the control socket. */
2029 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
2030 ret = relayd_send_close_stream(&relayd->control_sock,
2031 stream->relayd_stream_id, stream->next_net_seq_num - 1);
2032 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
2033 if (ret < 0) {
2034 DBG("Unable to close stream on the relayd. Continuing");
2035 /*
2036 * Continue here. There is nothing we can do for the relayd.
2037 * Chances are that the relayd has closed the socket so we just
2038 * continue cleaning up.
2039 */
2040 }
2041
2042 /* Both conditions are met, we destroy the relayd. */
2043 if (uatomic_read(&relayd->refcount) == 0 &&
2044 uatomic_read(&relayd->destroy_flag)) {
2045 consumer_destroy_relayd(relayd);
2046 }
2047 }
2048 rcu_read_unlock();
2049
2050 /* Atomically decrement channel refcount since other threads can use it. */
2051 if (!uatomic_sub_return(&stream->chan->refcount, 1)
2052 && !uatomic_read(&stream->chan->nb_init_stream_left)) {
2053 /* Go for channel deletion! */
2054 free_chan = stream->chan;
2055 }
2056
2057 end:
2058 /*
2059 * Nullify the stream reference so it is not used after deletion. The
2060 * channel lock MUST be acquired before being able to check for
2061 * a NULL pointer value.
2062 */
2063 stream->chan->metadata_stream = NULL;
2064
2065 pthread_mutex_unlock(&stream->lock);
2066 pthread_mutex_unlock(&stream->chan->lock);
2067 pthread_mutex_unlock(&consumer_data.lock);
2068
2069 if (free_chan) {
2070 consumer_del_channel(free_chan);
2071 }
2072
2073 free_stream_rcu:
2074 call_rcu(&stream->node.head, free_stream_rcu);
2075 }
2076
2077 /*
2078 * Action done with the metadata stream when adding it to the consumer internal
2079 * data structures to handle it.
2080 */
2081 int consumer_add_metadata_stream(struct lttng_consumer_stream *stream)
2082 {
2083 struct lttng_ht *ht = metadata_ht;
2084 int ret = 0;
2085 struct lttng_ht_iter iter;
2086 struct lttng_ht_node_u64 *node;
2087
2088 assert(stream);
2089 assert(ht);
2090
2091 DBG3("Adding metadata stream %" PRIu64 " to hash table", stream->key);
2092
2093 pthread_mutex_lock(&consumer_data.lock);
2094 pthread_mutex_lock(&stream->chan->lock);
2095 pthread_mutex_lock(&stream->chan->timer_lock);
2096 pthread_mutex_lock(&stream->lock);
2097
2098 /*
2099 * From here, refcounts are updated so be _careful_ when returning an error
2100 * after this point.
2101 */
2102
2103 rcu_read_lock();
2104
2105 /*
2106 * Lookup the stream just to make sure it does not exist in our internal
2107 * state. This should NEVER happen.
2108 */
2109 lttng_ht_lookup(ht, &stream->key, &iter);
2110 node = lttng_ht_iter_get_node_u64(&iter);
2111 assert(!node);
2112
2113 /*
2114 * When nb_init_stream_left reaches 0, we don't need to trigger any action
2115 * in terms of destroying the associated channel, because the action that
2116 * causes the count to become 0 also causes a stream to be added. The
2117 * channel deletion will thus be triggered by the following removal of this
2118 * stream.
2119 */
2120 if (uatomic_read(&stream->chan->nb_init_stream_left) > 0) {
2121 /* Increment refcount before decrementing nb_init_stream_left */
2122 cmm_smp_wmb();
2123 uatomic_dec(&stream->chan->nb_init_stream_left);
2124 }
2125
2126 lttng_ht_add_unique_u64(ht, &stream->node);
2127
2128 lttng_ht_add_unique_u64(consumer_data.stream_per_chan_id_ht,
2129 &stream->node_channel_id);
2130
2131 /*
2132 * Add stream to the stream_list_ht of the consumer data. No need to steal
2133 * the key since the HT does not use it and we allow to add redundant keys
2134 * into this table.
2135 */
2136 lttng_ht_add_u64(consumer_data.stream_list_ht, &stream->node_session_id);
2137
2138 rcu_read_unlock();
2139
2140 pthread_mutex_unlock(&stream->lock);
2141 pthread_mutex_unlock(&stream->chan->lock);
2142 pthread_mutex_unlock(&stream->chan->timer_lock);
2143 pthread_mutex_unlock(&consumer_data.lock);
2144 return ret;
2145 }
2146
2147 /*
2148 * Delete data stream that are flagged for deletion (endpoint_status).
2149 */
2150 static void validate_endpoint_status_data_stream(void)
2151 {
2152 struct lttng_ht_iter iter;
2153 struct lttng_consumer_stream *stream;
2154
2155 DBG("Consumer delete flagged data stream");
2156
2157 rcu_read_lock();
2158 cds_lfht_for_each_entry(data_ht->ht, &iter.iter, stream, node.node) {
2159 /* Validate delete flag of the stream */
2160 if (stream->endpoint_status == CONSUMER_ENDPOINT_ACTIVE) {
2161 continue;
2162 }
2163 /* Delete it right now */
2164 consumer_del_stream(stream, data_ht);
2165 }
2166 rcu_read_unlock();
2167 }
2168
2169 /*
2170 * Delete metadata stream that are flagged for deletion (endpoint_status).
2171 */
2172 static void validate_endpoint_status_metadata_stream(
2173 struct lttng_poll_event *pollset)
2174 {
2175 struct lttng_ht_iter iter;
2176 struct lttng_consumer_stream *stream;
2177
2178 DBG("Consumer delete flagged metadata stream");
2179
2180 assert(pollset);
2181
2182 rcu_read_lock();
2183 cds_lfht_for_each_entry(metadata_ht->ht, &iter.iter, stream, node.node) {
2184 /* Validate delete flag of the stream */
2185 if (stream->endpoint_status == CONSUMER_ENDPOINT_ACTIVE) {
2186 continue;
2187 }
2188 /*
2189 * Remove from pollset so the metadata thread can continue without
2190 * blocking on a deleted stream.
2191 */
2192 lttng_poll_del(pollset, stream->wait_fd);
2193
2194 /* Delete it right now */
2195 consumer_del_metadata_stream(stream, metadata_ht);
2196 }
2197 rcu_read_unlock();
2198 }
2199
2200 /*
2201 * Thread polls on metadata file descriptor and write them on disk or on the
2202 * network.
