Commit | Line | Data |
---|---|---|
43e5396b | 1 | /* |
c0c0989a | 2 | * SPDX-License-Identifier: LGPL-2.1-only |
43e5396b | 3 | * |
c0c0989a MJ |
4 | * Copyright (C) 2015-2016 EfficiOS Inc. |
5 | * Copyright (C) 2015-2016 Alexandre Montplaisir <alexmonthy@efficios.com> | |
6 | * Copyright (C) 2013 David Goulet <dgoulet@efficios.com> | |
43e5396b DG |
7 | */ |
8 | ||
d60dfbe4 | 9 | package org.lttng.ust.agent.client; |
43e5396b | 10 | |
f1fa0535 | 11 | import java.io.BufferedReader; |
43e5396b | 12 | import java.io.DataInputStream; |
bc7de6d9 | 13 | import java.io.DataOutputStream; |
9f84d546 | 14 | import java.io.FileInputStream; |
f1fa0535 | 15 | import java.io.FileNotFoundException; |
bc7de6d9 | 16 | import java.io.IOException; |
9f84d546 | 17 | import java.io.InputStreamReader; |
43e5396b | 18 | import java.lang.management.ManagementFactory; |
bc7de6d9 AM |
19 | import java.net.Socket; |
20 | import java.net.UnknownHostException; | |
21 | import java.nio.ByteBuffer; | |
22 | import java.nio.ByteOrder; | |
9f84d546 | 23 | import java.nio.charset.Charset; |
d60dfbe4 AM |
24 | import java.util.concurrent.CountDownLatch; |
25 | import java.util.concurrent.TimeUnit; | |
43e5396b | 26 | |
cbe2ebd6 AM |
27 | import org.lttng.ust.agent.utils.LttngUstAgentLogger; |
28 | ||
d60dfbe4 AM |
29 | /** |
30 | * Client for agents to connect to a local session daemon, using a TCP socket. | |
31 | * | |
32 | * @author David Goulet | |
33 | */ | |
34 | public class LttngTcpSessiondClient implements Runnable { | |
43e5396b | 35 | |
08284556 AM |
36 | private static final String SESSION_HOST = "127.0.0.1"; |
37 | private static final String ROOT_PORT_FILE = "/var/run/lttng/agent.port"; | |
38 | private static final String USER_PORT_FILE = "/.lttng/agent.port"; | |
9f84d546 | 39 | private static final Charset PORT_FILE_ENCODING = Charset.forName("UTF-8"); |
08284556 | 40 | |
191f4058 AM |
41 | private static final int PROTOCOL_MAJOR_VERSION = 2; |
42 | private static final int PROTOCOL_MINOR_VERSION = 0; | |
08284556 | 43 | |
2fbda51c | 44 | /** Command header from the session daemon. */ |
d60dfbe4 | 45 | private final CountDownLatch registrationLatch = new CountDownLatch(1); |
43e5396b | 46 | |
43e5396b | 47 | private Socket sessiondSock; |
501f6777 | 48 | private volatile boolean quit = false; |
43e5396b DG |
49 | |
50 | private DataInputStream inFromSessiond; | |
51 | private DataOutputStream outToSessiond; | |
52 | ||
3165c2f5 AM |
53 | private final ILttngTcpClientListener logAgent; |
54 | private final int domainValue; | |
d60dfbe4 | 55 | private final boolean isRoot; |
501f6777 | 56 | |
d60dfbe4 AM |
57 | /** |
58 | * Constructor | |
59 | * | |
60 | * @param logAgent | |
3165c2f5 AM |
61 | * The listener this client will operate on, typically an LTTng |
62 | * agent. | |
63 | * @param domainValue | |
64 | * The integer to send to the session daemon representing the | |
65 | * tracing domain to handle. | |
d60dfbe4 AM |
66 | * @param isRoot |
67 | * True if this client should connect to the root session daemon, | |
68 | * false if it should connect to the user one. | |
69 | */ | |
3165c2f5 | 70 | public LttngTcpSessiondClient(ILttngTcpClientListener logAgent, int domainValue, boolean isRoot) { |
d60dfbe4 | 71 | this.logAgent = logAgent; |
3165c2f5 | 72 | this.domainValue = domainValue; |
d60dfbe4 | 73 | this.isRoot = isRoot; |
43e5396b DG |
