Commit | Line | Data |
---|---|---|
3bd1e081 MD |
1 | /* |
2 | * Copyright (C) 2011 - Julien Desfossez <julien.desfossez@polymtl.ca> | |
3 | * Mathieu Desnoyers <mathieu.desnoyers@efficios.com> | |
4 | * | |
d14d33bf AM |
5 | * This program is free software; you can redistribute it and/or modify |
6 | * it under the terms of the GNU General Public License, version 2 only, | |
7 | * as published by the Free Software Foundation. | |
3bd1e081 MD |
8 | * |
9 | * This program is distributed in the hope that it will be useful, | |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
13 | * | |
d14d33bf AM |
14 | * You should have received a copy of the GNU General Public License along |
15 | * with this program; if not, write to the Free Software Foundation, Inc., | |
16 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | |
3bd1e081 MD |
17 | */ |
18 | ||
19 | #define _GNU_SOURCE | |
20 | #include <assert.h> | |
3bd1e081 MD |
21 | #include <poll.h> |
22 | #include <pthread.h> | |
23 | #include <stdlib.h> | |
24 | #include <string.h> | |
25 | #include <sys/mman.h> | |
26 | #include <sys/socket.h> | |
27 | #include <sys/types.h> | |
77c7c900 | 28 | #include <inttypes.h> |
3bd1e081 | 29 | #include <unistd.h> |
dbb5dfe6 | 30 | #include <sys/stat.h> |
3bd1e081 | 31 | |
990570ed | 32 | #include <common/common.h> |
10a8a223 | 33 | #include <common/kernel-ctl/kernel-ctl.h> |
10a8a223 | 34 | #include <common/sessiond-comm/sessiond-comm.h> |
00e2e675 | 35 | #include <common/sessiond-comm/relayd.h> |
dbb5dfe6 | 36 | #include <common/compat/fcntl.h> |
acdb9057 | 37 | #include <common/pipe.h> |
00e2e675 | 38 | #include <common/relayd/relayd.h> |
fe4477ee | 39 | #include <common/utils.h> |
07b86b52 | 40 | #include <common/consumer-stream.h> |
309167d2 | 41 | #include <common/index/index.h> |
0857097f | 42 | |
10a8a223 | 43 | #include "kernel-consumer.h" |
3bd1e081 MD |
44 | |
45 | extern struct lttng_consumer_global_data consumer_data; | |
46 | extern int consumer_poll_timeout; | |
47 | extern volatile int consumer_quit; | |
48 | ||
3bd1e081 MD |
49 | /* |
50 | * Take a snapshot for a specific fd | |
51 | * | |
52 | * Returns 0 on success, < 0 on error | |
53 | */ | |
ffe60014 | 54 | int lttng_kconsumer_take_snapshot(struct lttng_consumer_stream *stream) |
3bd1e081 MD |
55 | { |
56 | int ret = 0; | |
57 | int infd = stream->wait_fd; | |
58 | ||
59 | ret = kernctl_snapshot(infd); | |
60 | if (ret != 0) { | |
3bd1e081 | 61 | perror("Getting sub-buffer snapshot."); |
56591bac | 62 | ret = -errno; |
3bd1e081 MD |
63 | } |
64 | ||
65 | return ret; | |
66 | } | |
67 | ||
68 | /* | |
69 | * Get the produced position | |
70 | * | |
71 | * Returns 0 on success, < 0 on error | |
72 | */ | |
ffe60014 | 73 | int lttng_kconsumer_get_produced_snapshot(struct lttng_consumer_stream *stream, |
3bd1e081 MD |
74 | unsigned long *pos) |
75 | { | |
76 | int ret; | |
77 | int infd = stream->wait_fd; | |
78 | ||
79 | ret = kernctl_snapshot_get_produced(infd, pos); | |
80 | if (ret != 0) { | |
3bd1e081 | 81 | perror("kernctl_snapshot_get_produced"); |
56591bac | 82 | ret = -errno; |
3bd1e081 MD |
83 | } |
84 | ||
85 | return ret; | |
86 | } | |
87 | ||
07b86b52 JD |
88 | /* |
89 | * Get the consumerd position | |
90 | * | |
91 | * Returns 0 on success, < 0 on error | |
92 | */ | |
93 | int lttng_kconsumer_get_consumed_snapshot(struct lttng_consumer_stream *stream, | |
94 | unsigned long *pos) | |
95 | { | |
96 | int ret; | |
97 | int infd = stream->wait_fd; | |
98 | ||
99 | ret = kernctl_snapshot_get_consumed(infd, pos); | |
100 | if (ret != 0) { | |
07b86b52 | 101 | perror("kernctl_snapshot_get_consumed"); |
56591bac | 102 | ret = -errno; |
07b86b52 JD |
103 | } |
104 | ||
105 | return ret; | |
106 | } | |
107 | ||
07b86b52 JD |
108 | /* |
109 | * Take a snapshot of all the stream of a channel | |
110 | * | |
111 | * Returns 0 on success, < 0 on error | |
112 | */ | |
113 | int lttng_kconsumer_snapshot_channel(uint64_t key, char *path, | |
5c786ded JD |
114 | uint64_t relayd_id, uint64_t max_stream_size, |
115 | struct lttng_consumer_local_data *ctx) | |
07b86b52 JD |
116 | { |
117 | int ret; | |
118 | unsigned long consumed_pos, produced_pos; | |
119 | struct lttng_consumer_channel *channel; | |
120 | struct lttng_consumer_stream *stream; | |
121 | ||
6a00837f | 122 | DBG("Kernel consumer snapshot channel %" PRIu64, key); |
07b86b52 JD |
123 | |
124 | rcu_read_lock(); | |
125 | ||
126 | channel = consumer_find_channel(key); | |
127 | if (!channel) { | |
6a00837f | 128 | ERR("No channel found for key %" PRIu64, key); |
07b86b52 JD |
129 | ret = -1; |
130 | goto end; | |
131 | } | |
132 | ||
133 | /* Splice is not supported yet for channel snapshot. */ | |
134 | if (channel->output != CONSUMER_CHANNEL_MMAP) { | |
135 | ERR("Unsupported output %d", channel->output); | |
136 | ret = -1; | |
137 | goto end; | |
138 | } | |
139 | ||
10a50311 | 140 | cds_list_for_each_entry(stream, &channel->streams.head, send_node) { |
07b86b52 JD |
141 | /* |
142 | * Lock stream because we are about to change its state. | |
143 | */ | |
144 | pthread_mutex_lock(&stream->lock); | |
145 | ||
29decac3 DG |
146 | /* |
147 | * Assign the received relayd ID so we can use it for streaming. The streams | |
148 | * are not visible to anyone so this is OK to change it. | |
149 | */ | |
07b86b52 JD |