2203 */
2204 void *consumer_thread_metadata_poll(void *data)
2205 {
2206 int ret, i, pollfd, err = -1;
2207 uint32_t revents, nb_fd;
2208 struct lttng_consumer_stream *stream = NULL;
2209 struct lttng_ht_iter iter;
2210 struct lttng_ht_node_u64 *node;
2211 struct lttng_poll_event events;
2212 struct lttng_consumer_local_data *ctx = data;
2213 ssize_t len;
2214
2215 rcu_register_thread();
2216
2217 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_METADATA);
2218
2219 health_code_update();
2220
2221 metadata_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
2222 if (!metadata_ht) {
2223 /* ENOMEM at this point. Better to bail out. */
2224 goto end_ht;
2225 }
2226
2227 DBG("Thread metadata poll started");
2228
2229 /* Size is set to 1 for the consumer_metadata pipe */
2230 ret = lttng_poll_create(&events, 2, LTTNG_CLOEXEC);
2231 if (ret < 0) {
2232 ERR("Poll set creation failed");
2233 goto end_poll;
2234 }
2235
2236 ret = lttng_poll_add(&events,
2237 lttng_pipe_get_readfd(ctx->consumer_metadata_pipe), LPOLLIN);
2238 if (ret < 0) {
2239 goto end;
2240 }
2241
2242 /* Main loop */
2243 DBG("Metadata main loop started");
2244
2245 while (1) {
2246 health_code_update();
2247
2248 /* Only the metadata pipe is set */
2249 if (LTTNG_POLL_GETNB(&events) == 0 && consumer_quit == 1) {
2250 err = 0; /* All is OK */
2251 goto end;
2252 }
2253
2254 restart:
2255 DBG("Metadata poll wait with %d fd(s)", LTTNG_POLL_GETNB(&events));
2256 health_poll_entry();
2257 ret = lttng_poll_wait(&events, -1);
2258 health_poll_exit();
2259 DBG("Metadata event catched in thread");
2260 if (ret < 0) {
2261 if (errno == EINTR) {
2262 ERR("Poll EINTR catched");
2263 goto restart;
2264 }
2265 goto error;
2266 }
2267
2268 nb_fd = ret;
2269
2270 /* From here, the event is a metadata wait fd */
2271 for (i = 0; i < nb_fd; i++) {
2272 health_code_update();
2273
2274 revents = LTTNG_POLL_GETEV(&events, i);
2275 pollfd = LTTNG_POLL_GETFD(&events, i);
2276
2277 if (pollfd == lttng_pipe_get_readfd(ctx->consumer_metadata_pipe)) {
2278 if (revents & (LPOLLERR | LPOLLHUP )) {
2279 DBG("Metadata thread pipe hung up");
2280 /*
2281 * Remove the pipe from the poll set and continue the loop
2282 * since their might be data to consume.
2283 */
2284 lttng_poll_del(&events,
2285 lttng_pipe_get_readfd(ctx->consumer_metadata_pipe));
2286 lttng_pipe_read_close(ctx->consumer_metadata_pipe);
2287 continue;
2288 } else if (revents & LPOLLIN) {
2289 ssize_t pipe_len;
2290
2291 pipe_len = lttng_pipe_read(ctx->consumer_metadata_pipe,
2292 &stream, sizeof(stream));
2293 if (pipe_len < sizeof(stream)) {
2294 PERROR("read metadata stream");
2295 /*
2296 * Continue here to handle the rest of the streams.
2297 */
2298 continue;
2299 }
2300
2301 /* A NULL stream means that the state has changed. */
2302 if (stream == NULL) {
2303 /* Check for deleted streams. */
2304 validate_endpoint_status_metadata_stream(&events);
2305 goto restart;
2306 }
2307
2308 DBG("Adding metadata stream %d to poll set",
2309 stream->wait_fd);
2310
2311 /* Add metadata stream to the global poll events list */
2312 lttng_poll_add(&events, stream->wait_fd,
2313 LPOLLIN | LPOLLPRI);
2314 }
2315
2316 /* Handle other stream */
2317 continue;
2318 }
2319
2320 rcu_read_lock();
2321 {
2322 uint64_t tmp_id = (uint64_t) pollfd;
2323
2324 lttng_ht_lookup(metadata_ht, &tmp_id, &iter);
2325 }
2326 node = lttng_ht_iter_get_node_u64(&iter);
2327 assert(node);
2328
2329 stream = caa_container_of(node, struct lttng_consumer_stream,
2330 node);
2331
2332 /* Check for error event */
2333 if (revents & (LPOLLERR | LPOLLHUP)) {
2334 DBG("Metadata fd %d is hup|err.", pollfd);
2335 if (!stream->hangup_flush_done
2336 && (consumer_data.type == LTTNG_CONSUMER32_UST
2337 || consumer_data.type == LTTNG_CONSUMER64_UST)) {
2338 DBG("Attempting to flush and consume the UST buffers");
2339 lttng_ustconsumer_on_stream_hangup(stream);
2340
2341 /* We just flushed the stream now read it. */
2342 do {
2343 health_code_update();
2344
2345 len = ctx->on_buffer_ready(stream, ctx);
2346 /*
2347 * We don't check the return value here since if we get
2348 * a negative len, it means an error occured thus we
2349 * simply remove it from the poll set and free the
2350 * stream.
2351 */
2352 } while (len > 0);
2353 }
2354
2355 lttng_poll_del(&events, stream->wait_fd);
2356 /*
2357 * This call update the channel states, closes file descriptors
2358 * and securely free the stream.
2359 */
2360 consumer_del_metadata_stream(stream, metadata_ht);
2361 } else if (revents & (LPOLLIN | LPOLLPRI)) {
2362 /* Get the data out of the metadata file descriptor */
2363 DBG("Metadata available on fd %d", pollfd);
2364 assert(stream->wait_fd == pollfd);
2365
2366 do {
2367 health_code_update();
2368
2369 len = ctx->on_buffer_ready(stream, ctx);
2370 /*
2371 * We don't check the return value here since if we get
2372 * a negative len, it means an error occured thus we
2373 * simply remove it from the poll set and free the
2374 * stream.
2375 */
2376 } while (len > 0);
2377
2378 /* It's ok to have an unavailable sub-buffer */
2379 if (len < 0 && len != -EAGAIN && len != -ENODATA) {
2380 /* Clean up stream from consumer and free it. */
2381 lttng_poll_del(&events, stream->wait_fd);
2382 consumer_del_metadata_stream(stream, metadata_ht);
2383 }
2384 }
2385
2386 /* Release RCU lock for the stream looked up */
2387 rcu_read_unlock();
2388 }
2389 }
2390
2391 /* All is OK */
2392 err = 0;
2393 error:
2394 end:
2395 DBG("Metadata poll thread exiting");
2396
2397 lttng_poll_clean(&events);
2398 end_poll:
2399 destroy_stream_ht(metadata_ht);
2400 end_ht:
2401 if (err) {
2402 health_error();
2403 ERR("Health error occurred in %s", __func__);
2404 }
2405 health_unregister(health_consumerd);
2406 rcu_unregister_thread();
2407 return NULL;
2408 }
2409
2410 /*
2411 * This thread polls the fds in the set to consume the data and write
2412 * it to tracefile if necessary.