74 | } |
75 | ||
d60dfbe4 AM |
76 | /** |
77 | * Wait until this client has successfully established a connection to its | |
78 | * target session daemon. | |
79 | * | |
80 | * @param seconds | |
81 | * A timeout in seconds after which this method will return | |
82 | * anyway. | |
83 | * @return True if the the client actually established the connection, false | |
84 | * if we returned because the timeout has elapsed or the thread was | |
85 | * interrupted. | |
f1fa0535 | 86 | */ |
d60dfbe4 AM |
87 | public boolean waitForConnection(int seconds) { |
88 | try { | |
89 | return registrationLatch.await(seconds, TimeUnit.SECONDS); | |
90 | } catch (InterruptedException e) { | |
91 | return false; | |
f1fa0535 DG |
92 | } |
93 | } | |
94 | ||
501f6777 CB |
95 | @Override |
96 | public void run() { | |
43e5396b DG |
97 | for (;;) { |
98 | if (this.quit) { | |
99 | break; | |
100 | } | |
101 | ||
102 | try { | |
103 | ||
104 | /* | |
105 | * Connect to the session daemon before anything else. | |
106 | */ | |
6e1fdc3a | 107 | log("Connecting to sessiond"); |
43e5396b DG |
108 | connectToSessiond(); |
109 | ||
110 | /* | |
111 | * Register to the session daemon as the Java component of the | |
112 | * UST application. | |
113 | */ | |
6e1fdc3a | 114 | log("Registering to sessiond"); |
43e5396b | 115 | registerToSessiond(); |
43e5396b | 116 | |
43e5396b DG |
117 | /* |
118 | * Block on socket receive and wait for command from the | |
119 | * session daemon. This will return if and only if there is a | |
120 | * fatal error or the socket closes. | |
121 | */ | |
6e1fdc3a | 122 | log("Waiting on sessiond commands..."); |
43e5396b DG |
123 | handleSessiondCmd(); |
124 | } catch (UnknownHostException uhe) { | |
d60dfbe4 | 125 | uhe.printStackTrace(); |
35cbacdb MD |
126 | /* |
127 | * Terminate agent thread. | |
128 | */ | |
129 | close(); | |
43e5396b | 130 | } catch (IOException ioe) { |
35cbacdb MD |
131 | /* |
132 | * I/O exception may have been triggered by a session daemon | |
133 | * closing the socket. Close our own socket and | |
134 | * retry connecting after a delay. | |
135 | */ | |
501f6777 | 136 | try { |
35cbacdb MD |
137 | if (this.sessiondSock != null) { |
138 | this.sessiondSock.close(); | |
139 | } | |
501f6777 CB |
140 | Thread.sleep(3000); |
141 | } catch (InterruptedException e) { | |
35cbacdb MD |
142 | /* |
143 | * Retry immediately if sleep is interrupted. | |
144 | */ | |
145 | } catch (IOException closeioe) { | |
146 | closeioe.printStackTrace(); | |
147 | /* | |
148 | * Terminate agent thread. | |
149 | */ | |
150 | close(); | |
501f6777 | 151 | } |
43e5396b DG |
152 | } |
153 | } | |
154 | } | |
155 | ||
d60dfbe4 AM |
156 | /** |
157 | * Dispose this client and close any socket connection it may hold. | |
158 | */ | |
159 | public void close() { | |
6e1fdc3a | 160 | log("Closing client"); |
43e5396b | 161 | this.quit = true; |
43e5396b DG |
162 | |
163 | try { | |
164 | if (this.sessiondSock != null) { | |
165 | this.sessiondSock.close(); | |
166 | } | |
d60dfbe4 | 167 | } catch (IOException e) { |
43e5396b DG |
168 | e.printStackTrace(); |
169 | } | |
170 | } | |
171 | ||
301a3ddb | 172 | private void connectToSessiond() throws IOException { |
e0c010a9 AM |
173 | int rootPort = getPortFromFile(ROOT_PORT_FILE); |
174 | int userPort = getPortFromFile(getHomePath() + USER_PORT_FILE); | |
175 | ||
176 | /* | |
