sessiond: introduce ltt_session::locked_ref look-up functions
[lttng-tools.git] / src / bin / lttng-sessiond / client.cpp
CommitLineData
917a718d 1/*
21cf9b6b 2 * Copyright (C) 2011 EfficiOS Inc.
ab5be9fa
MJ
3 * Copyright (C) 2011 Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 * Copyright (C) 2013 Jérémie Galarneau <jeremie.galarneau@efficios.com>
917a718d 5 *
ab5be9fa 6 * SPDX-License-Identifier: GPL-2.0-only
917a718d 7 *
917a718d
JG
8 */
9
28ab034a
JG
10#include "agent-thread.hpp"
11#include "clear.hpp"
12#include "client.hpp"
13#include "cmd.hpp"
28ab034a
JG
14#include "health-sessiond.hpp"
15#include "kernel.hpp"
16#include "lttng-sessiond.hpp"
28ab034a
JG
17#include "manage-consumer.hpp"
18#include "save.hpp"
19#include "testpoint.hpp"
20#include "utils.hpp"
21
35161d17 22#include <common/buffer-view.hpp>
c9e313bc 23#include <common/compat/getenv.hpp>
35161d17
JG
24#include <common/compat/socket.hpp>
25#include <common/dynamic-array.hpp>
26#include <common/dynamic-buffer.hpp>
dd7ef124 27#include <common/exception.hpp>
35161d17
JG
28#include <common/fd-handle.hpp>
29#include <common/payload-view.hpp>
30#include <common/payload.hpp>
d9a970b7
JG
31#include <common/pthread-lock.hpp>
32#include <common/scope-exit.hpp>
35161d17 33#include <common/sessiond-comm/sessiond-comm.hpp>
c9e313bc
SM
34#include <common/tracker.hpp>
35#include <common/unix.hpp>
36#include <common/utils.hpp>
28ab034a 37
c9e313bc
SM
38#include <lttng/error-query-internal.hpp>
39#include <lttng/event-internal.hpp>
35161d17 40#include <lttng/lttng.h>
c9e313bc
SM
41#include <lttng/session-descriptor-internal.hpp>
42#include <lttng/session-internal.hpp>
43#include <lttng/userspace-probe-internal.hpp>
28ab034a 44
671e39d7 45#include <fcntl.h>
159b042f
JG
46#include <pthread.h>
47#include <signal.h>
48#include <stddef.h>
999af9c1 49#include <stdint.h>
159b042f 50#include <sys/stat.h>
1434fd36 51#include <unistd.h>
917a718d 52
d9a970b7
JG
53namespace ls = lttng::sessiond;
54
f1494934
JG
55namespace {
56bool is_root;
917a718d 57
f1494934 58struct thread_state {
6cb45e93
JG
59 sem_t ready;
60 bool running;
0f68efb6 61 int client_sock;
6cb45e93 62} thread_state;
f1494934 63} /* namespace */
6cb45e93
JG
64
65static void set_thread_status(bool running)
917a718d 66{
6cb45e93
JG
67 DBG("Marking client thread's state as %s", running ? "running" : "error");
68 thread_state.running = running;
69 sem_post(&thread_state.ready);
917a718d
JG
70}
71
cd9adb8b 72static bool wait_thread_status()
917a718d 73{
6cb45e93
JG
74 DBG("Waiting for client thread to be ready");
75 sem_wait(&thread_state.ready);
76 if (thread_state.running) {
77 DBG("Client thread is ready");
78 } else {
79 ERR("Initialization of client thread failed");
917a718d 80 }
6cb45e93
JG
81
82 return thread_state.running;
917a718d
JG
83}
84
85/*
86 * Setup the outgoing data buffer for the response (llm) by allocating the
87 * right amount of memory and copying the original information from the lsm
88 * structure.
917a718d 89 */
d9a970b7
JG
90static void setup_lttng_msg(struct command_ctx *cmd_ctx,
91 const void *payload_buf,
92 size_t payload_len,
93 const void *cmd_header_buf,
94 size_t cmd_header_len)
917a718d 95{
d9a970b7
JG
96 const auto header_len = sizeof(struct lttcomm_lttng_msg);
97 const auto total_msg_size = header_len + cmd_header_len + payload_len;
28ab034a 98 lttcomm_lttng_msg llm{};
7966af57
SM
99
100 llm.cmd_type = cmd_ctx->lsm.cmd_type;
101 llm.pid = (uint32_t) cmd_ctx->lsm.domain.attr.pid;
102 llm.cmd_header_size = (uint32_t) cmd_header_len;
103 llm.data_size = (uint32_t) payload_len;