2413 */
2414 void *consumer_thread_data_poll(void *data)
2415 {
2416 int num_rdy, num_hup, high_prio, ret, i, err = -1;
2417 struct pollfd *pollfd = NULL;
2418 /* local view of the streams */
2419 struct lttng_consumer_stream **local_stream = NULL, *new_stream = NULL;
2420 /* local view of consumer_data.fds_count */
2421 int nb_fd = 0;
2422 struct lttng_consumer_local_data *ctx = data;
2423 ssize_t len;
2424
2425 rcu_register_thread();
2426
2427 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_DATA);
2428
2429 health_code_update();
2430
2431 data_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
2432 if (data_ht == NULL) {
2433 /* ENOMEM at this point. Better to bail out. */
2434 goto end;
2435 }
2436
2437 local_stream = zmalloc(sizeof(struct lttng_consumer_stream *));
2438 if (local_stream == NULL) {
2439 PERROR("local_stream malloc");
2440 goto end;
2441 }
2442
2443 while (1) {
2444 health_code_update();
2445
2446 high_prio = 0;
2447 num_hup = 0;
2448
2449 /*
2450 * the fds set has been updated, we need to update our
2451 * local array as well
2452 */
2453 pthread_mutex_lock(&consumer_data.lock);
2454 if (consumer_data.need_update) {
2455 free(pollfd);
2456 pollfd = NULL;
2457
2458 free(local_stream);
2459 local_stream = NULL;
2460
2461 /* allocate for all fds + 1 for the consumer_data_pipe */
2462 pollfd = zmalloc((consumer_data.stream_count + 1) * sizeof(struct pollfd));
2463 if (pollfd == NULL) {
2464 PERROR("pollfd malloc");
2465 pthread_mutex_unlock(&consumer_data.lock);
2466 goto end;
2467 }
2468
2469 /* allocate for all fds + 1 for the consumer_data_pipe */
2470 local_stream = zmalloc((consumer_data.stream_count + 1) *
2471 sizeof(struct lttng_consumer_stream *));
2472 if (local_stream == NULL) {
2473 PERROR("local_stream malloc");
2474 pthread_mutex_unlock(&consumer_data.lock);
2475 goto end;
2476 }
2477 ret = update_poll_array(ctx, &pollfd, local_stream,
2478 data_ht);
2479 if (ret < 0) {
2480 ERR("Error in allocating pollfd or local_outfds");
2481 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_POLL_ERROR);
2482 pthread_mutex_unlock(&consumer_data.lock);
2483 goto end;
2484 }
2485 nb_fd = ret;
2486 consumer_data.need_update = 0;
2487 }
2488 pthread_mutex_unlock(&consumer_data.lock);
2489
2490 /* No FDs and consumer_quit, consumer_cleanup the thread */
2491 if (nb_fd == 0 && consumer_quit == 1) {
2492 err = 0; /* All is OK */
2493 goto end;
2494 }
2495 /* poll on the array of fds */
2496 restart:
2497 DBG("polling on %d fd", nb_fd + 1);
2498 health_poll_entry();
2499 num_rdy = poll(pollfd, nb_fd + 1, -1);
2500 health_poll_exit();
2501 DBG("poll num_rdy : %d", num_rdy);
2502 if (num_rdy == -1) {
2503 /*
2504 * Restart interrupted system call.
2505 */
2506 if (errno == EINTR) {
2507 goto restart;
2508 }
2509 PERROR("Poll error");
2510 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_POLL_ERROR);
2511 goto end;
2512 } else if (num_rdy == 0) {
2513 DBG("Polling thread timed out");
2514 goto end;
2515 }
2516
2517 /*
2518 * If the consumer_data_pipe triggered poll go directly to the
2519 * beginning of the loop to update the array. We want to prioritize
2520 * array update over low-priority reads.
2521 */
2522 if (pollfd[nb_fd].revents & (POLLIN | POLLPRI)) {
2523 ssize_t pipe_readlen;
2524
2525 DBG("consumer_data_pipe wake up");
2526 pipe_readlen = lttng_pipe_read(ctx->consumer_data_pipe,
2527 &new_stream, sizeof(new_stream));
2528 if (pipe_readlen < sizeof(new_stream)) {
2529 PERROR("Consumer data pipe");
2530 /* Continue so we can at least handle the current stream(s). */
2531 continue;
2532 }
2533
2534 /*
2535 * If the stream is NULL, just ignore it. It's also possible that
2536 * the sessiond poll thread changed the consumer_quit state and is
2537 * waking us up to test it.
2538 */
2539 if (new_stream == NULL) {
2540 validate_endpoint_status_data_stream();
2541 continue;
2542 }
2543
2544 /* Continue to update the local streams and handle prio ones */
2545 continue;
2546 }
2547
2548 /* Take care of high priority channels first. */
2549 for (i = 0; i < nb_fd; i++) {
2550 health_code_update();
2551
2552 if (local_stream[i] == NULL) {
2553 continue;
2554 }
2555 if (pollfd[i].revents & POLLPRI) {
2556 DBG("Urgent read on fd %d", pollfd[i].fd);
2557 high_prio = 1;
2558 len = ctx->on_buffer_ready(local_stream[i], ctx);
2559 /* it's ok to have an unavailable sub-buffer */
2560 if (len < 0 && len != -EAGAIN && len != -ENODATA) {
2561 /* Clean the stream and free it. */
2562 consumer_del_stream(local_stream[i], data_ht);
2563 local_stream[i] = NULL;
2564 } else if (len > 0) {
2565 local_stream[i]->data_read = 1;
2566 }
2567 }
2568 }
2569
2570 /*
2571 * If we read high prio channel in this loop, try again
2572 * for more high prio data.
2573 */
2574 if (high_prio) {
2575 continue;
2576 }
2577
2578 /* Take care of low priority channels. */
2579 for (i = 0; i < nb_fd; i++) {
2580 health_code_update();
2581
2582 if (local_stream[i] == NULL) {
2583 continue;
2584 }
2585 if ((pollfd[i].revents & POLLIN) ||
2586 local_stream[i]->hangup_flush_done) {
2587 DBG("Normal read on fd %d", pollfd[i].fd);
2588 len = ctx->on_buffer_ready(local_stream[i], ctx);
2589 /* it's ok to have an unavailable sub-buffer */
2590 if (len < 0 && len != -EAGAIN && len != -ENODATA) {
2591 /* Clean the stream and free it. */
2592 consumer_del_stream(local_stream[i], data_ht);
2593 local_stream[i] = NULL;
2594 } else if (len > 0) {
2595 local_stream[i]->data_read = 1;
2596 }
2597 }
2598 }
2599
2600 /* Handle hangup and errors */
2601 for (i = 0; i < nb_fd; i++) {
2602 health_code_update();
2603
2604 if (local_stream[i] == NULL) {
2605 continue;
2606 }
2607 if (!local_stream[i]->hangup_flush_done
2608 && (pollfd[i].revents & (POLLHUP | POLLERR | POLLNVAL))
2609 && (consumer_data.type == LTTNG_CONSUMER32_UST
2610 || consumer_data.type == LTTNG_CONSUMER64_UST)) {
2611 DBG("fd %d is hup|err|nval. Attempting flush and read.",
2612 pollfd[i].fd);
2613 lttng_ustconsumer_on_stream_hangup(local_stream[i]);
2614 /* Attempt read again, for the data we just flushed. */
2615 local_stream[i]->data_read = 1;
2616 }
2617 /*
2618 * If the poll flag is HUP/ERR/NVAL and we have
2619 * read no data in this pass, we can remove the
2620 * stream from its hash table.