177 | * Check for the edge case of both files existing but pointing to the | |
178 | * same port. In this case, let the root client handle it. | |
179 | */ | |
180 | if ((rootPort != 0) && (rootPort == userPort) && (!isRoot)) { | |
181 | log("User and root config files both point to port " + rootPort + | |
182 | ". Letting the root client handle it."); | |
183 | throw new IOException(); | |
184 | } | |
43e5396b | 185 | |
e0c010a9 AM |
186 | int portToUse = (isRoot ? rootPort : userPort); |
187 | ||
188 | if (portToUse == 0) { | |
189 | /* No session daemon available. Stop and retry later. */ | |
190 | throw new IOException(); | |
43e5396b | 191 | } |
301a3ddb | 192 | |
e0c010a9 | 193 | this.sessiondSock = new Socket(SESSION_HOST, portToUse); |
301a3ddb AM |
194 | this.inFromSessiond = new DataInputStream(sessiondSock.getInputStream()); |
195 | this.outToSessiond = new DataOutputStream(sessiondSock.getOutputStream()); | |
196 | } | |
197 | ||
198 | private static String getHomePath() { | |
59e3be47 MD |
199 | /* |
200 | * The environment variable LTTNG_HOME overrides HOME if | |
201 | * defined. | |
202 | */ | |
8bc1125e | 203 | String homePath = System.getenv("LTTNG_HOME"); |
59e3be47 | 204 | |
8bc1125e MD |
205 | if (homePath == null) { |
206 | homePath = System.getProperty("user.home"); | |
59e3be47 | 207 | } |
8bc1125e | 208 | return homePath; |
43e5396b DG |
209 | } |
210 | ||
d60dfbe4 | 211 | /** |
301a3ddb | 212 | * Read port number from file created by the session daemon. |
43e5396b | 213 | * |
301a3ddb | 214 | * @return port value if found else 0. |
43e5396b | 215 | */ |
301a3ddb | 216 | private static int getPortFromFile(String path) throws IOException { |
301a3ddb | 217 | BufferedReader br = null; |
43e5396b | 218 | |
301a3ddb | 219 | try { |
9f84d546 | 220 | br = new BufferedReader(new InputStreamReader(new FileInputStream(path), PORT_FILE_ENCODING)); |
301a3ddb | 221 | String line = br.readLine(); |
8d8c99c9 AM |
222 | if (line == null) { |
223 | /* File exists but is empty. */ | |
224 | return 0; | |
225 | } | |
226 | ||
227 | int port = Integer.parseInt(line, 10); | |
301a3ddb AM |
228 | if (port < 0 || port > 65535) { |
229 | /* Invalid value. Ignore. */ | |
230 | port = 0; | |
231 | } | |
8d8c99c9 AM |
232 | return port; |
233 | ||
234 | } catch (NumberFormatException e) { | |
235 | /* File contained something that was not a number. */ | |
236 | return 0; | |
301a3ddb AM |
237 | } catch (FileNotFoundException e) { |
238 | /* No port available. */ | |
8d8c99c9 | 239 | return 0; |
301a3ddb AM |
240 | } finally { |
241 | if (br != null) { | |
242 | br.close(); | |
243 | } | |
43e5396b | 244 | } |
301a3ddb AM |
245 | } |
246 | ||
247 | private void registerToSessiond() throws IOException { | |
248 | byte data[] = new byte[16]; | |
249 | ByteBuffer buf = ByteBuffer.wrap(data); | |
250 | String pid = ManagementFactory.getRuntimeMXBean().getName().split("@")[0]; | |
251 | ||
3165c2f5 | 252 | buf.putInt(domainValue); |
301a3ddb | 253 | buf.putInt(Integer.parseInt(pid)); |
191f4058 AM |
254 | buf.putInt(PROTOCOL_MAJOR_VERSION); |
255 | buf.putInt(PROTOCOL_MINOR_VERSION); | |
301a3ddb AM |
256 | this.outToSessiond.write(data, 0, data.length); |
257 | this.outToSessiond.flush(); | |
43e5396b DG |
258 | } |
259 | ||
d60dfbe4 | 260 | /** |
43e5396b DG |
261 | * Handle session command from the session daemon. |
262 | */ | |