917a718d 104
d9a970b7
JG
105 const auto zero_ret = lttng_dynamic_buffer_set_size(&cmd_ctx->reply_payload.buffer, 0);
106 LTTNG_ASSERT(zero_ret == 0);
2eb1b01f 107
fe489250 108 lttng_dynamic_pointer_array_clear(&cmd_ctx->reply_payload._fd_handles);
917a718d 109
3a91de3a
JG
110 cmd_ctx->lttng_msg_size = total_msg_size;
111
112 /* Append reply header. */
d9a970b7
JG
113 if (lttng_dynamic_buffer_append(&cmd_ctx->reply_payload.buffer, &llm, sizeof(llm))) {
114 LTTNG_THROW_ALLOCATION_FAILURE_ERROR(
115 "Failed to append the reply header to a client reply", sizeof(llm));
917a718d
JG
116 }
117
3a91de3a 118 /* Append command header. */
917a718d 119 if (cmd_header_len) {
d9a970b7
JG
120 if (lttng_dynamic_buffer_append(
121 &cmd_ctx->reply_payload.buffer, cmd_header_buf, cmd_header_len)) {
122 LTTNG_THROW_ALLOCATION_FAILURE_ERROR(
123 "Failed to append the command header to a client reply",
124 cmd_header_len);
3a91de3a 125 }
917a718d
JG
126 }
127
3a91de3a 128 /* Append payload. */
917a718d 129 if (payload_len) {
d9a970b7
JG
130 if (lttng_dynamic_buffer_append(
131 &cmd_ctx->reply_payload.buffer, payload_buf, payload_len)) {
132 LTTNG_THROW_ALLOCATION_FAILURE_ERROR(
133 "Failed to append the payload to a client reply", payload_len);
3a91de3a 134 }
917a718d 135 }
917a718d
JG
136}
137
d9a970b7 138static void setup_empty_lttng_msg(struct command_ctx *cmd_ctx)
e368fb43 139{
e368fb43
JG
140 const struct lttcomm_lttng_msg llm = {};
141
d9a970b7
JG
142 const auto zero_ret = lttng_dynamic_buffer_set_size(&cmd_ctx->reply_payload.buffer, 0);
143 LTTNG_ASSERT(zero_ret == 0);
e368fb43
JG
144
145 /* Append place-holder reply header. */
d9a970b7
JG
146 if (lttng_dynamic_buffer_append(&cmd_ctx->reply_payload.buffer, &llm, sizeof(llm))) {
147 LTTNG_THROW_ALLOCATION_FAILURE_ERROR(
148 "Failed to append the reply header to a client reply", sizeof(llm));
e368fb43
JG
149 }
150
151 cmd_ctx->lttng_msg_size = sizeof(llm);
e368fb43
JG
152}
153
28ab034a 154static void update_lttng_msg(struct command_ctx *cmd_ctx, size_t cmd_header_len, size_t payload_len)
e368fb43
JG
155{
156 const size_t header_len = sizeof(struct lttcomm_lttng_msg);
157 const size_t total_msg_size = header_len + cmd_header_len + payload_len;
e368fb43 158 struct lttcomm_lttng_msg *p_llm;
28ab034a 159 lttcomm_lttng_msg llm{};
7966af57
SM
160
161 llm.cmd_type = cmd_ctx->lsm.cmd_type;
162 llm.pid = (uint32_t) cmd_ctx->lsm.domain.attr.pid;
163 llm.cmd_header_size = (uint32_t) cmd_header_len;
164 llm.data_size = (uint32_t) payload_len;
e368fb43 165
a0377dfe 166 LTTNG_ASSERT(cmd_ctx->reply_payload.buffer.size >= sizeof(llm));
e368fb43
JG
167
168 p_llm = (typeof(p_llm)) cmd_ctx->reply_payload.buffer.data;
169
170 /* Update existing header. */
171 memcpy(p_llm, &llm, sizeof(llm));
172
173 cmd_ctx->lttng_msg_size = total_msg_size;
174}
175
917a718d
JG
176/*
177 * Start the thread_manage_consumer. This must be done after a lttng-consumerd
4ec029ed 178 * exec or it will fail.
917a718d
JG
179 */
180static int spawn_consumer_thread(struct consumer_data *consumer_data)
181{
4ec029ed 182 return launch_consumer_management_thread(consumer_data) ? 0 : -1;
917a718d
JG
183}
184
185/*
186 * Fork and exec a consumer daemon (consumerd).
187 *
188 * Return pid if successful else -1.
189 */
190static pid_t spawn_consumerd(struct consumer_data *consumer_data)
191{
192 int ret;
193 pid_t pid;
194 const char *consumer_to_use;
195 const char *verbosity;
196 struct stat st;
197
198 DBG("Spawning consumerd");
199
200 pid = fork();
201 if (pid == 0) {
202 /*
203 * Exec consumerd.