150 | stream->net_seq_idx = relayd_id; |
151 | channel->relayd_id = relayd_id; | |
152 | if (relayd_id != (uint64_t) -1ULL) { | |
10a50311 | 153 | ret = consumer_send_relayd_stream(stream, path); |
07b86b52 JD |
154 | if (ret < 0) { |
155 | ERR("sending stream to relayd"); | |
156 | goto end_unlock; | |
157 | } | |
07b86b52 JD |
158 | } else { |
159 | ret = utils_create_stream_file(path, stream->name, | |
10a50311 JD |
160 | stream->chan->tracefile_size, |
161 | stream->tracefile_count_current, | |
309167d2 | 162 | stream->uid, stream->gid, NULL); |
07b86b52 JD |
163 | if (ret < 0) { |
164 | ERR("utils_create_stream_file"); | |
165 | goto end_unlock; | |
166 | } | |
167 | ||
168 | stream->out_fd = ret; | |
169 | stream->tracefile_size_current = 0; | |
170 | ||
81ea21bf MD |
171 | DBG("Kernel consumer snapshot stream %s/%s (%" PRIu64 ")", |
172 | path, stream->name, stream->key); | |
07b86b52 JD |
173 | } |
174 | ||
175 | ret = kernctl_buffer_flush(stream->wait_fd); | |
176 | if (ret < 0) { | |
10a50311 | 177 | ERR("Failed to flush kernel stream"); |
56591bac | 178 | ret = -errno; |
07b86b52 JD |
179 | goto end_unlock; |
180 | } | |
181 | ||
182 | ret = lttng_kconsumer_take_snapshot(stream); | |
183 | if (ret < 0) { | |
184 | ERR("Taking kernel snapshot"); | |
185 | goto end_unlock; | |
186 | } | |
187 | ||
188 | ret = lttng_kconsumer_get_produced_snapshot(stream, &produced_pos); | |
189 | if (ret < 0) { | |
190 | ERR("Produced kernel snapshot position"); | |
191 | goto end_unlock; | |
192 | } | |
193 | ||
194 | ret = lttng_kconsumer_get_consumed_snapshot(stream, &consumed_pos); | |
195 | if (ret < 0) { | |
196 | ERR("Consumerd kernel snapshot position"); | |
197 | goto end_unlock; | |
198 | } | |
199 | ||
200 | if (stream->max_sb_size == 0) { | |
201 | ret = kernctl_get_max_subbuf_size(stream->wait_fd, | |
202 | &stream->max_sb_size); | |
203 | if (ret < 0) { | |
204 | ERR("Getting kernel max_sb_size"); | |
56591bac | 205 | ret = -errno; |
07b86b52 JD |
206 | goto end_unlock; |
207 | } | |
208 | } | |
209 | ||
5c786ded JD |
210 | /* |
211 | * The original value is sent back if max stream size is larger than | |
212 | * the possible size of the snapshot. Also, we asume that the session | |
213 | * daemon should never send a maximum stream size that is lower than | |
214 | * subbuffer size. | |
215 | */ | |
216 | consumed_pos = consumer_get_consumed_maxsize(consumed_pos, | |
217 | produced_pos, max_stream_size); | |
218 | ||
07b86b52 JD |
219 | while (consumed_pos < produced_pos) { |
220 | ssize_t read_len; | |
221 | unsigned long len, padded_len; | |
222 | ||
223 | DBG("Kernel consumer taking snapshot at pos %lu", consumed_pos); | |
224 | ||
225 | ret = kernctl_get_subbuf(stream->wait_fd, &consumed_pos); | |
226 | if (ret < 0) { | |
227 | if (errno != EAGAIN) { | |
228 | PERROR("kernctl_get_subbuf snapshot"); | |
56591bac | 229 | ret = -errno; |
07b86b52 JD |
230 | goto end_unlock; |
231 | } | |
232 | DBG("Kernel consumer get subbuf failed. Skipping it."); | |
233 | consumed_pos += stream->max_sb_size; | |
234 | continue; | |
235 | } | |
236 | ||
237 | ret = kernctl_get_subbuf_size(stream->wait_fd, &len); | |
238 | if (ret < 0) { | |
239 | ERR("Snapshot kernctl_get_subbuf_size"); | |
56591bac | 240 | ret = -errno; |
29decac3 | 241 | goto error_put_subbuf; |
07b86b52 JD |
242 | } |
243 | ||
244 | ret = kernctl_get_padded_subbuf_size(stream->wait_fd, &padded_len); | |
245 | if (ret < 0) { | |
246 | ERR("Snapshot kernctl_get_padded_subbuf_size"); | |
56591bac | 247 | ret = -errno; |
29decac3 | 248 | goto error_put_subbuf; |
07b86b52 JD |
249 | } |
250 | ||
251 | read_len = lttng_consumer_on_read_subbuffer_mmap(ctx, stream, len, | |
309167d2 | 252 | padded_len - len, NULL); |
07b86b52 | 253 | /* |
29decac3 DG |
254 | * We write the padded len in local tracefiles but the data len |
255 | * when using a relay. Display the error but continue processing | |
256 | * to try to release the subbuffer. | |
07b86b52 JD |
257 | */ |
258 | if (relayd_id != (uint64_t) -1ULL) { | |
259 | if (read_len != len) { | |
260 | ERR("Error sending to the relay (ret: %zd != len: %lu)", | |
261 | read_len, len); | |
262 | } | |
263 | } else { | |
264 | if (read_len != padded_len) { | |
265 | ERR("Error writing to tracefile (ret: %zd != len: %lu)", | |
266 | read_len, padded_len); | |
267 | } | |
268 | } | |
269 | ||
270 | ret = kernctl_put_subbuf(stream->wait_fd); | |
271 | if (ret < 0) { | |
272 | ERR("Snapshot kernctl_put_subbuf"); | |
56591bac | 273 | ret = -errno; |
07b86b52 JD |
274 | goto end_unlock; |
275 | } | |
276 | consumed_pos += stream->max_sb_size; | |
277 | } | |
278 | ||
279 | if (relayd_id == (uint64_t) -1ULL) { | |
fdf9986c MD |
280 | if (stream->out_fd >= 0) { |
281 | ret = close(stream->out_fd); | |
282 | if (ret < 0) { | |
283 | PERROR("Kernel consumer snapshot close out_fd"); | |
284 | goto end_unlock; | |
285 | } | |
286 | stream->out_fd = -1; | |
07b86b52 | 287 | } |
07b86b52 JD |
288 | } else { |
289 | close_relayd_stream(stream); | |
290 | stream->net_seq_idx = (uint64_t) -1ULL; | |
291 | } | |
292 | pthread_mutex_unlock(&stream->lock); | |
293 | } | |
294 | ||
295 | /* All good! */ | |
296 | ret = 0; | |
297 | goto end; | |
298 | ||
29decac3 DG |
299 | error_put_subbuf: |
300 | ret = kernctl_put_subbuf(stream->wait_fd); | |
301 | if (ret < 0) { | |
