Fix: sessiond: fix memory leak in receive_lttng_trigger
[lttng-tools.git] / src / bin / lttng-sessiond / health.c
index 9ff6bd1ae1013d9b86e5e178f920ff7286e63114..7fc557da5f8d28164af0cc9129d89768bda9949f 100644 (file)
@@ -1,19 +1,9 @@
 /*
- * Copyright (C) 2012 David Goulet <dgoulet@efficios.com>
- * Copyright (C) 2018 Jérémie Galarneau <jeremie.galarneau@efficios.com>
+ * Copyright (C) 2012 David Goulet <dgoulet@efficios.com>
+ * Copyright (C) 2018 Jérémie Galarneau <jeremie.galarneau@efficios.com>
  *
- * This program is free software; you can redistribute it and/or modify it
- * under the terms of the GNU General Public License, version 2 only, as
- * published by the Free Software Foundation.
+ * SPDX-License-Identifier: GPL-2.0-only
  *
- * This program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
- * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
- * more details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this program; if not, write to the Free Software Foundation, Inc., 51
- * Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  */
 
 #include "lttng-sessiond.h"
@@ -87,7 +77,7 @@ static void *thread_manage_health(void *data)
        }
 
        /* Create unix socket */
-       sock = lttcomm_create_unix_sock(config.health_unix_sock_path.value);
+       sock = lttcomm_create_unix_sock(the_config.health_unix_sock_path.value);
        if (sock < 0) {
                ERR("Unable to create health check Unix socket");
                goto error;
@@ -97,23 +87,23 @@ static void *thread_manage_health(void *data)
                /* lttng health client socket path permissions */
                gid_t gid;
 
-               ret = utils_get_group_id(config.tracing_group_name.value, true, &gid);
+               ret = utils_get_group_id(the_config.tracing_group_name.value, true, &gid);
                if (ret) {
                        /* Default to root group. */
                        gid = 0;
                }
 
-               ret = chown(config.health_unix_sock_path.value, 0, gid);
+               ret = chown(the_config.health_unix_sock_path.value, 0, gid);
                if (ret < 0) {
-                       ERR("Unable to set group on %s", config.health_unix_sock_path.value);
+                       ERR("Unable to set group on %s", the_config.health_unix_sock_path.value);
                        PERROR("chown");
                        goto error;
                }
 
-               ret = chmod(config.health_unix_sock_path.value,
+               ret = chmod(the_config.health_unix_sock_path.value,
                                S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
                if (ret < 0) {
-                       ERR("Unable to set permissions on %s", config.health_unix_sock_path.value);
+                       ERR("Unable to set permissions on %s", the_config.health_unix_sock_path.value);
                        PERROR("chmod");
                        goto error;
                }
@@ -213,7 +203,7 @@ restart:
                         * health_check_state returns 0 if health is
                         * bad.
                         */
-                       if (!health_check_state(health_sessiond, i)) {
+                       if (!health_check_state(the_health_sessiond, i)) {
                                reply.ret_code |= 1ULL << i;
                        }
                }
@@ -239,7 +229,7 @@ error:
                ERR("Health error occurred in %s", __func__);
        }
        DBG("Health check thread dying");
-       unlink(config.health_unix_sock_path.value);
+       unlink(the_config.health_unix_sock_path.value);
        if (sock >= 0) {
                ret = close(sock);
                if (ret) {
This page took 0.025853 seconds and 4 git commands to generate.