204 */
412d7227 205 if (the_config.verbose_consumer) {
917a718d
JG
206 verbosity = "--verbose";
207 } else if (lttng_opt_quiet) {
208 verbosity = "--quiet";
209 } else {
210 verbosity = "";
211 }
212
213 switch (consumer_data->type) {
214 case LTTNG_CONSUMER_KERNEL:
215 /*
216 * Find out which consumerd to execute. We will first try the
217 * 64-bit path, then the sessiond's installation directory, and
218 * fallback on the 32-bit one,
219 */
220 DBG3("Looking for a kernel consumer at these locations:");
28ab034a 221 DBG3(" 1) %s", the_config.consumerd64_bin_path.value ?: "NULL");
917a718d 222 DBG3(" 2) %s/%s", INSTALL_BIN_PATH, DEFAULT_CONSUMERD_FILE);
28ab034a 223 DBG3(" 3) %s", the_config.consumerd32_bin_path.value ?: "NULL");
412d7227 224 if (stat(the_config.consumerd64_bin_path.value, &st) == 0) {
917a718d 225 DBG3("Found location #1");
412d7227 226 consumer_to_use = the_config.consumerd64_bin_path.value;
917a718d
JG
227 } else if (stat(INSTALL_BIN_PATH "/" DEFAULT_CONSUMERD_FILE, &st) == 0) {
228 DBG3("Found location #2");
229 consumer_to_use = INSTALL_BIN_PATH "/" DEFAULT_CONSUMERD_FILE;
412d7227 230 } else if (the_config.consumerd32_bin_path.value &&
28ab034a 231 stat(the_config.consumerd32_bin_path.value, &st) == 0) {
917a718d 232 DBG3("Found location #3");
412d7227 233 consumer_to_use = the_config.consumerd32_bin_path.value;
917a718d
JG
234 } else {
235 DBG("Could not find any valid consumerd executable");
236 ret = -EINVAL;
237 goto error;
238 }
28ab034a
JG
239 DBG("Using kernel consumer at: %s", consumer_to_use);
240 (void) execl(consumer_to_use,
241 "lttng-consumerd",
242 verbosity,
243 "-k",
244 "--consumerd-cmd-sock",
245 consumer_data->cmd_unix_sock_path,
246 "--consumerd-err-sock",
247 consumer_data->err_unix_sock_path,
248 "--group",
249 the_config.tracing_group_name.value,
250 NULL);
917a718d
JG
251 break;
252 case LTTNG_CONSUMER64_UST:
253 {
412d7227 254 if (the_config.consumerd64_lib_dir.value) {
b53d4e59 255 const char *tmp;
917a718d
JG
256 size_t tmplen;
257 char *tmpnew;
258
259 tmp = lttng_secure_getenv("LD_LIBRARY_PATH");
260 if (!tmp) {
261 tmp = "";
262 }
28ab034a
JG
263 tmplen = strlen(the_config.consumerd64_lib_dir.value) + 1 /* : */ +
264 strlen(tmp);
64803277 265 tmpnew = zmalloc<char>(tmplen + 1 /* \0 */);
917a718d
JG
266 if (!tmpnew) {
267 ret = -ENOMEM;
268 goto error;
269 }
412d7227 270 strcat(tmpnew, the_config.consumerd64_lib_dir.value);
917a718d
JG
271 if (tmp[0] != '\0') {
272 strcat(tmpnew, ":");
273 strcat(tmpnew, tmp);
274 }
275 ret = setenv("LD_LIBRARY_PATH", tmpnew, 1);
276 free(tmpnew);
277 if (ret) {
278 ret = -errno;
279 goto error;
280 }
281 }
412d7227 282 DBG("Using 64-bit UST consumer at: %s",
28ab034a 283 the_config.consumerd64_bin_path.value);
412d7227 284 (void) execl(the_config.consumerd64_bin_path.value,
28ab034a
JG
285 "lttng-consumerd",
286 verbosity,
287 "-u",
288 "--consumerd-cmd-sock",
289 consumer_data->cmd_unix_sock_path,
290 "--consumerd-err-sock",
291 consumer_data->err_unix_sock_path,
292 "--group",
293 the_config.tracing_group_name.value,
294 NULL);
917a718d
JG
295 break;
296 }
297 case LTTNG_CONSUMER32_UST:
298 {
412d7227 299 if (the_config.consumerd32_lib_dir.value) {
b53d4e59 300 const char *tmp;
917a718d
JG
301 size_t tmplen;
302 char *tmpnew;
303
304 tmp = lttng_secure_getenv("LD_LIBRARY_PATH");
305 if (!tmp) {
306 tmp = "";
307 }
28ab034a
JG
308 tmplen = strlen(the_config.consumerd32_lib_dir.value) + 1 /* : */ +
309 strlen(tmp);
64803277 310 tmpnew = zmalloc<char>(tmplen + 1 /* \0 */);
917a718d
JG
311 if (!tmpnew) {
312 ret = -ENOMEM;
313 goto error;
314 }
412d7227 315 strcat(tmpnew, the_config.consumerd32_lib_dir.value);
917a718d
JG
316 if (tmp[0] != '\0') {
317 strcat(tmpnew, ":");
318 strcat(tmpnew, tmp);
319 }
320 ret = setenv("LD_LIBRARY_PATH", tmpnew, 1);
321 free(tmpnew);
322 if (ret) {
323 ret = -errno;
324 goto error;
325 }
326 }
412d7227 327 DBG("Using 32-bit UST consumer at: %s",
28ab034a 328 the_config.consumerd32_bin_path.value);
412d7227 329 (void) execl(the_config.consumerd32_bin_path.value,
28ab034a
JG
330 "lttng-consumerd",
331 verbosity,
332 "-u",
333 "--consumerd-cmd-sock",
334 consumer_data->cmd_unix_sock_path,
335 "--consumerd-err-sock",
336 consumer_data->err_unix_sock_path,
337 "--group",
338 the_config.tracing_group_name.value,
339 NULL);
917a718d
JG
340 break;
341 }
342 default:
343 ERR("unknown consumer type");
344 errno = 0;
345 }
346 if (errno != 0) {
347 PERROR("Consumer execl()");
348 }
349 /* Reaching this point, we got a failure on our execl(). */
350 exit(EXIT_FAILURE);
351 } else if (pid > 0) {
352 ret = pid;
353 } else {
354 PERROR("start consumer fork");
355 ret = -errno;
356 }
357error:
358 return ret;
359}
360
361/*
362 * Spawn the consumerd daemon and session daemon thread.
363 */
364static int start_consumerd(struct consumer_data *consumer_data)
365{
366 int ret;
367
368 /*
369 * Set the listen() state on the socket since there is a possible race
370 * between the exec() of the consumer daemon and this call if place in the
371 * consumer thread. See bug #366 for more details.