56591bac | 302 | ret = -errno; |
29decac3 DG |
303 | ERR("Snapshot kernctl_put_subbuf error path"); |
304 | } | |
07b86b52 JD |
305 | end_unlock: |
306 | pthread_mutex_unlock(&stream->lock); | |
307 | end: | |
308 | rcu_read_unlock(); | |
309 | return ret; | |
310 | } | |
311 | ||
312 | /* | |
313 | * Read the whole metadata available for a snapshot. | |
314 | * | |
315 | * Returns 0 on success, < 0 on error | |
316 | */ | |
317 | int lttng_kconsumer_snapshot_metadata(uint64_t key, char *path, | |
e2039c7a | 318 | uint64_t relayd_id, struct lttng_consumer_local_data *ctx) |
07b86b52 | 319 | { |
d771f832 DG |
320 | int ret, use_relayd = 0; |
321 | ssize_t ret_read; | |
07b86b52 JD |
322 | struct lttng_consumer_channel *metadata_channel; |
323 | struct lttng_consumer_stream *metadata_stream; | |
d771f832 DG |
324 | |
325 | assert(ctx); | |
07b86b52 JD |
326 | |
327 | DBG("Kernel consumer snapshot metadata with key %" PRIu64 " at path %s", | |
328 | key, path); | |
329 | ||
330 | rcu_read_lock(); | |
331 | ||
332 | metadata_channel = consumer_find_channel(key); | |
333 | if (!metadata_channel) { | |
d771f832 | 334 | ERR("Kernel snapshot metadata not found for key %" PRIu64, key); |
07b86b52 | 335 | ret = -1; |
d771f832 | 336 | goto error; |
07b86b52 JD |
337 | } |
338 | ||
339 | metadata_stream = metadata_channel->metadata_stream; | |
340 | assert(metadata_stream); | |
341 | ||
d771f832 | 342 | /* Flag once that we have a valid relayd for the stream. */ |
e2039c7a | 343 | if (relayd_id != (uint64_t) -1ULL) { |
d771f832 DG |
344 | use_relayd = 1; |
345 | } | |
346 | ||
347 | if (use_relayd) { | |
10a50311 | 348 | ret = consumer_send_relayd_stream(metadata_stream, path); |
e2039c7a | 349 | if (ret < 0) { |
d771f832 | 350 | goto error; |
e2039c7a | 351 | } |
e2039c7a JD |
352 | } else { |
353 | ret = utils_create_stream_file(path, metadata_stream->name, | |
354 | metadata_stream->chan->tracefile_size, | |
355 | metadata_stream->tracefile_count_current, | |
309167d2 | 356 | metadata_stream->uid, metadata_stream->gid, NULL); |
e2039c7a | 357 | if (ret < 0) { |
d771f832 | 358 | goto error; |
e2039c7a JD |
359 | } |
360 | metadata_stream->out_fd = ret; | |
07b86b52 | 361 | } |
07b86b52 | 362 | |
d771f832 DG |
363 | do { |
364 | ret_read = lttng_kconsumer_read_subbuffer(metadata_stream, ctx); | |
365 | if (ret_read < 0) { | |
56591bac | 366 | if (ret_read != -EAGAIN) { |
6a00837f | 367 | ERR("Kernel snapshot reading metadata subbuffer (ret: %zd)", |
d771f832 DG |
368 | ret_read); |
369 | goto error; | |
07b86b52 | 370 | } |
d771f832 | 371 | /* ret_read is negative at this point so we will exit the loop. */ |
07b86b52 JD |
372 | continue; |
373 | } | |
d771f832 | 374 | } while (ret_read >= 0); |
07b86b52 | 375 | |
d771f832 DG |
376 | if (use_relayd) { |
377 | close_relayd_stream(metadata_stream); | |
378 | metadata_stream->net_seq_idx = (uint64_t) -1ULL; | |
379 | } else { | |
fdf9986c MD |
380 | if (metadata_stream->out_fd >= 0) { |
381 | ret = close(metadata_stream->out_fd); | |
382 | if (ret < 0) { | |
383 | PERROR("Kernel consumer snapshot metadata close out_fd"); | |
384 | /* | |
385 | * Don't go on error here since the snapshot was successful at this | |
386 | * point but somehow the close failed. | |
387 | */ | |
388 | } | |
389 | metadata_stream->out_fd = -1; | |
e2039c7a | 390 | } |
e2039c7a JD |
391 | } |
392 | ||
07b86b52 | 393 | ret = 0; |
d771f832 | 394 | |
cf53a8a6 JD |
395 | cds_list_del(&metadata_stream->send_node); |
396 | consumer_stream_destroy(metadata_stream, NULL); | |
397 | metadata_channel->metadata_stream = NULL; | |
d771f832 | 398 | error: |
07b86b52 JD |
399 | rcu_read_unlock(); |
400 | return ret; | |
401 | } | |
402 | ||
1803a064 MD |
403 | /* |
404 | * Receive command from session daemon and process it. | |
405 | * | |
406 | * Return 1 on success else a negative value or 0. | |
407 | */ | |
3bd1e081 MD |
408 | int lttng_kconsumer_recv_cmd(struct lttng_consumer_local_data *ctx, |
409 | int sock, struct pollfd *consumer_sockpoll) | |
410 | { | |
411 | ssize_t ret; | |
f50f23d9 | 412 | enum lttng_error_code ret_code = LTTNG_OK; |
3bd1e081 MD |
413 | struct lttcomm_consumer_msg msg; |
414 | ||
415 | ret = lttcomm_recv_unix_sock(sock, &msg, sizeof(msg)); | |
416 | if (ret != sizeof(msg)) { | |
1803a064 | 417 | if (ret > 0) { |
c6857fcf | 418 | lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_ERROR_RECV_CMD); |
1803a064 MD |
419 | ret = -1; |
420 | } | |
3bd1e081 MD |
421 | return ret; |
422 | } | |
423 | if (msg.cmd_type == LTTNG_CONSUMER_STOP) { | |
f50f23d9 DG |
424 | /* |
425 | * Notify the session daemon that the command is completed. | |
426 | * | |
427 | * On transport layer error, the function call will print an error | |
428 | * message so handling the returned code is a bit useless since we | |
429 | * return an error code anyway. | |
430 | */ | |
431 | (void) consumer_send_status_msg(sock, ret_code); | |
3bd1e081 MD |
432 | return -ENOENT; |
433 | } | |
434 | ||
b0b335c8 MD |
435 | /* relayd needs RCU read-side protection */ |
436 | rcu_read_lock(); | |
437 | ||
3bd1e081 | 438 | switch (msg.cmd_type) { |
00e2e675 DG |
439 | case LTTNG_CONSUMER_ADD_RELAYD_SOCKET: |
440 | { | |
f50f23d9 | 441 | /* Session daemon status message are handled in the following call. */ |
7735ef9e DG |
442 | ret = consumer_add_relayd_socket(msg.u.relayd_sock.net_index, |