2621 */
2622 if ((pollfd[i].revents & POLLHUP)) {
2623 DBG("Polling fd %d tells it has hung up.", pollfd[i].fd);
2624 if (!local_stream[i]->data_read) {
2625 consumer_del_stream(local_stream[i], data_ht);
2626 local_stream[i] = NULL;
2627 num_hup++;
2628 }
2629 } else if (pollfd[i].revents & POLLERR) {
2630 ERR("Error returned in polling fd %d.", pollfd[i].fd);
2631 if (!local_stream[i]->data_read) {
2632 consumer_del_stream(local_stream[i], data_ht);
2633 local_stream[i] = NULL;
2634 num_hup++;
2635 }
2636 } else if (pollfd[i].revents & POLLNVAL) {
2637 ERR("Polling fd %d tells fd is not open.", pollfd[i].fd);
2638 if (!local_stream[i]->data_read) {
2639 consumer_del_stream(local_stream[i], data_ht);
2640 local_stream[i] = NULL;
2641 num_hup++;
2642 }
2643 }
2644 if (local_stream[i] != NULL) {
2645 local_stream[i]->data_read = 0;
2646 }
2647 }
2648 }
2649 /* All is OK */
2650 err = 0;
2651 end:
2652 DBG("polling thread exiting");
2653 free(pollfd);
2654 free(local_stream);
2655
2656 /*
2657 * Close the write side of the pipe so epoll_wait() in
2658 * consumer_thread_metadata_poll can catch it. The thread is monitoring the
2659 * read side of the pipe. If we close them both, epoll_wait strangely does
2660 * not return and could create a endless wait period if the pipe is the
2661 * only tracked fd in the poll set. The thread will take care of closing
2662 * the read side.
2663 */
2664 (void) lttng_pipe_write_close(ctx->consumer_metadata_pipe);
2665
2666 destroy_data_stream_ht(data_ht);
2667
2668 if (err) {
2669 health_error();
2670 ERR("Health error occurred in %s", __func__);
2671 }
2672 health_unregister(health_consumerd);
2673
2674 rcu_unregister_thread();
2675 return NULL;
2676 }
2677
2678 /*
2679 * Close wake-up end of each stream belonging to the channel. This will
2680 * allow the poll() on the stream read-side to detect when the
2681 * write-side (application) finally closes them.
2682 */
2683 static
2684 void consumer_close_channel_streams(struct lttng_consumer_channel *channel)
2685 {
2686 struct lttng_ht *ht;
2687 struct lttng_consumer_stream *stream;
2688 struct lttng_ht_iter iter;
2689
2690 ht = consumer_data.stream_per_chan_id_ht;
2691
2692 rcu_read_lock();
2693 cds_lfht_for_each_entry_duplicate(ht->ht,
2694 ht->hash_fct(&channel->key, lttng_ht_seed),
2695 ht->match_fct, &channel->key,
2696 &iter.iter, stream, node_channel_id.node) {
2697 /*
2698 * Protect against teardown with mutex.
2699 */
2700 pthread_mutex_lock(&stream->lock);
2701 if (cds_lfht_is_node_deleted(&stream->node.node)) {
2702 goto next;
2703 }
2704 switch (consumer_data.type) {
2705 case LTTNG_CONSUMER_KERNEL:
2706 break;
2707 case LTTNG_CONSUMER32_UST:
2708 case LTTNG_CONSUMER64_UST:
2709 /*
2710 * Note: a mutex is taken internally within
2711 * liblttng-ust-ctl to protect timer wakeup_fd
2712 * use from concurrent close.
2713 */
2714 lttng_ustconsumer_close_stream_wakeup(stream);
2715 break;
2716 default:
2717 ERR("Unknown consumer_data type");
2718 assert(0);
2719 }
2720 next:
2721 pthread_mutex_unlock(&stream->lock);
2722 }
2723 rcu_read_unlock();
2724 }
2725
2726 static void destroy_channel_ht(struct lttng_ht *ht)
2727 {
2728 struct lttng_ht_iter iter;
2729 struct lttng_consumer_channel *channel;
2730 int ret;
2731
2732 if (ht == NULL) {
2733 return;
2734 }
2735
2736 rcu_read_lock();
2737 cds_lfht_for_each_entry(ht->ht, &iter.iter, channel, wait_fd_node.node) {
2738 ret = lttng_ht_del(ht, &iter);
2739 assert(ret != 0);
2740 }
2741 rcu_read_unlock();
2742
2743 lttng_ht_destroy(ht);
2744 }
2745
2746 /*
2747 * This thread polls the channel fds to detect when they are being
2748 * closed. It closes all related streams if the channel is detected as
2749 * closed. It is currently only used as a shim layer for UST because the
2750 * consumerd needs to keep the per-stream wakeup end of pipes open for
2751 * periodical flush.
2752 */
2753 void *consumer_thread_channel_poll(void *data)
2754 {
2755 int ret, i, pollfd, err = -1;
2756 uint32_t revents, nb_fd;
2757 struct lttng_consumer_channel *chan = NULL;
2758 struct lttng_ht_iter iter;
2759 struct lttng_ht_node_u64 *node;
2760 struct lttng_poll_event events;
2761 struct lttng_consumer_local_data *ctx = data;
2762 struct lttng_ht *channel_ht;
2763
2764 rcu_register_thread();
2765
2766 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_CHANNEL);
2767
2768 health_code_update();
2769
2770 channel_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
2771 if (!channel_ht) {
2772 /* ENOMEM at this point. Better to bail out. */
2773 goto end_ht;
2774 }
2775
2776 DBG("Thread channel poll started");
2777
2778 /* Size is set to 1 for the consumer_channel pipe */
2779 ret = lttng_poll_create(&events, 2, LTTNG_CLOEXEC);
2780 if (ret < 0) {
2781 ERR("Poll set creation failed");
2782 goto end_poll;
2783 }
2784
2785 ret = lttng_poll_add(&events, ctx->consumer_channel_pipe[0], LPOLLIN);
2786 if (ret < 0) {
2787 goto end;
2788 }
2789
2790 /* Main loop */
2791 DBG("Channel main loop started");
2792
2793 while (1) {
2794 health_code_update();
2795
2796 /* Only the channel pipe is set */
2797 if (LTTNG_POLL_GETNB(&events) == 0 && consumer_quit == 1) {
2798 err = 0; /* All is OK */
2799 goto end;
2800 }
2801
2802 restart:
2803 DBG("Channel poll wait with %d fd(s)", LTTNG_POLL_GETNB(&events));
2804 health_poll_entry();
2805 ret = lttng_poll_wait(&events, -1);
2806 health_poll_exit();
2807 DBG("Channel event catched in thread");
2808 if (ret < 0) {
2809 if (errno == EINTR) {
2810 ERR("Poll EINTR catched");
2811 goto restart;
2812 }
2813 goto end;
2814 }
2815
2816 nb_fd = ret;
2817
2818 /* From here, the event is a channel wait fd */
2819 for (i = 0; i < nb_fd; i++) {
2820 health_code_update();
2821
2822 revents = LTTNG_POLL_GETEV(&events, i);
2823 pollfd = LTTNG_POLL_GETFD(&events, i);
2824
2825 /* Just don't waste time if no returned events for the fd */
2826 if (!revents) {
2827 continue;
2828 }
2829 if (pollfd == ctx->consumer_channel_pipe[0]) {
2830 if (revents & (LPOLLERR | LPOLLHUP)) {
2831 DBG("Channel thread pipe hung up");
2832 /*
2833 * Remove the pipe from the poll set and continue the loop
2834 * since their might be data to consume.