372 */
373 ret = lttcomm_listen_unix_sock(consumer_data->err_sock);
374 if (ret < 0) {
375 goto error;
376 }
377
378 pthread_mutex_lock(&consumer_data->pid_mutex);
379 if (consumer_data->pid != 0) {
380 pthread_mutex_unlock(&consumer_data->pid_mutex);
381 goto end;
382 }
383
384 ret = spawn_consumerd(consumer_data);
385 if (ret < 0) {
386 ERR("Spawning consumerd failed");
387 pthread_mutex_unlock(&consumer_data->pid_mutex);
388 goto error;
389 }
390
391 /* Setting up the consumer_data pid */
392 consumer_data->pid = ret;
393 DBG2("Consumer pid %d", consumer_data->pid);
394 pthread_mutex_unlock(&consumer_data->pid_mutex);
395
396 DBG2("Spawning consumer control thread");
397 ret = spawn_consumer_thread(consumer_data);
398 if (ret < 0) {
399 ERR("Fatal error spawning consumer control thread");
400 goto error;
401 }
402
403end:
404 return 0;
405
406error:
407 /* Cleanup already created sockets on error. */
408 if (consumer_data->err_sock >= 0) {
409 int err;
410
411 err = close(consumer_data->err_sock);
412 if (err < 0) {
413 PERROR("close consumer data error socket");
414 }
415 }
416 return ret;
417}
418
419/*
420 * Copy consumer output from the tracing session to the domain session. The
421 * function also applies the right modification on a per domain basis for the
422 * trace files destination directory.
917a718d
JG
423 */
424static int copy_session_consumer(int domain, struct ltt_session *session)
425{
426 int ret;
427 const char *dir_name;
428 struct consumer_output *consumer;
429
a0377dfe
FD
430 LTTNG_ASSERT(session);
431 LTTNG_ASSERT(session->consumer);
917a718d
JG
432
433 switch (domain) {
434 case LTTNG_DOMAIN_KERNEL:
435 DBG3("Copying tracing session consumer output in kernel session");
436 /*
437 * XXX: We should audit the session creation and what this function
438 * does "extra" in order to avoid a destroy since this function is used
439 * in the domain session creation (kernel and ust) only. Same for UST
440 * domain.
441 */
442 if (session->kernel_session->consumer) {
443 consumer_output_put(session->kernel_session->consumer);
444 }
28ab034a 445 session->kernel_session->consumer = consumer_copy_output(session->consumer);
917a718d
JG
446 /* Ease our life a bit for the next part */
447 consumer = session->kernel_session->consumer;
448 dir_name = DEFAULT_KERNEL_TRACE_DIR;
449 break;
450 case LTTNG_DOMAIN_JUL:
451 case LTTNG_DOMAIN_LOG4J:
452 case LTTNG_DOMAIN_PYTHON:
453 case LTTNG_DOMAIN_UST:
454 DBG3("Copying tracing session consumer output in UST session");
455 if (session->ust_session->consumer) {
456 consumer_output_put(session->ust_session->consumer);
457 }
28ab034a 458 session->ust_session->consumer = consumer_copy_output(session->consumer);
917a718d
JG
459 /* Ease our life a bit for the next part */
460 consumer = session->ust_session->consumer;
461 dir_name = DEFAULT_UST_TRACE_DIR;
462 break;
463 default:
464 ret = LTTNG_ERR_UNKNOWN_DOMAIN;
465 goto error;
466 }
467
468 /* Append correct directory to subdir */
28ab034a 469 ret = lttng_strncpy(consumer->domain_subdir, dir_name, sizeof(consumer->domain_subdir));
b178f53e
JG
470 if (ret) {
471 ret = LTTNG_ERR_UNK;
472 goto error;
473 }
474 DBG3("Copy session consumer subdir %s", consumer->domain_subdir);
917a718d
JG
475 ret = LTTNG_OK;
476
477error:
478 return ret;
479}
480
481/*
482 * Create an UST session and add it to the session ust list.
917a718d 483 */
28ab034a 484static int create_ust_session(struct ltt_session *session, const struct lttng_domain *domain)
917a718d
JG
485{
486 int ret;
cd9adb8b 487 struct ltt_ust_session *lus = nullptr;
917a718d 488
a0377dfe
FD
489 LTTNG_ASSERT(session);
490 LTTNG_ASSERT(domain);
491 LTTNG_ASSERT(session->consumer);
917a718d
JG
492
493 switch (domain->type) {
494 case LTTNG_DOMAIN_JUL:
495 case LTTNG_DOMAIN_LOG4J:
496 case LTTNG_DOMAIN_PYTHON:
497 case LTTNG_DOMAIN_UST:
498 break;
499 default:
500 ERR("Unknown UST domain on create session %d", domain->type);
501 ret = LTTNG_ERR_UNKNOWN_DOMAIN;
502 goto error;
503 }
504
505 DBG("Creating UST session");
506
507 lus = trace_ust_create_session(session->id);
cd9adb8b 508 if (lus == nullptr) {
917a718d
JG
509 ret = LTTNG_ERR_UST_SESS_FAIL;
510 goto error;
511 }
512
513 lus->uid = session->uid;
514 lus->gid = session->gid;
515 lus->output_traces = session->output_traces;
516 lus->snapshot_mode = session->snapshot_mode;
517 lus->live_timer_interval = session->live_timer;
518 session->ust_session = lus;
519 if (session->shm_path[0]) {
28ab034a 520 strncpy(lus->root_shm_path, session->shm_path, sizeof(lus->root_shm_path));
917a718d 521 lus->root_shm_path[sizeof(lus->root_shm_path) - 1] = '\0';
28ab034a 522 strncpy(lus->shm_path, session->shm_path, sizeof(lus->shm_path));
917a718d 523 lus->shm_path[sizeof(lus->shm_path) - 1] = '\0';
28ab034a 524 strncat(lus->shm_path, "/ust", sizeof(lus->shm_path) - strlen(lus->shm_path) - 1);
917a718d
JG
525 }
526 /* Copy session output to the newly created UST session */
527 ret = copy_session_consumer(domain->type, session);
528 if (ret != LTTNG_OK) {
529 goto error;
530 }
531
532 return LTTNG_OK;
533
534error:
535 free(lus);
cd9adb8b 536 session->ust_session = nullptr;
917a718d
JG
537 return ret;
538}
539
540/*
541 * Create a kernel tracer session then create the default channel.