443 | msg.u.relayd_sock.type, ctx, sock, consumer_sockpoll, | |
46e6455f | 444 | &msg.u.relayd_sock.sock, msg.u.relayd_sock.session_id); |
00e2e675 DG |
445 | goto end_nosignal; |
446 | } | |
3bd1e081 MD |
447 | case LTTNG_CONSUMER_ADD_CHANNEL: |
448 | { | |
449 | struct lttng_consumer_channel *new_channel; | |
e43c41c5 | 450 | int ret_recv; |
3bd1e081 | 451 | |
f50f23d9 DG |
452 | /* First send a status message before receiving the fds. */ |
453 | ret = consumer_send_status_msg(sock, ret_code); | |
454 | if (ret < 0) { | |
455 | /* Somehow, the session daemon is not responding anymore. */ | |
1803a064 | 456 | goto error_fatal; |
f50f23d9 | 457 | } |
d88aee68 | 458 | DBG("consumer_add_channel %" PRIu64, msg.u.channel.channel_key); |
3bd1e081 | 459 | new_channel = consumer_allocate_channel(msg.u.channel.channel_key, |
ffe60014 DG |
460 | msg.u.channel.session_id, msg.u.channel.pathname, |
461 | msg.u.channel.name, msg.u.channel.uid, msg.u.channel.gid, | |
1624d5b7 JD |
462 | msg.u.channel.relayd_id, msg.u.channel.output, |
463 | msg.u.channel.tracefile_size, | |
1950109e | 464 | msg.u.channel.tracefile_count, 0, |
2bba9e53 | 465 | msg.u.channel.monitor); |
3bd1e081 | 466 | if (new_channel == NULL) { |
f73fabfd | 467 | lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_OUTFD_ERROR); |
3bd1e081 MD |
468 | goto end_nosignal; |
469 | } | |
ffe60014 | 470 | new_channel->nb_init_stream_left = msg.u.channel.nb_init_streams; |
95a1109b JD |
471 | switch (msg.u.channel.output) { |
472 | case LTTNG_EVENT_SPLICE: | |
473 | new_channel->output = CONSUMER_CHANNEL_SPLICE; | |
474 | break; | |
475 | case LTTNG_EVENT_MMAP: | |
476 | new_channel->output = CONSUMER_CHANNEL_MMAP; | |
477 | break; | |
478 | default: | |
479 | ERR("Channel output unknown %d", msg.u.channel.output); | |
480 | goto end_nosignal; | |
481 | } | |
ffe60014 DG |
482 | |
483 | /* Translate and save channel type. */ | |
484 | switch (msg.u.channel.type) { | |
485 | case CONSUMER_CHANNEL_TYPE_DATA: | |
486 | case CONSUMER_CHANNEL_TYPE_METADATA: | |
487 | new_channel->type = msg.u.channel.type; | |
488 | break; | |
489 | default: | |
490 | assert(0); | |
491 | goto end_nosignal; | |
492 | }; | |
493 | ||
3bd1e081 | 494 | if (ctx->on_recv_channel != NULL) { |
e43c41c5 JD |
495 | ret_recv = ctx->on_recv_channel(new_channel); |
496 | if (ret_recv == 0) { | |
497 | ret = consumer_add_channel(new_channel, ctx); | |
498 | } else if (ret_recv < 0) { | |
3bd1e081 MD |
499 | goto end_nosignal; |
500 | } | |
501 | } else { | |
e43c41c5 | 502 | ret = consumer_add_channel(new_channel, ctx); |
3bd1e081 | 503 | } |
e43c41c5 JD |
504 | |
505 | /* If we received an error in add_channel, we need to report it. */ | |
821fffb2 | 506 | if (ret < 0) { |
1803a064 MD |
507 | ret = consumer_send_status_msg(sock, ret); |
508 | if (ret < 0) { | |
509 | goto error_fatal; | |
510 | } | |
e43c41c5 JD |
511 | goto end_nosignal; |
512 | } | |
513 | ||
3bd1e081 MD |
514 | goto end_nosignal; |
515 | } | |
516 | case LTTNG_CONSUMER_ADD_STREAM: | |
517 | { | |
dae10966 DG |
518 | int fd; |
519 | struct lttng_pipe *stream_pipe; | |
00e2e675 | 520 | struct lttng_consumer_stream *new_stream; |
ffe60014 | 521 | struct lttng_consumer_channel *channel; |
c80048c6 | 522 | int alloc_ret = 0; |
3bd1e081 | 523 | |
ffe60014 DG |
524 | /* |
525 | * Get stream's channel reference. Needed when adding the stream to the | |
526 | * global hash table. | |
527 | */ | |
528 | channel = consumer_find_channel(msg.u.stream.channel_key); | |
529 | if (!channel) { | |
530 | /* | |
531 | * We could not find the channel. Can happen if cpu hotplug | |
532 | * happens while tearing down. | |
533 | */ | |
d88aee68 | 534 | ERR("Unable to find channel key %" PRIu64, msg.u.stream.channel_key); |
ffe60014 DG |
535 | ret_code = LTTNG_ERR_KERN_CHAN_NOT_FOUND; |
536 | } | |
537 | ||
f50f23d9 DG |
538 | /* First send a status message before receiving the fds. */ |
539 | ret = consumer_send_status_msg(sock, ret_code); | |
1803a064 | 540 | if (ret < 0) { |
d771f832 | 541 | /* Somehow, the session daemon is not responding anymore. */ |
1803a064 MD |
542 | goto error_fatal; |
543 | } | |
544 | if (ret_code != LTTNG_OK) { | |
d771f832 | 545 | /* Channel was not found. */ |
f50f23d9 DG |
546 | goto end_nosignal; |
547 | } | |
548 | ||
d771f832 | 549 | /* Blocking call */ |
3bd1e081 | 550 | if (lttng_consumer_poll_socket(consumer_sockpoll) < 0) { |
3f8e211f | 551 | rcu_read_unlock(); |
3bd1e081 MD |
552 | return -EINTR; |
553 | } | |
00e2e675 DG |
554 | |
555 | /* Get stream file descriptor from socket */ | |
f2fc6720 MD |
556 | ret = lttcomm_recv_fds_unix_sock(sock, &fd, 1); |
557 | if (ret != sizeof(fd)) { | |
f73fabfd | 558 | lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_ERROR_RECV_FD); |
3f8e211f | 559 | rcu_read_unlock(); |
3bd1e081 MD |
560 | return ret; |
561 | } | |
3bd1e081 | 562 | |
f50f23d9 DG |
563 | /* |
564 | * Send status code to session daemon only if the recv works. If the | |
565 | * above recv() failed, the session daemon is notified through the | |
566 | * error socket and the teardown is eventually done. | |
567 | */ | |
568 | ret = consumer_send_status_msg(sock, ret_code); | |
569 | if (ret < 0) { | |
570 | /* Somehow, the session daemon is not responding anymore. */ | |
571 | goto end_nosignal; | |