d60dfbe4 | 263 | private void handleSessiondCmd() throws IOException { |
301a3ddb AM |
264 | /* Data read from the socket */ |
265 | byte inputData[] = null; | |
266 | /* Reply data written to the socket, sent to the sessiond */ | |
f35c6aa0 | 267 | LttngAgentResponse response; |
43e5396b DG |
268 | |
269 | while (true) { | |
270 | /* Get header from session daemon. */ | |
301a3ddb | 271 | SessiondCommandHeader cmdHeader = recvHeader(); |
43e5396b | 272 | |
301a3ddb AM |
273 | if (cmdHeader.getDataSize() > 0) { |
274 | inputData = recvPayload(cmdHeader); | |
43e5396b DG |
275 | } |
276 | ||
301a3ddb | 277 | switch (cmdHeader.getCommandType()) { |
d60dfbe4 AM |
278 | case CMD_REG_DONE: |
279 | { | |
280 | /* | |
281 | * Countdown the registration latch, meaning registration is | |
282 | * done and we can proceed to continue tracing. | |
283 | */ | |
284 | registrationLatch.countDown(); | |
285 | /* | |
286 | * We don't send any reply to the registration done command. | |
287 | * This just marks the end of the initial session setup. | |
288 | */ | |
6e1fdc3a | 289 | log("Registration done"); |
d60dfbe4 AM |
290 | continue; |
291 | } | |
292 | case CMD_LIST: | |
293 | { | |
1d193914 | 294 | SessiondCommand listLoggerCmd = new SessiondListLoggersCommand(); |
f35c6aa0 | 295 | response = listLoggerCmd.execute(logAgent); |
6e1fdc3a | 296 | log("Received list loggers command"); |
d60dfbe4 AM |
297 | break; |
298 | } | |
8ab5c06b | 299 | case CMD_EVENT_ENABLE: |
d60dfbe4 | 300 | { |
301a3ddb AM |
301 | if (inputData == null) { |
302 | /* Invalid command */ | |
f35c6aa0 | 303 | response = LttngAgentResponse.FAILURE_RESPONSE; |
43e5396b DG |
304 | break; |
305 | } | |
8ab5c06b | 306 | SessiondCommand enableEventCmd = new SessiondEnableEventCommand(inputData); |
f35c6aa0 AM |
307 | response = enableEventCmd.execute(logAgent); |
308 | log("Received enable event command: " + enableEventCmd.toString()); | |
d60dfbe4 AM |
309 | break; |
310 | } | |
8ab5c06b | 311 | case CMD_EVENT_DISABLE: |
d60dfbe4 | 312 | { |
301a3ddb AM |
313 | if (inputData == null) { |
314 | /* Invalid command */ | |
f35c6aa0 | 315 | response = LttngAgentResponse.FAILURE_RESPONSE; |
43e5396b DG |
316 | break; |
317 | } | |
8ab5c06b | 318 | SessiondCommand disableEventCmd = new SessiondDisableEventCommand(inputData); |
f35c6aa0 AM |
319 | response = disableEventCmd.execute(logAgent); |
320 | log("Received disable event command: " + disableEventCmd.toString()); | |
8ab5c06b AM |
321 | break; |
322 | } | |
323 | case CMD_APP_CTX_ENABLE: | |
324 | { | |
325 | if (inputData == null) { | |
326 | /* This commands expects a payload, invalid command */ | |
f35c6aa0 | 327 | response = LttngAgentResponse.FAILURE_RESPONSE; |
8ab5c06b AM |
328 | break; |
329 | } | |
330 | SessiondCommand enableAppCtxCmd = new SessiondEnableAppContextCommand(inputData); | |
f35c6aa0 | 331 | response = enableAppCtxCmd.execute(logAgent); |
6e1fdc3a | 332 | log("Received enable app-context command"); |
8ab5c06b AM |
333 | break; |
334 | } | |
335 | case CMD_APP_CTX_DISABLE: | |
336 | { | |
337 | if (inputData == null) { | |
338 | /* This commands expects a payload, invalid command */ | |
f35c6aa0 | 339 | response = LttngAgentResponse.FAILURE_RESPONSE; |
8ab5c06b AM |
340 | break; |
341 | } | |
342 | SessiondCommand disableAppCtxCmd = new SessiondDisableAppContextCommand(inputData); | |