542 */
543static int create_kernel_session(struct ltt_session *session)
544{
545 int ret;
546
547 DBG("Creating kernel session");
548
7d268848 549 ret = kernel_create_session(session);
917a718d
JG
550 if (ret < 0) {
551 ret = LTTNG_ERR_KERN_SESS_FAIL;
5d0a7bcb 552 goto error_create;
917a718d
JG
553 }
554
555 /* Code flow safety */
a0377dfe 556 LTTNG_ASSERT(session->kernel_session);
917a718d
JG
557
558 /* Copy session output to the newly created Kernel session */
559 ret = copy_session_consumer(LTTNG_DOMAIN_KERNEL, session);
560 if (ret != LTTNG_OK) {
561 goto error;
562 }
563
564 session->kernel_session->uid = session->uid;
565 session->kernel_session->gid = session->gid;
566 session->kernel_session->output_traces = session->output_traces;
567 session->kernel_session->snapshot_mode = session->snapshot_mode;
a2814ea7 568 session->kernel_session->is_live_session = session->live_timer != 0;
917a718d
JG
569
570 return LTTNG_OK;
571
572error:
573 trace_kernel_destroy_session(session->kernel_session);
cd9adb8b 574 session->kernel_session = nullptr;
5d0a7bcb 575error_create:
917a718d
JG
576 return ret;
577}
578
579/*
580 * Count number of session permitted by uid/gid.
581 */
28ab034a 582static unsigned int lttng_sessions_count(uid_t uid, gid_t gid __attribute__((unused)))
917a718d
JG
583{
584 unsigned int i = 0;
585 struct ltt_session *session;
586 const struct ltt_session_list *session_list = session_get_list();
587
d7b377ed 588 DBG("Counting number of available session for UID %d", uid);
28ab034a 589 cds_list_for_each_entry (session, &session_list->head, list) {
917a718d
JG
590 if (!session_get(session)) {
591 continue;
592 }
593 session_lock(session);
594 /* Only count the sessions the user can control. */
28ab034a 595 if (session_access_ok(session, uid) && !session->destroyed) {
917a718d
JG
596 i++;
597 }
598 session_unlock(session);
599 session_put(session);
600 }
601 return i;
602}
603
d9a970b7
JG
604static lttng::ctl::trigger
605receive_lttng_trigger(struct command_ctx *cmd_ctx, int sock, int *sock_error)
746e08d7
JG
606{
607 int ret;
608 size_t trigger_len;
609 ssize_t sock_recv_len;
746e08d7 610 struct lttng_payload trigger_payload;
cd9adb8b 611 struct lttng_trigger *trigger = nullptr;
746e08d7
JG
612
613 lttng_payload_init(&trigger_payload);
d9a970b7
JG
614 const auto reset_payload_on_exit = lttng::make_scope_exit(
615 [&trigger_payload]() noexcept { lttng_payload_reset(&trigger_payload); });
616
746e08d7 617 trigger_len = (size_t) cmd_ctx->lsm.u.trigger.length;
28ab034a 618 ret = lttng_dynamic_buffer_set_size(&trigger_payload.buffer, trigger_len);
746e08d7 619 if (ret) {
d9a970b7 620 LTTNG_THROW_CTL("Failed to allocate buffer for trigger receptio", LTTNG_ERR_NOMEM);
746e08d7
JG
621 }
622
28ab034a 623 sock_recv_len = lttcomm_recv_unix_sock(sock, trigger_payload.buffer.data, trigger_len);
746e08d7 624 if (sock_recv_len < 0 || sock_recv_len != trigger_len) {
746e08d7 625 *sock_error = 1;
d9a970b7 626 LTTNG_THROW_PROTOCOL_ERROR("Failed to receive trigger in command payload");
746e08d7
JG
627 }
628
629 /* Receive fds, if any. */
630 if (cmd_ctx->lsm.fd_count > 0) {
631 sock_recv_len = lttcomm_recv_payload_fds_unix_sock(
28ab034a
JG
632 sock, cmd_ctx->lsm.fd_count, &trigger_payload);
633 if (sock_recv_len > 0 && sock_recv_len != cmd_ctx->lsm.fd_count * sizeof(int)) {
746e08d7 634 *sock_error = 1;
d9a970b7
JG
635 LTTNG_THROW_PROTOCOL_ERROR(fmt::format(
636 "Failed to receive all file descriptors for trigger in command payload: expected_fd_count={}, ret={}",
637 [cmd_ctx]() { return cmd_ctx->lsm.fd_count; }(),
638 sock_recv_len));
746e08d7 639 } else if (sock_recv_len <= 0) {
746e08d7 640 *sock_error = 1;
d9a970b7
JG
641 LTTNG_THROW_PROTOCOL_ERROR(fmt::format(
642 "Failed to receive file descriptors for trigger in command payload: expected_fd_count={}, ret={}",
643 [cmd_ctx]() { return cmd_ctx->lsm.fd_count; }(),
644 sock_recv_len));
746e08d7
JG
645 }
646 }
647
648 /* Deserialize trigger. */
649 {
650 struct lttng_payload_view view =
28ab034a 651 lttng_payload_view_from_payload(&trigger_payload, 0, -1);
746e08d7 652
d9a970b7
JG
653 const auto trigger_create_ret = lttng_trigger_create_from_payload(&view, &trigger);
654
655 if (trigger_create_ret != trigger_len) {
b5ef1685 656 lttng_trigger_put(trigger);
d9a970b7
JG
657 LTTNG_THROW_PROTOCOL_ERROR(fmt::format(