572 | } | |
573 | ||
ffe60014 DG |
574 | new_stream = consumer_allocate_stream(channel->key, |
575 | fd, | |
576 | LTTNG_CONSUMER_ACTIVE_STREAM, | |
577 | channel->name, | |
578 | channel->uid, | |
579 | channel->gid, | |
580 | channel->relayd_id, | |
581 | channel->session_id, | |
582 | msg.u.stream.cpu, | |
583 | &alloc_ret, | |
4891ece8 DG |
584 | channel->type, |
585 | channel->monitor); | |
3bd1e081 | 586 | if (new_stream == NULL) { |
c80048c6 MD |
587 | switch (alloc_ret) { |
588 | case -ENOMEM: | |
589 | case -EINVAL: | |
590 | default: | |
591 | lttng_consumer_send_error(ctx, LTTCOMM_CONSUMERD_OUTFD_ERROR); | |
592 | break; | |
c80048c6 | 593 | } |
3f8e211f | 594 | goto end_nosignal; |
3bd1e081 | 595 | } |
d771f832 | 596 | |
ffe60014 DG |
597 | new_stream->chan = channel; |
598 | new_stream->wait_fd = fd; | |
07b86b52 JD |
599 | switch (channel->output) { |
600 | case CONSUMER_CHANNEL_SPLICE: | |
601 | new_stream->output = LTTNG_EVENT_SPLICE; | |
602 | break; | |
603 | case CONSUMER_CHANNEL_MMAP: | |
604 | new_stream->output = LTTNG_EVENT_MMAP; | |
605 | break; | |
606 | default: | |
607 | ERR("Stream output unknown %d", channel->output); | |
608 | goto end_nosignal; | |
609 | } | |
00e2e675 | 610 | |
a0c83db9 DG |
611 | /* |
612 | * We've just assigned the channel to the stream so increment the | |
07b86b52 JD |
613 | * refcount right now. We don't need to increment the refcount for |
614 | * streams in no monitor because we handle manually the cleanup of | |
615 | * those. It is very important to make sure there is NO prior | |
616 | * consumer_del_stream() calls or else the refcount will be unbalanced. | |
a0c83db9 | 617 | */ |
07b86b52 JD |
618 | if (channel->monitor) { |
619 | uatomic_inc(&new_stream->chan->refcount); | |
620 | } | |
9d9353f9 | 621 | |
fb3a43a9 DG |
622 | /* |
623 | * The buffer flush is done on the session daemon side for the kernel | |
624 | * so no need for the stream "hangup_flush_done" variable to be | |
625 | * tracked. This is important for a kernel stream since we don't rely | |
626 | * on the flush state of the stream to read data. It's not the case for | |
627 | * user space tracing. | |
628 | */ | |
629 | new_stream->hangup_flush_done = 0; | |
630 | ||
633d0084 DG |
631 | if (ctx->on_recv_stream) { |
632 | ret = ctx->on_recv_stream(new_stream); | |
633 | if (ret < 0) { | |
d771f832 | 634 | consumer_stream_free(new_stream); |
633d0084 | 635 | goto end_nosignal; |
fb3a43a9 | 636 | } |
633d0084 | 637 | } |
fb3a43a9 | 638 | |
07b86b52 JD |
639 | if (new_stream->metadata_flag) { |
640 | channel->metadata_stream = new_stream; | |
641 | } | |
642 | ||
2bba9e53 DG |
643 | /* Do not monitor this stream. */ |
644 | if (!channel->monitor) { | |
5eecee74 | 645 | DBG("Kernel consumer add stream %s in no monitor mode with " |
6dc3064a | 646 | "relayd id %" PRIu64, new_stream->name, |
5eecee74 | 647 | new_stream->net_seq_idx); |
10a50311 | 648 | cds_list_add(&new_stream->send_node, &channel->streams.head); |
6dc3064a DG |
649 | break; |
650 | } | |
651 | ||
e1b71bdc DG |
652 | /* Send stream to relayd if the stream has an ID. */ |
653 | if (new_stream->net_seq_idx != (uint64_t) -1ULL) { | |
194ee077 DG |
654 | ret = consumer_send_relayd_stream(new_stream, |
655 | new_stream->chan->pathname); | |
e1b71bdc DG |
656 | if (ret < 0) { |
657 | consumer_stream_free(new_stream); | |
658 | goto end_nosignal; | |
659 | } | |
e2039c7a JD |
660 | } |
661 | ||
50f8ae69 | 662 | /* Get the right pipe where the stream will be sent. */ |
633d0084 | 663 | if (new_stream->metadata_flag) { |
5ab66908 MD |
664 | ret = consumer_add_metadata_stream(new_stream); |
665 | if (ret) { | |
666 | ERR("Consumer add metadata stream %" PRIu64 " failed. Continuing", | |
667 | new_stream->key); | |
668 | consumer_stream_free(new_stream); | |
669 | goto end_nosignal; | |
670 | } | |
dae10966 | 671 | stream_pipe = ctx->consumer_metadata_pipe; |
3bd1e081 | 672 | } else { |
5ab66908 MD |
673 | ret = consumer_add_data_stream(new_stream); |
674 | if (ret) { | |
675 | ERR("Consumer add stream %" PRIu64 " failed. Continuing", | |
676 | new_stream->key); | |
677 | consumer_stream_free(new_stream); | |
678 | goto end_nosignal; | |
679 | } | |
dae10966 | 680 | stream_pipe = ctx->consumer_data_pipe; |
50f8ae69 DG |
681 | } |
682 | ||
5ab66908 MD |
683 | /* Vitible to other threads */ |
684 | new_stream->globally_visible = 1; | |
685 | ||
dae10966 | 686 | ret = lttng_pipe_write(stream_pipe, &new_stream, sizeof(new_stream)); |
50f8ae69 | 687 | if (ret < 0) { |
dae10966 | 688 | ERR("Consumer write %s stream to pipe %d", |
50f8ae69 | 689 | new_stream->metadata_flag ? "metadata" : "data", |
dae10966 | 690 | lttng_pipe_get_writefd(stream_pipe)); |
5ab66908 MD |
691 | if (new_stream->metadata_flag) { |
692 | consumer_del_stream_for_metadata(new_stream); | |
693 | } else { | |
694 | consumer_del_stream_for_data(new_stream); | |
695 | } | |
50f8ae69 | 696 | goto end_nosignal; |
3bd1e081 | 697 | } |
00e2e675 | 698 | |
50f8ae69 | 699 | DBG("Kernel consumer ADD_STREAM %s (fd: %d) with relayd id %" PRIu64, |
ffe60014 | 700 | new_stream->name, fd, new_stream->relayd_stream_id); |
3bd1e081 MD |
701 | break; |
702 | } | |
703 | case LTTNG_CONSUMER_UPDATE_STREAM: | |
704 | { | |
3f8e211f DG |
705 | rcu_read_unlock(); |
706 | return -ENOSYS; | |
707 | } | |