2835 */
2836 lttng_poll_del(&events, ctx->consumer_channel_pipe[0]);
2837 continue;
2838 } else if (revents & LPOLLIN) {
2839 enum consumer_channel_action action;
2840 uint64_t key;
2841
2842 ret = read_channel_pipe(ctx, &chan, &key, &action);
2843 if (ret <= 0) {
2844 ERR("Error reading channel pipe");
2845 continue;
2846 }
2847
2848 switch (action) {
2849 case CONSUMER_CHANNEL_ADD:
2850 DBG("Adding channel %d to poll set",
2851 chan->wait_fd);
2852
2853 lttng_ht_node_init_u64(&chan->wait_fd_node,
2854 chan->wait_fd);
2855 rcu_read_lock();
2856 lttng_ht_add_unique_u64(channel_ht,
2857 &chan->wait_fd_node);
2858 rcu_read_unlock();
2859 /* Add channel to the global poll events list */
2860 lttng_poll_add(&events, chan->wait_fd,
2861 LPOLLIN | LPOLLPRI);
2862 break;
2863 case CONSUMER_CHANNEL_DEL:
2864 {
2865 struct lttng_consumer_stream *stream, *stmp;
2866
2867 rcu_read_lock();
2868 chan = consumer_find_channel(key);
2869 if (!chan) {
2870 rcu_read_unlock();
2871 ERR("UST consumer get channel key %" PRIu64 " not found for del channel", key);
2872 break;
2873 }
2874 lttng_poll_del(&events, chan->wait_fd);
2875 iter.iter.node = &chan->wait_fd_node.node;
2876 ret = lttng_ht_del(channel_ht, &iter);
2877 assert(ret == 0);
2878 consumer_close_channel_streams(chan);
2879
2880 switch (consumer_data.type) {
2881 case LTTNG_CONSUMER_KERNEL:
2882 break;
2883 case LTTNG_CONSUMER32_UST:
2884 case LTTNG_CONSUMER64_UST:
2885 /* Delete streams that might have been left in the stream list. */
2886 cds_list_for_each_entry_safe(stream, stmp, &chan->streams.head,
2887 send_node) {
2888 health_code_update();
2889
2890 cds_list_del(&stream->send_node);
2891 lttng_ustconsumer_del_stream(stream);
2892 uatomic_sub(&stream->chan->refcount, 1);
2893 assert(&chan->refcount);
2894 free(stream);
2895 }
2896 break;
2897 default:
2898 ERR("Unknown consumer_data type");
2899 assert(0);
2900 }
2901
2902 /*
2903 * Release our own refcount. Force channel deletion even if
2904 * streams were not initialized.
2905 */
2906 if (!uatomic_sub_return(&chan->refcount, 1)) {
2907 consumer_del_channel(chan);
2908 }
2909 rcu_read_unlock();
2910 goto restart;
2911 }
2912 case CONSUMER_CHANNEL_QUIT:
2913 /*
2914 * Remove the pipe from the poll set and continue the loop
2915 * since their might be data to consume.
2916 */
2917 lttng_poll_del(&events, ctx->consumer_channel_pipe[0]);
2918 continue;
2919 default:
2920 ERR("Unknown action");
2921 break;
2922 }
2923 }
2924
2925 /* Handle other stream */
2926 continue;
2927 }
2928
2929 rcu_read_lock();
2930 {
2931 uint64_t tmp_id = (uint64_t) pollfd;
2932
2933 lttng_ht_lookup(channel_ht, &tmp_id, &iter);
2934 }
2935 node = lttng_ht_iter_get_node_u64(&iter);
2936 assert(node);
2937
2938 chan = caa_container_of(node, struct lttng_consumer_channel,
2939 wait_fd_node);
2940
2941 /* Check for error event */
2942 if (revents & (LPOLLERR | LPOLLHUP)) {
2943 DBG("Channel fd %d is hup|err.", pollfd);
2944
2945 lttng_poll_del(&events, chan->wait_fd);
2946 ret = lttng_ht_del(channel_ht, &iter);
2947 assert(ret == 0);
2948 consumer_close_channel_streams(chan);
2949
2950 /* Release our own refcount */
2951 if (!uatomic_sub_return(&chan->refcount, 1)
2952 && !uatomic_read(&chan->nb_init_stream_left)) {
2953 consumer_del_channel(chan);
2954 }
2955 }
2956
2957 /* Release RCU lock for the channel looked up */
2958 rcu_read_unlock();
2959 }
2960 }
2961
2962 /* All is OK */
2963 err = 0;
2964 end:
2965 lttng_poll_clean(&events);
2966 end_poll:
2967 destroy_channel_ht(channel_ht);
2968 end_ht:
2969 DBG("Channel poll thread exiting");
2970 if (err) {
2971 health_error();
2972 ERR("Health error occurred in %s", __func__);
2973 }
2974 health_unregister(health_consumerd);
2975 rcu_unregister_thread();
2976 return NULL;
2977 }
2978
2979 static int set_metadata_socket(struct lttng_consumer_local_data *ctx,
2980 struct pollfd *sockpoll, int client_socket)
2981 {
2982 int ret;
2983
2984 assert(ctx);
2985 assert(sockpoll);
2986
2987 if (lttng_consumer_poll_socket(sockpoll) < 0) {
2988 ret = -1;
2989 goto error;
2990 }
2991 DBG("Metadata connection on client_socket");
2992
2993 /* Blocking call, waiting for transmission */
2994 ctx->consumer_metadata_socket = lttcomm_accept_unix_sock(client_socket);
2995 if (ctx->consumer_metadata_socket < 0) {
2996 WARN("On accept metadata");
2997 ret = -1;
2998 goto error;
2999 }
3000 ret = 0;
3001
3002 error:
3003 return ret;
3004 }
3005
3006 /*
3007 * This thread listens on the consumerd socket and receives the file
3008 * descriptors from the session daemon.
3009 */
3010 void *consumer_thread_sessiond_poll(void *data)
3011 {
3012 int sock = -1, client_socket, ret, err = -1;
3013 /*
3014 * structure to poll for incoming data on communication socket avoids
3015 * making blocking sockets.
3016 */
3017 struct pollfd consumer_sockpoll[2];
3018 struct lttng_consumer_local_data *ctx = data;
3019
3020 rcu_register_thread();
3021
3022 health_register(health_consumerd, HEALTH_CONSUMERD_TYPE_SESSIOND);
3023
3024 health_code_update();
3025
3026 DBG("Creating command socket %s", ctx->consumer_command_sock_path);
3027 unlink(ctx->consumer_command_sock_path);
3028 client_socket = lttcomm_create_unix_sock(ctx->consumer_command_sock_path);
3029 if (client_socket < 0) {
3030 ERR("Cannot create command socket");
3031 goto end;
3032 }
3033
3034 ret = lttcomm_listen_unix_sock(client_socket);
3035 if (ret < 0) {
3036 goto end;
3037 }
3038
3039 DBG("Sending ready command to lttng-sessiond");
3040 ret = lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_COMMAND_SOCK_READY);
3041 /* return < 0 on error, but == 0 is not fatal */
3042 if (ret < 0) {
3043 ERR("Error sending ready command to lttng-sessiond");
3044 goto end;
3045 }
3046
3047 /* prepare the FDs to poll : to client socket and the should_quit pipe */
3048 consumer_sockpoll[0].fd = ctx->consumer_should_quit[0];
3049 consumer_sockpoll[0].events = POLLIN | POLLPRI;
3050 consumer_sockpoll[1].fd = client_socket;
3051 consumer_sockpoll[1].events = POLLIN | POLLPRI;
3052
3053 if (lttng_consumer_poll_socket(consumer_sockpoll) < 0) {
3054 goto end;
3055 }
3056 DBG("Connection on client_socket");
3057
3058 /* Blocking call, waiting for transmission */
3059 sock = lttcomm_accept_unix_sock(client_socket);
3060 if (sock < 0) {
3061 WARN("On accept");
3062 goto end;
3063 }
3064
3065 /*
3066 * Setup metadata socket which is the second socket connection on the
3067 * command unix socket.