658 "Trigger of unexpected size received as part of command payload: expected_size={}, actual_size={}",
659 trigger_len,
660 trigger_create_ret));
661 } else if (trigger_create_ret < 0) {
662 LTTNG_THROW_CTL("Failed to allocate trigger", LTTNG_ERR_NOMEM);
746e08d7
JG
663 }
664 }
665
d9a970b7 666 return lttng::ctl::trigger(trigger);
746e08d7
JG
667}
668
588c4b0d 669static enum lttng_error_code receive_lttng_error_query(struct command_ctx *cmd_ctx,
28ab034a
JG
670 int sock,
671 int *sock_error,
672 struct lttng_error_query **_query)
588c4b0d
JG
673{
674 int ret;
675 size_t query_len;
676 ssize_t sock_recv_len;
677 enum lttng_error_code ret_code;
678 struct lttng_payload query_payload;
cd9adb8b 679 struct lttng_error_query *query = nullptr;
588c4b0d
JG
680
681 lttng_payload_init(&query_payload);
682 query_len = (size_t) cmd_ctx->lsm.u.error_query.length;
683 ret = lttng_dynamic_buffer_set_size(&query_payload.buffer, query_len);
684 if (ret) {
685 ret_code = LTTNG_ERR_NOMEM;
686 goto end;
687 }
688
28ab034a 689 sock_recv_len = lttcomm_recv_unix_sock(sock, query_payload.buffer.data, query_len);
588c4b0d
JG
690 if (sock_recv_len < 0 || sock_recv_len != query_len) {
691 ERR("Failed to receive error query in command payload");
692 *sock_error = 1;
693 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
694 goto end;
695 }
696
697 /* Receive fds, if any. */
698 if (cmd_ctx->lsm.fd_count > 0) {
699 sock_recv_len = lttcomm_recv_payload_fds_unix_sock(
28ab034a
JG
700 sock, cmd_ctx->lsm.fd_count, &query_payload);
701 if (sock_recv_len > 0 && sock_recv_len != cmd_ctx->lsm.fd_count * sizeof(int)) {
588c4b0d 702 ERR("Failed to receive all file descriptors for error query in command payload: expected fd count = %u, ret = %d",
28ab034a
JG
703 cmd_ctx->lsm.fd_count,
704 (int) ret);
588c4b0d
JG
705 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
706 *sock_error = 1;
707 goto end;
708 } else if (sock_recv_len <= 0) {
709 ERR("Failed to receive file descriptors for error query in command payload: expected fd count = %u, ret = %d",
28ab034a
JG
710 cmd_ctx->lsm.fd_count,
711 (int) ret);
588c4b0d
JG
712 ret_code = LTTNG_ERR_FATAL;
713 *sock_error = 1;
714 goto end;
715 }
716 }
717
718 /* Deserialize error query. */
719 {
720 struct lttng_payload_view view =
28ab034a 721 lttng_payload_view_from_payload(&query_payload, 0, -1);
588c4b0d 722
28ab034a 723 if (lttng_error_query_create_from_payload(&view, &query) != query_len) {
588c4b0d
JG
724 ERR("Invalid error query received as part of command payload");
725 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
726 goto end;
727 }
728 }
729
730 *_query = query;
731 ret_code = LTTNG_OK;
732
733end:
734 lttng_payload_reset(&query_payload);
735 return ret_code;
736}
737
8ddd72ef 738static enum lttng_error_code receive_lttng_event(struct command_ctx *cmd_ctx,
28ab034a
JG
739 int sock,
740 int *sock_error,
741 struct lttng_event **out_event,
742 char **out_filter_expression,
743 struct lttng_bytecode **out_bytecode,
744 struct lttng_event_exclusion **out_exclusion)
8ddd72ef
JR
745{
746 int ret;
747 size_t event_len;
748 ssize_t sock_recv_len;
749 enum lttng_error_code ret_code;
750 struct lttng_payload event_payload;
cd9adb8b
JG
751 struct lttng_event *local_event = nullptr;
752 char *local_filter_expression = nullptr;
753 struct lttng_bytecode *local_bytecode = nullptr;
754 struct lttng_event_exclusion *local_exclusion = nullptr;
8ddd72ef
JR
755
756 lttng_payload_init(&event_payload);
37a5ef39 757 if (cmd_ctx->lsm.cmd_type == LTTCOMM_SESSIOND_COMMAND_ENABLE_EVENT) {
8ddd72ef 758 event_len = (size_t) cmd_ctx->lsm.u.enable.length;
37a5ef39 759 } else if (cmd_ctx->lsm.cmd_type == LTTCOMM_SESSIOND_COMMAND_DISABLE_EVENT) {
8ddd72ef
JR
760 event_len = (size_t) cmd_ctx->lsm.u.disable.length;
761 } else {
762 abort();
763 }
764
765 ret = lttng_dynamic_buffer_set_size(&event_payload.buffer, event_len);
766 if (ret) {
767 ret_code = LTTNG_ERR_NOMEM;
768 goto end;
769 }
770
28ab034a 771 sock_recv_len = lttcomm_recv_unix_sock(sock, event_payload.buffer.data, event_len);
8ddd72ef
JR
772 if (sock_recv_len < 0 || sock_recv_len != event_len) {
773 ERR("Failed to receive event in command payload");
774 *sock_error = 1;
775 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
776 goto end;
777 }
778
779 /* Receive fds, if any. */
780 if (cmd_ctx->lsm.fd_count > 0) {
781 sock_recv_len = lttcomm_recv_payload_fds_unix_sock(
28ab034a
JG