708 | case LTTNG_CONSUMER_DESTROY_RELAYD: | |
709 | { | |
a6ba4fe1 | 710 | uint64_t index = msg.u.destroy_relayd.net_seq_idx; |
3f8e211f DG |
711 | struct consumer_relayd_sock_pair *relayd; |
712 | ||
a6ba4fe1 | 713 | DBG("Kernel consumer destroying relayd %" PRIu64, index); |
3f8e211f DG |
714 | |
715 | /* Get relayd reference if exists. */ | |
a6ba4fe1 | 716 | relayd = consumer_find_relayd(index); |
3f8e211f | 717 | if (relayd == NULL) { |
3448e266 | 718 | DBG("Unable to find relayd %" PRIu64, index); |
f50f23d9 | 719 | ret_code = LTTNG_ERR_NO_CONSUMER; |
3bd1e081 | 720 | } |
3f8e211f | 721 | |
a6ba4fe1 DG |
722 | /* |
723 | * Each relayd socket pair has a refcount of stream attached to it | |
724 | * which tells if the relayd is still active or not depending on the | |
725 | * refcount value. | |
726 | * | |
727 | * This will set the destroy flag of the relayd object and destroy it | |
728 | * if the refcount reaches zero when called. | |
729 | * | |
730 | * The destroy can happen either here or when a stream fd hangs up. | |
731 | */ | |
f50f23d9 DG |
732 | if (relayd) { |
733 | consumer_flag_relayd_for_destroy(relayd); | |
734 | } | |
735 | ||
736 | ret = consumer_send_status_msg(sock, ret_code); | |
737 | if (ret < 0) { | |
738 | /* Somehow, the session daemon is not responding anymore. */ | |
1803a064 | 739 | goto error_fatal; |
f50f23d9 | 740 | } |
3f8e211f | 741 | |
3f8e211f | 742 | goto end_nosignal; |
3bd1e081 | 743 | } |
6d805429 | 744 | case LTTNG_CONSUMER_DATA_PENDING: |
53632229 | 745 | { |
c8f59ee5 | 746 | int32_t ret; |
6d805429 | 747 | uint64_t id = msg.u.data_pending.session_id; |
c8f59ee5 | 748 | |
6d805429 | 749 | DBG("Kernel consumer data pending command for id %" PRIu64, id); |
c8f59ee5 | 750 | |
6d805429 | 751 | ret = consumer_data_pending(id); |
c8f59ee5 DG |
752 | |
753 | /* Send back returned value to session daemon */ | |
754 | ret = lttcomm_send_unix_sock(sock, &ret, sizeof(ret)); | |
755 | if (ret < 0) { | |
6d805429 | 756 | PERROR("send data pending ret code"); |
1803a064 | 757 | goto error_fatal; |
c8f59ee5 | 758 | } |
f50f23d9 DG |
759 | |
760 | /* | |
761 | * No need to send back a status message since the data pending | |
762 | * returned value is the response. | |
763 | */ | |
c8f59ee5 | 764 | break; |
53632229 | 765 | } |
6dc3064a DG |
766 | case LTTNG_CONSUMER_SNAPSHOT_CHANNEL: |
767 | { | |
07b86b52 JD |
768 | if (msg.u.snapshot_channel.metadata == 1) { |
769 | ret = lttng_kconsumer_snapshot_metadata(msg.u.snapshot_channel.key, | |
e2039c7a JD |
770 | msg.u.snapshot_channel.pathname, |
771 | msg.u.snapshot_channel.relayd_id, ctx); | |
07b86b52 JD |
772 | if (ret < 0) { |
773 | ERR("Snapshot metadata failed"); | |
774 | ret_code = LTTNG_ERR_KERN_META_FAIL; | |
775 | } | |
776 | } else { | |
777 | ret = lttng_kconsumer_snapshot_channel(msg.u.snapshot_channel.key, | |
778 | msg.u.snapshot_channel.pathname, | |
5c786ded JD |
779 | msg.u.snapshot_channel.relayd_id, |
780 | msg.u.snapshot_channel.max_stream_size, | |
781 | ctx); | |
07b86b52 JD |
782 | if (ret < 0) { |
783 | ERR("Snapshot channel failed"); | |
784 | ret_code = LTTNG_ERR_KERN_CHAN_FAIL; | |
785 | } | |
786 | } | |
787 | ||
6dc3064a DG |
788 | ret = consumer_send_status_msg(sock, ret_code); |
789 | if (ret < 0) { | |
790 | /* Somehow, the session daemon is not responding anymore. */ | |
791 | goto end_nosignal; | |
792 | } | |
793 | break; | |
794 | } | |
07b86b52 JD |
795 | case LTTNG_CONSUMER_DESTROY_CHANNEL: |
796 | { | |
797 | uint64_t key = msg.u.destroy_channel.key; | |
798 | struct lttng_consumer_channel *channel; | |
799 | ||
800 | channel = consumer_find_channel(key); | |
801 | if (!channel) { | |
802 | ERR("Kernel consumer destroy channel %" PRIu64 " not found", key); | |
803 | ret_code = LTTNG_ERR_KERN_CHAN_NOT_FOUND; | |
804 | } | |
805 | ||
806 | ret = consumer_send_status_msg(sock, ret_code); | |
807 | if (ret < 0) { | |
808 | /* Somehow, the session daemon is not responding anymore. */ | |
809 | goto end_nosignal; | |
810 | } | |
811 | ||
812 | /* | |
813 | * This command should ONLY be issued for channel with streams set in | |
814 | * no monitor mode. | |
815 | */ | |
816 | assert(!channel->monitor); | |
817 | ||
818 | /* | |
819 | * The refcount should ALWAYS be 0 in the case of a channel in no | |
820 | * monitor mode. | |
821 | */ | |
822 | assert(!uatomic_sub_return(&channel->refcount, 1)); | |
823 | ||
824 | consumer_del_channel(channel); | |
825 | ||
826 | goto end_nosignal; | |
827 | } | |
3bd1e081 | 828 | default: |
3f8e211f | 829 | goto end_nosignal; |
3bd1e081 | 830 | } |
3f8e211f | 831 | |
3bd1e081 | 832 | end_nosignal: |
b0b335c8 | 833 | rcu_read_unlock(); |
4cbc1a04 DG |
834 | |
835 | /* | |
836 | * Return 1 to indicate success since the 0 value can be a socket | |
837 | * shutdown during the recv() or send() call. | |
838 | */ | |
839 | return 1; | |
1803a064 MD |
840 | |
841 | error_fatal: | |
842 | rcu_read_unlock(); | |
843 | /* This will issue a consumer stop. */ | |
844 | return -1; | |
3bd1e081 | 845 | } |
d41f73b7 | 846 | |
309167d2 JD |
847 | /* |
848 | * Populate index values of a kernel stream. Values are set in big endian order. | |
849 | * | |
850 | * Return 0 on success or else a negative value. | |
851 | */ | |
852 | static int get_index_values(struct lttng_packet_index *index, int infd) | |
853 | { | |
854 | int ret; | |