3068 */
3069 ret = set_metadata_socket(ctx, consumer_sockpoll, client_socket);
3070 if (ret < 0) {
3071 goto end;
3072 }
3073
3074 /* This socket is not useful anymore. */
3075 ret = close(client_socket);
3076 if (ret < 0) {
3077 PERROR("close client_socket");
3078 }
3079 client_socket = -1;
3080
3081 /* update the polling structure to poll on the established socket */
3082 consumer_sockpoll[1].fd = sock;
3083 consumer_sockpoll[1].events = POLLIN | POLLPRI;
3084
3085 while (1) {
3086 health_code_update();
3087
3088 health_poll_entry();
3089 ret = lttng_consumer_poll_socket(consumer_sockpoll);
3090 health_poll_exit();
3091 if (ret < 0) {
3092 goto end;
3093 }
3094 DBG("Incoming command on sock");
3095 ret = lttng_consumer_recv_cmd(ctx, sock, consumer_sockpoll);
3096 if (ret == -ENOENT) {
3097 DBG("Received STOP command");
3098 goto end;
3099 }
3100 if (ret <= 0) {
3101 /*
3102 * This could simply be a session daemon quitting. Don't output
3103 * ERR() here.
3104 */
3105 DBG("Communication interrupted on command socket");
3106 err = 0;
3107 goto end;
3108 }
3109 if (consumer_quit) {
3110 DBG("consumer_thread_receive_fds received quit from signal");
3111 err = 0; /* All is OK */
3112 goto end;
3113 }
3114 DBG("received command on sock");
3115 }
3116 /* All is OK */
3117 err = 0;
3118
3119 end:
3120 DBG("Consumer thread sessiond poll exiting");
3121
3122 /*
3123 * Close metadata streams since the producer is the session daemon which
3124 * just died.
3125 *
3126 * NOTE: for now, this only applies to the UST tracer.
3127 */
3128 lttng_consumer_close_metadata();
3129
3130 /*
3131 * when all fds have hung up, the polling thread
3132 * can exit cleanly
3133 */
3134 consumer_quit = 1;
3135
3136 /*
3137 * Notify the data poll thread to poll back again and test the
3138 * consumer_quit state that we just set so to quit gracefully.
3139 */
3140 notify_thread_lttng_pipe(ctx->consumer_data_pipe);
3141
3142 notify_channel_pipe(ctx, NULL, -1, CONSUMER_CHANNEL_QUIT);
3143
3144 notify_health_quit_pipe(health_quit_pipe);
3145
3146 /* Cleaning up possibly open sockets. */
3147 if (sock >= 0) {
3148 ret = close(sock);
3149 if (ret < 0) {
3150 PERROR("close sock sessiond poll");
3151 }
3152 }
3153 if (client_socket >= 0) {
3154 ret = close(client_socket);
3155 if (ret < 0) {
3156 PERROR("close client_socket sessiond poll");
3157 }
3158 }
3159
3160 if (err) {
3161 health_error();
3162 ERR("Health error occurred in %s", __func__);
3163 }
3164 health_unregister(health_consumerd);
3165
3166 rcu_unregister_thread();
3167 return NULL;
3168 }
3169
3170 ssize_t lttng_consumer_read_subbuffer(struct lttng_consumer_stream *stream,
3171 struct lttng_consumer_local_data *ctx)
3172 {
3173 ssize_t ret;
3174
3175 pthread_mutex_lock(&stream->lock);
3176 if (stream->metadata_flag) {
3177 pthread_mutex_lock(&stream->metadata_rdv_lock);
3178 }
3179
3180 switch (consumer_data.type) {
3181 case LTTNG_CONSUMER_KERNEL:
3182 ret = lttng_kconsumer_read_subbuffer(stream, ctx);
3183 break;
3184 case LTTNG_CONSUMER32_UST:
3185 case LTTNG_CONSUMER64_UST:
3186 ret = lttng_ustconsumer_read_subbuffer(stream, ctx);
3187 break;
3188 default:
3189 ERR("Unknown consumer_data type");
3190 assert(0);
3191 ret = -ENOSYS;
3192 break;
3193 }
3194
3195 if (stream->metadata_flag) {
3196 pthread_cond_broadcast(&stream->metadata_rdv);
3197 pthread_mutex_unlock(&stream->metadata_rdv_lock);
3198 }
3199 pthread_mutex_unlock(&stream->lock);
3200 return ret;
3201 }
3202
3203 int lttng_consumer_on_recv_stream(struct lttng_consumer_stream *stream)
3204 {
3205 switch (consumer_data.type) {
3206 case LTTNG_CONSUMER_KERNEL:
3207 return lttng_kconsumer_on_recv_stream(stream);
3208 case LTTNG_CONSUMER32_UST:
3209 case LTTNG_CONSUMER64_UST:
3210 return lttng_ustconsumer_on_recv_stream(stream);
3211 default:
3212 ERR("Unknown consumer_data type");
3213 assert(0);
3214 return -ENOSYS;
3215 }
3216 }
3217
3218 /*
3219 * Allocate and set consumer data hash tables.
3220 */
3221 void lttng_consumer_init(void)
3222 {
3223 consumer_data.channel_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
3224 consumer_data.relayd_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
3225 consumer_data.stream_list_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
3226 consumer_data.stream_per_chan_id_ht = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
3227 }
3228
3229 /*
3230 * Process the ADD_RELAYD command receive by a consumer.
3231 *
3232 * This will create a relayd socket pair and add it to the relayd hash table.
3233 * The caller MUST acquire a RCU read side lock before calling it.
3234 */
3235 int consumer_add_relayd_socket(uint64_t net_seq_idx, int sock_type,
3236 struct lttng_consumer_local_data *ctx, int sock,
3237 struct pollfd *consumer_sockpoll,
3238 struct lttcomm_relayd_sock *relayd_sock, uint64_t sessiond_id,
3239 uint64_t relayd_session_id)
3240 {
3241 int fd = -1, ret = -1, relayd_created = 0;
3242 enum lttcomm_return_code ret_code = LTTCOMM_CONSUMERD_SUCCESS;
3243 struct consumer_relayd_sock_pair *relayd = NULL;
3244
3245 assert(ctx);
3246 assert(relayd_sock);
3247
3248 DBG("Consumer adding relayd socket (idx: %" PRIu64 ")", net_seq_idx);
3249
3250 /* Get relayd reference if exists. */
3251 relayd = consumer_find_relayd(net_seq_idx);
3252 if (relayd == NULL) {
3253 assert(sock_type == LTTNG_STREAM_CONTROL);
3254 /* Not found. Allocate one. */
3255 relayd = consumer_allocate_relayd_sock_pair(net_seq_idx);
3256 if (relayd == NULL) {
3257 ret = -ENOMEM;
3258 ret_code = LTTCOMM_CONSUMERD_ENOMEM;
3259 goto error;
3260 } else {
3261 relayd->sessiond_session_id = sessiond_id;
3262 relayd_created = 1;
3263 }
3264
3265 /*
3266 * This code path MUST continue to the consumer send status message to
3267 * we can notify the session daemon and continue our work without
3268 * killing everything.