782 sock, cmd_ctx->lsm.fd_count, &event_payload);
783 if (sock_recv_len > 0 && sock_recv_len != cmd_ctx->lsm.fd_count * sizeof(int)) {
8ddd72ef 784 ERR("Failed to receive all file descriptors for event in command payload: expected fd count = %u, ret = %d",
28ab034a
JG
785 cmd_ctx->lsm.fd_count,
786 (int) ret);
8ddd72ef
JR
787 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
788 *sock_error = 1;
789 goto end;
790 } else if (sock_recv_len <= 0) {
791 ERR("Failed to receive file descriptors for event in command payload: expected fd count = %u, ret = %d",
28ab034a
JG
792 cmd_ctx->lsm.fd_count,
793 (int) ret);
8ddd72ef
JR
794 ret_code = LTTNG_ERR_FATAL;
795 *sock_error = 1;
796 goto end;
797 }
798 }
799
800 /* Deserialize event. */
801 {
9610c0c5 802 ssize_t len;
8ddd72ef 803 struct lttng_payload_view event_view =
28ab034a 804 lttng_payload_view_from_payload(&event_payload, 0, -1);
8ddd72ef 805
28ab034a
JG
806 len = lttng_event_create_from_payload(&event_view,
807 &local_event,
808 &local_exclusion,
809 &local_filter_expression,
810 &local_bytecode);
9610c0c5
JR
811
812 if (len < 0) {
813 ERR("Failed to create an event from the received buffer");
814 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
815 goto end;
816 }
817
818 if (len != event_len) {
28ab034a
JG
819 ERR("Userspace probe location from the received buffer is not the advertised length: header length = %zu" PRIu32
820 ", payload length = %zd",
821 event_len,
822 len);
8ddd72ef
JR
823 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
824 goto end;
825 }
826 }
827
9610c0c5
JR
828 *out_event = local_event;
829 *out_exclusion = local_exclusion;
830 *out_filter_expression = local_filter_expression;
831 *out_bytecode = local_bytecode;
cd9adb8b
JG
832 local_event = nullptr;
833 local_exclusion = nullptr;
834 local_filter_expression = nullptr;
835 local_bytecode = nullptr;
9610c0c5 836
8ddd72ef
JR
837 ret_code = LTTNG_OK;
838
839end:
840 lttng_payload_reset(&event_payload);
9610c0c5
JR
841 lttng_event_destroy(local_event);
842 free(local_filter_expression);
843 free(local_bytecode);
844 free(local_exclusion);
8ddd72ef
JR
845 return ret_code;
846}
847
28ab034a
JG
848static enum lttng_error_code
849receive_lttng_event_context(const struct command_ctx *cmd_ctx,
850 int sock,
851 int *sock_error,
852 struct lttng_event_context **out_event_context)
26e1c61f
JR
853{
854 int ret;
28ab034a 855 const size_t event_context_len = (size_t) cmd_ctx->lsm.u.context.length;
26e1c61f
JR
856 ssize_t sock_recv_len;
857 enum lttng_error_code ret_code;
858 struct lttng_payload event_context_payload;
cd9adb8b 859 struct lttng_event_context *context = nullptr;
26e1c61f
JR
860
861 lttng_payload_init(&event_context_payload);
862
28ab034a 863 ret = lttng_dynamic_buffer_set_size(&event_context_payload.buffer, event_context_len);
26e1c61f
JR
864 if (ret) {
865 ret_code = LTTNG_ERR_NOMEM;
866 goto end;
867 }
868
28ab034a
JG
869 sock_recv_len =
870 lttcomm_recv_unix_sock(sock, event_context_payload.buffer.data, event_context_len);
26e1c61f
JR
871 if (sock_recv_len < 0 || sock_recv_len != event_context_len) {
872 ERR("Failed to receive event context in command payload");
873 *sock_error = 1;
874 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
875 goto end;
876 }
877
878 /* Deserialize event. */
879 {
129d59f5 880 ssize_t len;
26e1c61f 881 struct lttng_payload_view event_context_view =
28ab034a 882 lttng_payload_view_from_payload(&event_context_payload, 0, -1);
26e1c61f 883
28ab034a 884 len = lttng_event_context_create_from_payload(&event_context_view, &context);
129d59f5
JR
885
886 if (len < 0) {
887 ERR("Failed to create a event context from the received buffer");
888 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
889 goto end;
890 }
891
892 if (len != event_context_len) {
28ab034a
JG
893 ERR("Event context from the received buffer is not the advertised length: expected length = %zu, payload length = %zd",
894 event_context_len,
895 len);
26e1c61f
JR
896 ret_code = LTTNG_ERR_INVALID_PROTOCOL;
897 goto end;
898 }
899 }
900
129d59f5 901 *out_event_context = context;
cd9adb8b 902 context = nullptr;
26e1c61f
JR
903 ret_code = LTTNG_OK;
904
905end:
129d59f5 906 lttng_event_context_destroy(context);
26e1c61f
JR
907 lttng_payload_reset(&event_context_payload);
908 return ret_code;
909}
910
917a718d
JG
911/*
912 * Version of setup_lttng_msg() without command header.