f35c6aa0 | 343 | response = disableAppCtxCmd.execute(logAgent); |
6e1fdc3a | 344 | log("Received disable app-context command"); |
d60dfbe4 AM |
345 | break; |
346 | } | |
347 | default: | |
348 | { | |
301a3ddb | 349 | /* Unknown command, send empty reply */ |
f35c6aa0 | 350 | response = null; |
6e1fdc3a | 351 | log("Received unknown command, ignoring"); |
d60dfbe4 AM |
352 | break; |
353 | } | |
43e5396b DG |
354 | } |
355 | ||
301a3ddb | 356 | /* Send response to the session daemon. */ |
f35c6aa0 AM |
357 | byte[] responseData; |
358 | if (response == null) { | |
359 | responseData = new byte[4]; | |
360 | ByteBuffer buf = ByteBuffer.wrap(responseData); | |
361 | buf.order(ByteOrder.BIG_ENDIAN); | |
362 | } else { | |
363 | log("Sending response: " + response.toString()); | |
364 | responseData = response.getBytes(); | |
365 | } | |
301a3ddb | 366 | this.outToSessiond.write(responseData, 0, responseData.length); |
43e5396b DG |
367 | this.outToSessiond.flush(); |
368 | } | |
369 | } | |
370 | ||
f1fa0535 | 371 | /** |
301a3ddb AM |
372 | * Receive header data from the session daemon using the LTTng command |
373 | * static buffer of the right size. | |
f1fa0535 | 374 | */ |
301a3ddb AM |
375 | private SessiondCommandHeader recvHeader() throws IOException { |
376 | byte data[] = new byte[SessiondCommandHeader.HEADER_SIZE]; | |
32974710 MD |
377 | int bytesLeft = data.length; |
378 | int bytesOffset = 0; | |
f1fa0535 | 379 | |
dcd9a9d7 | 380 | while (bytesLeft > 0) { |
32974710 MD |
381 | int bytesRead = this.inFromSessiond.read(data, bytesOffset, bytesLeft); |
382 | ||
383 | if (bytesRead < 0) { | |
384 | throw new IOException(); | |
385 | } | |
386 | bytesLeft -= bytesRead; | |
387 | bytesOffset += bytesRead; | |
f1fa0535 | 388 | } |
301a3ddb | 389 | return new SessiondCommandHeader(data); |
f1fa0535 DG |
390 | } |
391 | ||
301a3ddb AM |
392 | /** |
393 | * Receive payload from the session daemon. This MUST be done after a | |
394 | * recvHeader() so the header value of a command are known. | |
395 | * | |
396 | * The caller SHOULD use isPayload() before which returns true if a payload | |
397 | * is expected after the header. | |
398 | */ | |
399 | private byte[] recvPayload(SessiondCommandHeader headerCmd) throws IOException { | |
400 | byte payload[] = new byte[(int) headerCmd.getDataSize()]; | |
32974710 MD |
401 | int bytesLeft = payload.length; |
402 | int bytesOffset = 0; | |
f1fa0535 | 403 | |
301a3ddb | 404 | /* Failsafe check so we don't waste our time reading 0 bytes. */ |
32974710 | 405 | if (bytesLeft == 0) { |
301a3ddb | 406 | return null; |
f1fa0535 DG |
407 | } |
408 | ||
dcd9a9d7 | 409 | while (bytesLeft > 0) { |
32974710 MD |
410 | int bytesRead = inFromSessiond.read(payload, bytesOffset, bytesLeft); |
411 | ||
412 | if (bytesRead < 0) { | |
413 | throw new IOException(); | |
414 | } | |
415 | bytesLeft -= bytesRead; | |
416 | bytesOffset += bytesRead; | |
1e111005 | 417 | } |
301a3ddb | 418 | return payload; |
43e5396b DG |
419 | } |
420 | ||
6e1fdc3a AM |
421 | /** |
422 | * Wrapper for this class's logging, adds the connection's characteristics | |
423 | * to help differentiate between multiple TCP clients. | |
424 | */ | |
425 | private void log(String message) { | |
426 | LttngUstAgentLogger.log(getClass(), | |
427 | "(root=" + isRoot + ", domain=" + domainValue + ") " + message); | |
428 | } | |
43e5396b | 429 | } |