3269 */
3270 } else {
3271 /*
3272 * relayd key should never be found for control socket.
3273 */
3274 assert(sock_type != LTTNG_STREAM_CONTROL);
3275 }
3276
3277 /* First send a status message before receiving the fds. */
3278 ret = consumer_send_status_msg(sock, LTTCOMM_CONSUMERD_SUCCESS);
3279 if (ret < 0) {
3280 /* Somehow, the session daemon is not responding anymore. */
3281 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_FATAL);
3282 goto error_nosignal;
3283 }
3284
3285 /* Poll on consumer socket. */
3286 if (lttng_consumer_poll_socket(consumer_sockpoll) < 0) {
3287 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_POLL_ERROR);
3288 ret = -EINTR;
3289 goto error_nosignal;
3290 }
3291
3292 /* Get relayd socket from session daemon */
3293 ret = lttcomm_recv_fds_unix_sock(sock, &fd, 1);
3294 if (ret != sizeof(fd)) {
3295 ret = -1;
3296 fd = -1; /* Just in case it gets set with an invalid value. */
3297
3298 /*
3299 * Failing to receive FDs might indicate a major problem such as
3300 * reaching a fd limit during the receive where the kernel returns a
3301 * MSG_CTRUNC and fails to cleanup the fd in the queue. Any case, we
3302 * don't take any chances and stop everything.
3303 *
3304 * XXX: Feature request #558 will fix that and avoid this possible
3305 * issue when reaching the fd limit.
3306 */
3307 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_ERROR_RECV_FD);
3308 ret_code = LTTCOMM_CONSUMERD_ERROR_RECV_FD;
3309 goto error;
3310 }
3311
3312 /* Copy socket information and received FD */
3313 switch (sock_type) {
3314 case LTTNG_STREAM_CONTROL:
3315 /* Copy received lttcomm socket */
3316 lttcomm_copy_sock(&relayd->control_sock.sock, &relayd_sock->sock);
3317 ret = lttcomm_create_sock(&relayd->control_sock.sock);
3318 /* Handle create_sock error. */
3319 if (ret < 0) {
3320 ret_code = LTTCOMM_CONSUMERD_ENOMEM;
3321 goto error;
3322 }
3323 /*
3324 * Close the socket created internally by
3325 * lttcomm_create_sock, so we can replace it by the one
3326 * received from sessiond.
3327 */
3328 if (close(relayd->control_sock.sock.fd)) {
3329 PERROR("close");
3330 }
3331
3332 /* Assign new file descriptor */
3333 relayd->control_sock.sock.fd = fd;
3334 fd = -1; /* For error path */
3335 /* Assign version values. */
3336 relayd->control_sock.major = relayd_sock->major;
3337 relayd->control_sock.minor = relayd_sock->minor;
3338
3339 relayd->relayd_session_id = relayd_session_id;
3340
3341 break;
3342 case LTTNG_STREAM_DATA:
3343 /* Copy received lttcomm socket */
3344 lttcomm_copy_sock(&relayd->data_sock.sock, &relayd_sock->sock);
3345 ret = lttcomm_create_sock(&relayd->data_sock.sock);
3346 /* Handle create_sock error. */
3347 if (ret < 0) {
3348 ret_code = LTTCOMM_CONSUMERD_ENOMEM;
3349 goto error;
3350 }
3351 /*
3352 * Close the socket created internally by
3353 * lttcomm_create_sock, so we can replace it by the one
3354 * received from sessiond.
3355 */
3356 if (close(relayd->data_sock.sock.fd)) {
3357 PERROR("close");
3358 }
3359
3360 /* Assign new file descriptor */
3361 relayd->data_sock.sock.fd = fd;
3362 fd = -1; /* for eventual error paths */
3363 /* Assign version values. */
3364 relayd->data_sock.major = relayd_sock->major;
3365 relayd->data_sock.minor = relayd_sock->minor;
3366 break;
3367 default:
3368 ERR("Unknown relayd socket type (%d)", sock_type);
3369 ret = -1;
3370 ret_code = LTTCOMM_CONSUMERD_FATAL;
3371 goto error;
3372 }
3373
3374 DBG("Consumer %s socket created successfully with net idx %" PRIu64 " (fd: %d)",
3375 sock_type == LTTNG_STREAM_CONTROL ? "control" : "data",
3376 relayd->net_seq_idx, fd);
3377
3378 /* We successfully added the socket. Send status back. */
3379 ret = consumer_send_status_msg(sock, ret_code);
3380 if (ret < 0) {
3381 /* Somehow, the session daemon is not responding anymore. */
3382 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_FATAL);
3383 goto error_nosignal;
3384 }
3385
3386 /*
3387 * Add relayd socket pair to consumer data hashtable. If object already
3388 * exists or on error, the function gracefully returns.
3389 */
3390 add_relayd(relayd);
3391
3392 /* All good! */
3393 return 0;
3394
3395 error:
3396 if (consumer_send_status_msg(sock, ret_code) < 0) {
3397 lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_FATAL);
3398 }
3399
3400 error_nosignal:
3401 /* Close received socket if valid. */
3402 if (fd >= 0) {
3403 if (close(fd)) {
3404 PERROR("close received socket");
3405 }
3406 }
3407
3408 if (relayd_created) {
3409 free(relayd);
3410 }
3411
3412 return ret;
3413 }
3414
3415 /*
3416 * Try to lock the stream mutex.
3417 *
3418 * On success, 1 is returned else 0 indicating that the mutex is NOT lock.
3419 */
3420 static int stream_try_lock(struct lttng_consumer_stream *stream)
3421 {
3422 int ret;
3423
3424 assert(stream);
3425
3426 /*
3427 * Try to lock the stream mutex. On failure, we know that the stream is
3428 * being used else where hence there is data still being extracted.
3429 */
3430 ret = pthread_mutex_trylock(&stream->lock);
3431 if (ret) {
3432 /* For both EBUSY and EINVAL error, the mutex is NOT locked. */
3433 ret = 0;
3434 goto end;
3435 }
3436
3437 ret = 1;
3438
3439 end:
3440 return ret;
3441 }
3442
3443 /*
3444 * Search for a relayd associated to the session id and return the reference.
3445 *
3446 * A rcu read side lock MUST be acquire before calling this function and locked
3447 * until the relayd object is no longer necessary.
3448 */
3449 static struct consumer_relayd_sock_pair *find_relayd_by_session_id(uint64_t id)
3450 {
3451 struct lttng_ht_iter iter;
3452 struct consumer_relayd_sock_pair *relayd = NULL;
3453
3454 /* Iterate over all relayd since they are indexed by net_seq_idx. */
3455 cds_lfht_for_each_entry(consumer_data.relayd_ht->ht, &iter.iter, relayd,
3456 node.node) {
3457 /*
3458 * Check by sessiond id which is unique here where the relayd session
3459 * id might not be when having multiple relayd.