855 | ||
856 | ret = kernctl_get_timestamp_begin(infd, &index->timestamp_begin); | |
857 | if (ret < 0) { | |
858 | PERROR("kernctl_get_timestamp_begin"); | |
859 | goto error; | |
860 | } | |
861 | index->timestamp_begin = htobe64(index->timestamp_begin); | |
862 | ||
863 | ret = kernctl_get_timestamp_end(infd, &index->timestamp_end); | |
864 | if (ret < 0) { | |
865 | PERROR("kernctl_get_timestamp_end"); | |
866 | goto error; | |
867 | } | |
868 | index->timestamp_end = htobe64(index->timestamp_end); | |
869 | ||
870 | ret = kernctl_get_events_discarded(infd, &index->events_discarded); | |
871 | if (ret < 0) { | |
872 | PERROR("kernctl_get_events_discarded"); | |
873 | goto error; | |
874 | } | |
875 | index->events_discarded = htobe64(index->events_discarded); | |
876 | ||
877 | ret = kernctl_get_content_size(infd, &index->content_size); | |
878 | if (ret < 0) { | |
879 | PERROR("kernctl_get_content_size"); | |
880 | goto error; | |
881 | } | |
882 | index->content_size = htobe64(index->content_size); | |
883 | ||
884 | ret = kernctl_get_packet_size(infd, &index->packet_size); | |
885 | if (ret < 0) { | |
886 | PERROR("kernctl_get_packet_size"); | |
887 | goto error; | |
888 | } | |
889 | index->packet_size = htobe64(index->packet_size); | |
890 | ||
891 | ret = kernctl_get_stream_id(infd, &index->stream_id); | |
892 | if (ret < 0) { | |
893 | PERROR("kernctl_get_stream_id"); | |
894 | goto error; | |
895 | } | |
896 | index->stream_id = htobe64(index->stream_id); | |
897 | ||
898 | error: | |
899 | return ret; | |
900 | } | |
901 | ||
d41f73b7 MD |
902 | /* |
903 | * Consume data on a file descriptor and write it on a trace file. | |
904 | */ | |
4078b776 | 905 | ssize_t lttng_kconsumer_read_subbuffer(struct lttng_consumer_stream *stream, |
d41f73b7 MD |
906 | struct lttng_consumer_local_data *ctx) |
907 | { | |
1d4dfdef | 908 | unsigned long len, subbuf_size, padding; |
309167d2 | 909 | int err, write_index = 0; |
4078b776 | 910 | ssize_t ret = 0; |
d41f73b7 | 911 | int infd = stream->wait_fd; |
309167d2 | 912 | struct lttng_packet_index index; |
d41f73b7 MD |
913 | |
914 | DBG("In read_subbuffer (infd : %d)", infd); | |
309167d2 JD |
915 | |
916 | /* Indicate that for this stream we have to write the index. */ | |
917 | if (stream->index_fd >= 0) { | |
918 | write_index = 1; | |
919 | } | |
920 | ||
d41f73b7 MD |
921 | /* Get the next subbuffer */ |
922 | err = kernctl_get_next_subbuf(infd); | |
923 | if (err != 0) { | |
d41f73b7 MD |
924 | /* |
925 | * This is a debug message even for single-threaded consumer, | |
926 | * because poll() have more relaxed criterions than get subbuf, | |
927 | * so get_subbuf may fail for short race windows where poll() | |
928 | * would issue wakeups. | |
929 | */ | |
930 | DBG("Reserving sub buffer failed (everything is normal, " | |
931 | "it is due to concurrency)"); | |
56591bac | 932 | ret = -errno; |
d41f73b7 MD |
933 | goto end; |
934 | } | |
935 | ||
1d4dfdef DG |
936 | /* Get the full subbuffer size including padding */ |
937 | err = kernctl_get_padded_subbuf_size(infd, &len); | |
938 | if (err != 0) { | |
1d4dfdef | 939 | perror("Getting sub-buffer len failed."); |
56591bac | 940 | ret = -errno; |
1d4dfdef DG |
941 | goto end; |
942 | } | |
943 | ||
309167d2 JD |
944 | if (!stream->metadata_flag && write_index) { |
945 | ret = get_index_values(&index, infd); | |
946 | if (ret < 0) { | |
947 | goto end; | |
948 | } | |
949 | } | |
950 | ||
ffe60014 | 951 | switch (stream->chan->output) { |
07b86b52 | 952 | case CONSUMER_CHANNEL_SPLICE: |
1d4dfdef DG |
953 | /* |
954 | * XXX: The lttng-modules splice "actor" does not handle copying | |
955 | * partial pages hence only using the subbuffer size without the | |
956 | * padding makes the splice fail. | |
957 | */ | |
958 | subbuf_size = len; | |
959 | padding = 0; | |
960 | ||
961 | /* splice the subbuffer to the tracefile */ | |
91dfef6e | 962 | ret = lttng_consumer_on_read_subbuffer_splice(ctx, stream, subbuf_size, |
309167d2 | 963 | padding, &index); |
91dfef6e DG |
964 | /* |
965 | * XXX: Splice does not support network streaming so the return value | |
966 | * is simply checked against subbuf_size and not like the mmap() op. | |
967 | */ | |
1d4dfdef DG |
968 | if (ret != subbuf_size) { |
969 | /* | |
970 | * display the error but continue processing to try | |
971 | * to release the subbuffer | |
972 | */ | |
973 | ERR("Error splicing to tracefile (ret: %zd != len: %lu)", | |
974 | ret, subbuf_size); | |
309167d2 | 975 | write_index = 0; |
1d4dfdef DG |
976 | } |
977 | break; | |
07b86b52 | 978 | case CONSUMER_CHANNEL_MMAP: |
1d4dfdef DG |
979 | /* Get subbuffer size without padding */ |
980 | err = kernctl_get_subbuf_size(infd, &subbuf_size); | |
981 | if (err != 0) { | |
1d4dfdef | 982 | perror("Getting sub-buffer len failed."); |
56591bac | 983 | ret = -errno; |
1d4dfdef DG |
984 | goto end; |
985 | } | |
47e81c02 | 986 | |
1d4dfdef DG |
987 | /* Make sure the tracer is not gone mad on us! */ |
988 | assert(len >= subbuf_size); | |
989 | ||
990 | padding = len - subbuf_size; | |
991 | ||
992 | /* write the subbuffer to the tracefile */ | |
91dfef6e | 993 | ret = lttng_consumer_on_read_subbuffer_mmap(ctx, stream, subbuf_size, |
309167d2 | 994 | padding, &index); |
91dfef6e DG |
995 | /* |
996 | * The mmap operation should write subbuf_size amount of data when | |
