Fix: app cmd leak on sessiond exit
[lttng-tools.git] / src / bin / lttng-sessiond / main.c
index 196aa137178ce2bf31a5ad565c72cac11530ea4c..6310db7e601654f5d5f3bc0c1bae41cf866c532a 100644 (file)
@@ -73,6 +73,7 @@
 #include "save.h"
 #include "load-session-thread.h"
 #include "syscall.h"
+#include "agent.h"
 
 #define CONSUMERD_FILE "lttng-consumerd"
 
@@ -305,6 +306,9 @@ const char * const config_section_name = "sessiond";
 /* Load session thread information to operate. */
 struct load_session_thread_data *load_info;
 
+/* Global hash tables */
+struct lttng_ht *agent_apps_ht_by_sock = NULL;
+
 /*
  * Whether sessiond is ready for commands/health check requests.
  * NR_LTTNG_SESSIOND_READY must match the number of calls to
@@ -1212,6 +1216,9 @@ static void *thread_manage_consumer(void *data)
 
        DBG("[thread] Manage consumer started");
 
+       rcu_register_thread();
+       rcu_thread_online();
+
        health_register(health_sessiond, HEALTH_SESSIOND_TYPE_CONSUMER);
 
        health_code_update();
@@ -1510,6 +1517,9 @@ error_poll:
        health_unregister(health_sessiond);
        DBG("consumer thread cleanup completed");
 
+       rcu_thread_offline();
+       rcu_unregister_thread();
+
        return NULL;
 }
 
@@ -2021,6 +2031,22 @@ error:
                free(wait_node);
        }
 
+       /* Empty command queue. */
+       for (;;) {
+               /* Dequeue command for registration */
+               node = cds_wfcq_dequeue_blocking(&ust_cmd_queue.head, &ust_cmd_queue.tail);
+               if (node == NULL) {
+                       break;
+               }
+               ust_cmd = caa_container_of(node, struct ust_command, node);
+               ret = close(ust_cmd->sock);
+               if (ret < 0) {
+                       PERROR("close ust sock exit dispatch %d", ust_cmd->sock);
+               }
+               lttng_fd_put(LTTNG_FD_APPS, 1);
+               free(ust_cmd);
+       }
+
 error_testpoint:
        DBG("Dispatch thread dying");
        if (err) {
@@ -2153,6 +2179,10 @@ static void *thread_registration_apps(void *data)
                                        ust_cmd = zmalloc(sizeof(struct ust_command));
                                        if (ust_cmd == NULL) {
                                                PERROR("ust command zmalloc");
+                                               ret = close(sock);
+                                               if (ret) {
+                                                       PERROR("close");
+                                               }
                                                goto error;
                                        }
 
@@ -2709,7 +2739,7 @@ static int copy_session_consumer(int domain, struct ltt_session *session)
                 * domain.
                 */
                if (session->kernel_session->consumer) {
-                       consumer_destroy_output(session->kernel_session->consumer);
+                       consumer_output_put(session->kernel_session->consumer);
                }
                session->kernel_session->consumer =
                        consumer_copy_output(session->consumer);
@@ -2723,7 +2753,7 @@ static int copy_session_consumer(int domain, struct ltt_session *session)
        case LTTNG_DOMAIN_UST:
                DBG3("Copying tracing session consumer output in UST session");
                if (session->ust_session->consumer) {
-                       consumer_destroy_output(session->ust_session->consumer);
+                       consumer_output_put(session->ust_session->consumer);
                }
                session->ust_session->consumer =
                        consumer_copy_output(session->consumer);
@@ -2843,7 +2873,7 @@ static int create_kernel_session(struct ltt_session *session)
                                session->kernel_session->consumer->dst.trace_path,
                                S_IRWXU | S_IRWXG, session->uid, session->gid);
                if (ret < 0) {
-                       if (ret != -EEXIST) {
+                       if (errno != EEXIST) {
                                ERR("Trace directory creation error");
                                goto error;
                        }
@@ -3263,8 +3293,34 @@ skip_domain:
        }
        case LTTNG_DISABLE_EVENT:
        {
+
+               /*
+                * FIXME: handle filter; for now we just receive the filter's
+                * bytecode along with the filter expression which are sent by
+                * liblttng-ctl and discard them.
+                *
+                * This fixes an issue where the client may block while sending
+                * the filter payload and encounter an error because the session
+                * daemon closes the socket without ever handling this data.
+                */
+               size_t count = cmd_ctx->lsm->u.disable.expression_len +
+                       cmd_ctx->lsm->u.disable.bytecode_len;
+
+               if (count) {
+                       char data[LTTNG_FILTER_MAX_LEN];
+
+                       DBG("Discarding disable event command payload of size %zu", count);
+                       while (count) {
+                               ret = lttcomm_recv_unix_sock(sock, data,
+                                       count > sizeof(data) ? sizeof(data) : count);
+                               if (ret < 0) {
+                                       goto error;
+                               }
+
+                               count -= (size_t) ret;
+                       }
+               }
                /* FIXME: passing packed structure to non-packed pointer */
-               /* TODO: handle filter */
                ret = cmd_disable_event(cmd_ctx->session, cmd_ctx->lsm->domain.type,
                                cmd_ctx->lsm->u.disable.channel_name,
                                &cmd_ctx->lsm->u.disable.event);
@@ -3762,7 +3818,35 @@ skip_domain:
        }
        case LTTNG_DATA_PENDING:
        {
-               ret = cmd_data_pending(cmd_ctx->session);
+               int pending_ret;
+
+               /* 1 byte to return whether or not data is pending */
+               ret = setup_lttng_msg(cmd_ctx, 1);
+               if (ret < 0) {
+                       goto setup_error;
+               }
+
+               pending_ret = cmd_data_pending(cmd_ctx->session);
+               /*
+                * FIXME
+                *
+                * This function may returns 0 or 1 to indicate whether or not
+                * there is data pending. In case of error, it should return an
+                * LTTNG_ERR code. However, some code paths may still return
+                * a nondescript error code, which we handle by returning an
+                * "unknown" error.
+                */
+               if (pending_ret == 0 || pending_ret == 1) {
+                       ret = LTTNG_OK;
+               } else if (pending_ret < 0) {
+                       ret = LTTNG_ERR_UNK;
+                       goto setup_error;
+               } else {
+                       ret = pending_ret;
+                       goto setup_error;
+               }
+
+               *cmd_ctx->llm->payload = (uint8_t) pending_ret;
                break;
        }
        case LTTNG_SNAPSHOT_ADD_OUTPUT:
@@ -4329,9 +4413,10 @@ static void *thread_manage_clients(void *data)
 