3460 */
3461 if (relayd->sessiond_session_id == id) {
3462 /* Found the relayd. There can be only one per id. */
3463 goto found;
3464 }
3465 }
3466
3467 return NULL;
3468
3469 found:
3470 return relayd;
3471 }
3472
3473 /*
3474 * Check if for a given session id there is still data needed to be extract
3475 * from the buffers.
3476 *
3477 * Return 1 if data is pending or else 0 meaning ready to be read.
3478 */
3479 int consumer_data_pending(uint64_t id)
3480 {
3481 int ret;
3482 struct lttng_ht_iter iter;
3483 struct lttng_ht *ht;
3484 struct lttng_consumer_stream *stream;
3485 struct consumer_relayd_sock_pair *relayd = NULL;
3486 int (*data_pending)(struct lttng_consumer_stream *);
3487
3488 DBG("Consumer data pending command on session id %" PRIu64, id);
3489
3490 rcu_read_lock();
3491 pthread_mutex_lock(&consumer_data.lock);
3492
3493 switch (consumer_data.type) {
3494 case LTTNG_CONSUMER_KERNEL:
3495 data_pending = lttng_kconsumer_data_pending;
3496 break;
3497 case LTTNG_CONSUMER32_UST:
3498 case LTTNG_CONSUMER64_UST:
3499 data_pending = lttng_ustconsumer_data_pending;
3500 break;
3501 default:
3502 ERR("Unknown consumer data type");
3503 assert(0);
3504 }
3505
3506 /* Ease our life a bit */
3507 ht = consumer_data.stream_list_ht;
3508
3509 relayd = find_relayd_by_session_id(id);
3510 if (relayd) {
3511 /* Send init command for data pending. */
3512 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
3513 ret = relayd_begin_data_pending(&relayd->control_sock,
3514 relayd->relayd_session_id);
3515 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
3516 if (ret < 0) {
3517 /* Communication error thus the relayd so no data pending. */
3518 goto data_not_pending;
3519 }
3520 }
3521
3522 cds_lfht_for_each_entry_duplicate(ht->ht,
3523 ht->hash_fct(&id, lttng_ht_seed),
3524 ht->match_fct, &id,
3525 &iter.iter, stream, node_session_id.node) {
3526 /* If this call fails, the stream is being used hence data pending. */
3527 ret = stream_try_lock(stream);
3528 if (!ret) {
3529 goto data_pending;
3530 }
3531
3532 /*
3533 * A removed node from the hash table indicates that the stream has
3534 * been deleted thus having a guarantee that the buffers are closed
3535 * on the consumer side. However, data can still be transmitted
3536 * over the network so don't skip the relayd check.
3537 */
3538 ret = cds_lfht_is_node_deleted(&stream->node.node);
3539 if (!ret) {
3540 /*
3541 * An empty output file is not valid. We need at least one packet
3542 * generated per stream, even if it contains no event, so it
3543 * contains at least one packet header.
3544 */
3545 if (stream->output_written == 0) {
3546 pthread_mutex_unlock(&stream->lock);
3547 goto data_pending;
3548 }
3549 /* Check the stream if there is data in the buffers. */
3550 ret = data_pending(stream);
3551 if (ret == 1) {
3552 pthread_mutex_unlock(&stream->lock);
3553 goto data_pending;
3554 }
3555 }
3556
3557 /* Relayd check */
3558 if (relayd) {
3559 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
3560 if (stream->metadata_flag) {
3561 ret = relayd_quiescent_control(&relayd->control_sock,
3562 stream->relayd_stream_id);
3563 } else {
3564 ret = relayd_data_pending(&relayd->control_sock,
3565 stream->relayd_stream_id,
3566 stream->next_net_seq_num - 1);
3567 }
3568 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
3569 if (ret == 1) {
3570 pthread_mutex_unlock(&stream->lock);
3571 goto data_pending;
3572 }
3573 }
3574 pthread_mutex_unlock(&stream->lock);
3575 }
3576
3577 if (relayd) {
3578 unsigned int is_data_inflight = 0;
3579
3580 /* Send init command for data pending. */
3581 pthread_mutex_lock(&relayd->ctrl_sock_mutex);
3582 ret = relayd_end_data_pending(&relayd->control_sock,
3583 relayd->relayd_session_id, &is_data_inflight);
3584 pthread_mutex_unlock(&relayd->ctrl_sock_mutex);
3585 if (ret < 0) {
3586 goto data_not_pending;
3587 }
3588 if (is_data_inflight) {
3589 goto data_pending;
3590 }
3591 }
3592
3593 /*
3594 * Finding _no_ node in the hash table and no inflight data means that the
3595 * stream(s) have been removed thus data is guaranteed to be available for
3596 * analysis from the trace files.
3597 */
3598
3599 data_not_pending:
3600 /* Data is available to be read by a viewer. */
3601 pthread_mutex_unlock(&consumer_data.lock);
3602 rcu_read_unlock();
3603 return 0;
3604
3605 data_pending:
3606 /* Data is still being extracted from buffers. */
3607 pthread_mutex_unlock(&consumer_data.lock);
3608 rcu_read_unlock();
3609 return 1;
3610 }
3611
3612 /*
3613 * Send a ret code status message to the sessiond daemon.
3614 *
3615 * Return the sendmsg() return value.
3616 */
3617 int consumer_send_status_msg(int sock, int ret_code)
3618 {
3619 struct lttcomm_consumer_status_msg msg;
3620
3621 msg.ret_code = ret_code;
3622
3623 return lttcomm_send_unix_sock(sock, &msg, sizeof(msg));
3624 }
3625
3626 /*
3627 * Send a channel status message to the sessiond daemon.
3628 *
3629 * Return the sendmsg() return value.
3630 */
3631 int consumer_send_status_channel(int sock,
3632 struct lttng_consumer_channel *channel)
3633 {
3634 struct lttcomm_consumer_status_channel msg;
3635
3636 assert(sock >= 0);
3637
3638 if (!channel) {
3639 msg.ret_code = LTTCOMM_CONSUMERD_CHANNEL_FAIL;
3640 } else {
3641 msg.ret_code = LTTCOMM_CONSUMERD_SUCCESS;
3642 msg.key = channel->key;
3643 msg.stream_count = channel->streams.count;
3644 }
3645
3646 return lttcomm_send_unix_sock(sock, &msg, sizeof(msg));
3647 }
3648
3649 /*
3650 * Using a maximum stream size with the produced and consumed position of a
3651 * stream, computes the new consumed position to be as close as possible to the
3652 * maximum possible stream size.
3653 *
3654 * If maximum stream size is lower than the possible buffer size (produced -
3655 * consumed), the consumed_pos given is returned untouched else the new value
3656 * is returned.
3657 */
3658 unsigned long consumer_get_consumed_maxsize(unsigned long consumed_pos,
3659 unsigned long produced_pos, uint64_t max_stream_size)
3660 {
3661 if (max_stream_size && max_stream_size < (produced_pos - consumed_pos)) {
3662 /* Offset from the produced position to get the latest buffers. */
3663 return produced_pos - max_stream_size;
3664 }
3665
3666 return consumed_pos;
3667 }
This page took 0.158955 seconds and 4 git commands to generate.