997 | * network streaming or the full padding (len) size when we are _not_ | |
998 | * streaming. | |
999 | */ | |
d88aee68 DG |
1000 | if ((ret != subbuf_size && stream->net_seq_idx != (uint64_t) -1ULL) || |
1001 | (ret != len && stream->net_seq_idx == (uint64_t) -1ULL)) { | |
1d4dfdef | 1002 | /* |
91dfef6e DG |
1003 | * Display the error but continue processing to try to release the |
1004 | * subbuffer | |
1d4dfdef | 1005 | */ |
91dfef6e DG |
1006 | ERR("Error writing to tracefile " |
1007 | "(ret: %zd != len: %lu != subbuf_size: %lu)", | |
1008 | ret, len, subbuf_size); | |
309167d2 | 1009 | write_index = 0; |
1d4dfdef DG |
1010 | } |
1011 | break; | |
1012 | default: | |
1013 | ERR("Unknown output method"); | |
56591bac | 1014 | ret = -EPERM; |
d41f73b7 MD |
1015 | } |
1016 | ||
1017 | err = kernctl_put_next_subbuf(infd); | |
1018 | if (err != 0) { | |
d41f73b7 MD |
1019 | if (errno == EFAULT) { |
1020 | perror("Error in unreserving sub buffer\n"); | |
1021 | } else if (errno == EIO) { | |
1022 | /* Should never happen with newer LTTng versions */ | |
1023 | perror("Reader has been pushed by the writer, last sub-buffer corrupted."); | |
1024 | } | |
56591bac | 1025 | ret = -errno; |
d41f73b7 MD |
1026 | goto end; |
1027 | } | |
1028 | ||
309167d2 JD |
1029 | /* Write index if needed. */ |
1030 | if (write_index) { | |
1031 | err = index_write(stream->index_fd, &index, sizeof(index)); | |
1032 | if (err < 0) { | |
1033 | ret = -1; | |
1034 | goto end; | |
1035 | } | |
1036 | } | |
1037 | ||
d41f73b7 MD |
1038 | end: |
1039 | return ret; | |
1040 | } | |
1041 | ||
1042 | int lttng_kconsumer_on_recv_stream(struct lttng_consumer_stream *stream) | |
1043 | { | |
1044 | int ret; | |
ffe60014 DG |
1045 | |
1046 | assert(stream); | |
1047 | ||
2bba9e53 DG |
1048 | /* |
1049 | * Don't create anything if this is set for streaming or should not be | |
1050 | * monitored. | |
1051 | */ | |
1052 | if (stream->net_seq_idx == (uint64_t) -1ULL && stream->chan->monitor) { | |
fe4477ee JD |
1053 | ret = utils_create_stream_file(stream->chan->pathname, stream->name, |
1054 | stream->chan->tracefile_size, stream->tracefile_count_current, | |
309167d2 | 1055 | stream->uid, stream->gid, NULL); |
fe4477ee JD |
1056 | if (ret < 0) { |
1057 | goto error; | |
1058 | } | |
1059 | stream->out_fd = ret; | |
1060 | stream->tracefile_size_current = 0; | |
309167d2 JD |
1061 | |
1062 | if (!stream->metadata_flag) { | |
1063 | ret = index_create_file(stream->chan->pathname, | |
1064 | stream->name, stream->uid, stream->gid, | |
1065 | stream->chan->tracefile_size, | |
1066 | stream->tracefile_count_current); | |
1067 | if (ret < 0) { | |
1068 | goto error; | |
1069 | } | |
1070 | stream->index_fd = ret; | |
1071 | } | |
ffe60014 | 1072 | } |
d41f73b7 | 1073 | |
d41f73b7 MD |
1074 | if (stream->output == LTTNG_EVENT_MMAP) { |
1075 | /* get the len of the mmap region */ | |
1076 | unsigned long mmap_len; | |
1077 | ||
1078 | ret = kernctl_get_mmap_len(stream->wait_fd, &mmap_len); | |
1079 | if (ret != 0) { | |
ffe60014 | 1080 | PERROR("kernctl_get_mmap_len"); |
56591bac | 1081 | ret = -errno; |
d41f73b7 MD |
1082 | goto error_close_fd; |
1083 | } | |
1084 | stream->mmap_len = (size_t) mmap_len; | |
1085 | ||
ffe60014 DG |
1086 | stream->mmap_base = mmap(NULL, stream->mmap_len, PROT_READ, |
1087 | MAP_PRIVATE, stream->wait_fd, 0); | |
d41f73b7 | 1088 | if (stream->mmap_base == MAP_FAILED) { |
ffe60014 | 1089 | PERROR("Error mmaping"); |
d41f73b7 MD |
1090 | ret = -1; |
1091 | goto error_close_fd; | |
1092 | } | |
1093 | } | |
1094 | ||
1095 | /* we return 0 to let the library handle the FD internally */ | |
1096 | return 0; | |
1097 | ||
1098 | error_close_fd: | |
2f225ce2 | 1099 | if (stream->out_fd >= 0) { |
d41f73b7 MD |
1100 | int err; |
1101 | ||
1102 | err = close(stream->out_fd); | |
1103 | assert(!err); | |
2f225ce2 | 1104 | stream->out_fd = -1; |
d41f73b7 MD |
1105 | } |
1106 | error: | |
1107 | return ret; | |
1108 | } | |
1109 | ||
ca22feea DG |
1110 | /* |
1111 | * Check if data is still being extracted from the buffers for a specific | |
4e9a4686 DG |
1112 | * stream. Consumer data lock MUST be acquired before calling this function |
1113 | * and the stream lock. | |
ca22feea | 1114 | * |
6d805429 | 1115 | * Return 1 if the traced data are still getting read else 0 meaning that the |
ca22feea DG |
1116 | * data is available for trace viewer reading. |
1117 | */ | |
6d805429 | 1118 | int lttng_kconsumer_data_pending(struct lttng_consumer_stream *stream) |
ca22feea DG |
1119 | { |
1120 | int ret; | |
1121 | ||
1122 | assert(stream); | |
1123 | ||
873b9e9a MD |
1124 | if (stream->endpoint_status != CONSUMER_ENDPOINT_ACTIVE) { |
1125 | ret = 0; | |
1126 | goto end; | |
1127 | } | |
1128 | ||
ca22feea DG |
1129 | ret = kernctl_get_next_subbuf(stream->wait_fd); |
1130 | if (ret == 0) { | |
1131 | /* There is still data so let's put back this subbuffer. */ | |
1132 | ret = kernctl_put_subbuf(stream->wait_fd); | |
1133 | assert(ret == 0); | |
6d805429 | 1134 | ret = 1; /* Data is pending */ |
4e9a4686 | 1135 | goto end; |
ca22feea DG |
1136 | } |
1137 | ||
6d805429 DG |
1138 | /* Data is NOT pending and ready to be read. */ |
1139 | ret = 0; | |
ca22feea | 1140 | |
6efae65e DG |
1141 | end: |
1142 | return ret; | |
ca22feea | 1143 | } |