                health_code_update();
 
-               DBG("Sending response (size: %d, retcode: %s)",
+               DBG("Sending response (size: %d, retcode: %s (%d))",
                                cmd_ctx->lttng_msg_size,
-                               lttng_strerror(-cmd_ctx->llm->ret_code));
+                               lttng_strerror(-cmd_ctx->llm->ret_code),
+                               cmd_ctx->llm->ret_code);
                ret = send_unix_sock(sock, cmd_ctx->llm, cmd_ctx->lttng_msg_size);
                if (ret < 0) {
                        ERR("Failed to send data back to client");
@@ -4443,6 +4528,11 @@ static void usage(void)
        fprintf(stderr, "      --extra-kmod-probes            Specify extra kernel module probes to load\n");
 }
 
+static int string_match(const char *str1, const char *str2)
+{
+       return (str1 && str2) && !strcmp(str1, str2);
+}
+
 /*
  * Take an option from the getopt output and set it in the right variable to be
  * used later.
@@ -4464,36 +4554,25 @@ static int set_option(int opt, const char *arg, const char *optname)
                goto end;
        }
 
-       switch (opt) {
-       case 0:
-               fprintf(stderr, "option %s", optname);
-               if (arg) {
-                       fprintf(stderr, " with arg %s\n", arg);
-               }
-               break;
-       case 'c':
+       if (string_match(optname, "client-sock") || opt == 'c') {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "-c, --client-sock");
                } else {
                        snprintf(client_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'a':
+       } else if (string_match(optname, "apps-sock") || opt == 'a') {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "-a, --apps-sock");
                } else {
                        snprintf(apps_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'd':
+       } else if (string_match(optname, "daemonize") || opt == 'd') {
                opt_daemon = 1;
-               break;
-       case 'b':
+       } else if (string_match(optname, "background") || opt == 'b') {
                opt_background = 1;
-               break;
-       case 'g':
+       } else if (string_match(optname, "group") || opt == 'g') {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "-g, --group");
@@ -4513,71 +4592,61 @@ static int set_option(int opt, const char *arg, const char *optname)
                        }
                        tracing_group_name_override = 1;
                }
-               break;
-       case 'h':
+       } else if (string_match(optname, "help") || opt == 'h') {
                usage();
                exit(EXIT_SUCCESS);
-       case 'V':
+       } else if (string_match(optname, "version") || opt == 'V') {
                fprintf(stdout, "%s\n", VERSION);
                exit(EXIT_SUCCESS);
-       case 'S':
+       } else if (string_match(optname, "sig-parent") || opt == 'S') {
                opt_sig_parent = 1;
-               break;
-       case 'E':
+       } else if (string_match(optname, "kconsumerd-err-sock")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--kconsumerd-err-sock");
                } else {
                        snprintf(kconsumer_data.err_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'C':
+       } else if (string_match(optname, "kconsumerd-cmd-sock")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--kconsumerd-cmd-sock");
                } else {
                        snprintf(kconsumer_data.cmd_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'F':
+       } else if (string_match(optname, "ustconsumerd64-err-sock")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--ustconsumerd64-err-sock");
                } else {
                        snprintf(ustconsumer64_data.err_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'D':
+       } else if (string_match(optname, "ustconsumerd64-cmd-sock")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--ustconsumerd64-cmd-sock");
                } else {
                        snprintf(ustconsumer64_data.cmd_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'H':
+       } else if (string_match(optname, "ustconsumerd32-err-sock")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--ustconsumerd32-err-sock");
                } else {
                        snprintf(ustconsumer32_data.err_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'G':
+       } else if (string_match(optname, "ustconsumerd32-cmd-sock")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--ustconsumerd32-cmd-sock");
                } else {
                        snprintf(ustconsumer32_data.cmd_unix_sock_path, PATH_MAX, "%s", arg);
                }
-               break;
-       case 'N':
+       } else if (string_match(optname, "no-kernel")) {
                opt_no_kernel = 1;
-               break;
-       case 'q':
+       } else if (string_match(optname, "quiet") || opt == 'q') {
                lttng_opt_quiet = 1;
-               break;
-       case 'v':
+       } else if (string_match(optname, "verbose") || opt == 'v') {
                /* Verbose level can increase using multiple -v */
                if (arg) {
                        /* Value obtained from config file */
@@ -4589,15 +4658,13 @@ static int set_option(int opt, const char *arg, const char *optname)
                /* Clamp value to [0, 3] */
                lttng_opt_verbose = lttng_opt_verbose < 0 ? 0 :
                        (lttng_opt_verbose <= 3 ? lttng_opt_verbose : 3);
-               break;
-       case 'Z':
+       } else if (string_match(optname, "verbose-consumer")) {
                if (arg) {
                        opt_verbose_consumer = config_parse_value(arg);
                } else {
                        opt_verbose_consumer += 1;
                }
-               break;
-       case 'u':
+       } else if (string_match(optname, "consumerd32-path")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--consumerd32-path");
@@ -4612,8 +4679,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                        }
                        consumerd32_bin_override = 1;
                }
-               break;
-       case 'U':
+       } else if (string_match(optname, "consumerd32-libdir")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--consumerd32-libdir");
@@ -4628,8 +4694,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                        }
                        consumerd32_libdir_override = 1;
                }
-               break;
-       case 't':
+       } else if (string_match(optname, "consumerd64-path")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--consumerd64-path");
@@ -4644,8 +4709,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                        }
                        consumerd64_bin_override = 1;
                }
-               break;
-       case 'T':
+       } else if (string_match(optname, "consumerd64-libdir")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--consumerd64-libdir");
@@ -4660,8 +4724,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                        }
                        consumerd64_libdir_override = 1;
                }
-               break;
-       case 'p':
+       } else if (string_match(optname, "pidfile") || opt == 'p') {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "-p, --pidfile");
@@ -4673,9 +4736,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                                ret = -ENOMEM;
                        }
                }
-               break;
-       case 'J': /* Agent TCP port. */
-       {
+       } else if (string_match(optname, "agent-tcp-port")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--agent-tcp-port");
@@ -4699,9 +4760,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                        agent_tcp_port = (uint32_t) v;
                        DBG3("Agent TCP port set to non default: %u", agent_tcp_port);
                }
-               break;
-       }
-       case 'l':
+       } else if (string_match(optname, "load") || opt == 'l') {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "-l, --load");
@@ -4713,8 +4772,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                                ret = -ENOMEM;
                        }
                }
-               break;
-       case 'P': /* probe modules list */
+       } else if (string_match(optname, "kmod-probes")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--kmod-probes");
@@ -4726,8 +4784,7 @@ static int set_option(int opt, const char *arg, const char *optname)
                                ret = -ENOMEM;
                        }
                }
-               break;
-       case 'e':
+       } else if (string_match(optname, "extra-kmod-probes")) {
                if (lttng_is_setuid_setgid()) {
                        WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.",
                                "--extra-kmod-probes");
@@ -4739,11 +4796,10 @@ static int set_option(int opt, const char *arg, const char *optname)
                                ret = -ENOMEM;
                        }
                }
-               break;
-       case 'f':
-               /* This is handled in set_options() thus silent break. */
-               break;
-       default:
+       } else if (string_match(optname, "config") || opt == 'f') {
+               /* This is handled in set_options() thus silent skip. */
+               goto end;
+       } else {
                /* Unknown option or other error.
                 * Error is printed by getopt, just return */
                ret = -1;
@@ -4878,12 +4934,24 @@ static int set_options(int argc, char **argv)
        optopt = orig_optopt;
        optind = orig_optind;
        while (1) {
-               c = getopt_long(argc, argv, optstring, long_options, &option_index);
+               option_index = -1;
+               /*
+                * getopt_long() will not set option_index if it encounters a
+                * short option.
+                */
+               c = getopt_long(argc, argv, optstring, long_options,
+                               &option_index);
                if (c == -1) {
                        break;
                }
 
-               ret = set_option(c, optarg, long_options[option_index].name);
+               /*
+                * Pass NULL as the long option name if popt left the index
+                * unset.
+                */
+               ret = set_option(c, optarg,
+                               option_index < 0 ? NULL :
+                               long_options[option_index].name);
                if (ret < 0) {
                        break;
                }
@@ -5921,6 +5989,10 @@ exit_apps:
        }
 exit_reg_apps:
 
+       /*
+        * Join dispatch thread after joining reg_apps_thread to ensure
+        * we don't leak applications in the queue.
+        */
        ret = pthread_join(dispatch_thread, &status);
        if (ret) {
                errno = ret;
This page took 0.028697 seconds and 4 git commands to generate.