913 */
d9a970b7 914static void
28ab034a 915setup_lttng_msg_no_cmd_header(struct command_ctx *cmd_ctx, void *payload_buf, size_t payload_len)
917a718d 916{
d9a970b7 917 setup_lttng_msg(cmd_ctx, payload_buf, payload_len, nullptr, 0);
917a718d
JG
918}
919
917a718d
JG
920/*
921 * Check if the current kernel tracer supports the session rotation feature.
922 * Return 1 if it does, 0 otherwise.
923 */
cd9adb8b 924static int check_rotate_compatible()
917a718d
JG
925{
926 int ret = 1;
927
28ab034a 928 if (the_kernel_tracer_version.major != 2 || the_kernel_tracer_version.minor < 11) {
917a718d
JG
929 DBG("Kernel tracer version is not compatible with the rotation feature");
930 ret = 0;
931 }
932
933 return ret;
934}
935
936/*
937 * Send data on a unix socket using the liblttsessiondcomm API.
938 *
939 * Return lttcomm error code.
940 */
3a91de3a 941static int send_unix_sock(int sock, struct lttng_payload_view *view)
917a718d 942{
3a91de3a 943 int ret;
fe489250 944 const int fd_count = lttng_payload_view_get_fd_handle_count(view);
3a91de3a 945
917a718d 946 /* Check valid length */
3a91de3a
JG
947 if (view->buffer.size == 0) {
948 ret = -1;
949 goto end;
950 }
951
28ab034a 952 ret = lttcomm_send_unix_sock(sock, view->buffer.data, view->buffer.size);
3a91de3a
JG
953 if (ret < 0) {
954 goto end;
917a718d
JG
955 }
956
fe489250 957 if (fd_count > 0) {
700741dc
JG
958 ret = lttcomm_send_payload_view_fds_unix_sock(sock, view);
959 if (ret < 0) {
960 goto end;
fe489250 961 }
3a91de3a
JG
962 }
963
964end:
965 return ret;
917a718d
JG
966}
967
6329831c
JG
968static void command_ctx_set_status_code(command_ctx& cmd_ctx, enum lttng_error_code status_code)
969{
970 LTTNG_ASSERT(cmd_ctx.reply_payload.buffer.size >= sizeof(lttcomm_lttng_msg));
971 ((struct lttcomm_lttng_msg *) (cmd_ctx.reply_payload.buffer.data))->ret_code = status_code;
972}
973
917a718d
JG
974/*
975 * Process the command requested by the lttng client within the command
976 * context structure. This function make sure that the return structure (llm)
977 * is set and ready for transmission before returning.
978 *
979 * Return any error encountered or 0 for success.
980 *
981 * "sock" is only used for special-case var. len data.
3e3665b8
JG
982 * A command may assume the ownership of the socket, in which case its value
983 * should be set to -1.
917a718d 984 */
28ab034a 985static int process_client_msg(struct command_ctx *cmd_ctx, int *sock, int *sock_error)
917a718d
JG
986{
987 int ret = LTTNG_OK;
9124c630
JR
988 bool need_tracing_session = true;
989 bool need_domain;
990 bool need_consumerd;
917a718d 991
6c1db447 992 if (!lttcomm_sessiond_command_is_valid((lttcomm_sessiond_command) cmd_ctx->lsm.cmd_type)) {
d9a970b7
JG
993 /* The lambda is used since fmt can't bind a packed field. */
994 LTTNG_THROW_CTL(fmt::format("Unknown client command: command_id={}",
995 [&cmd_ctx]() { return cmd_ctx->lsm.cmd_type; }()),
996 LTTNG_ERR_UND);
6c1db447
JG
997 }
998
d9a970b7
JG
999 DBG_FMT("Processing client command: name=`{}`, id={}",
1000 lttcomm_sessiond_command_str((lttcomm_sessiond_command) cmd_ctx->lsm.cmd_type),
1001 [&cmd_ctx]() { return cmd_ctx->lsm.cmd_type; }());
917a718d 1002
917a718d
JG
1003 *sock_error = 0;
1004
3a91de3a 1005 switch (cmd_ctx->lsm.cmd_type) {
37a5ef39
JG
1006 case LTTCOMM_SESSIOND_COMMAND_CREATE_SESSION_EXT:
1007 case LTTCOMM_SESSIOND_COMMAND_DESTROY_SESSION:
1008 case LTTCOMM_SESSIOND_COMMAND_LIST_SESSIONS:
1009 case LTTCOMM_SESSIOND_COMMAND_LIST_DOMAINS:
1010 case LTTCOMM_SESSIOND_COMMAND_START_TRACE:
1011 case LTTCOMM_SESSIOND_COMMAND_STOP_TRACE:
1012 case LTTCOMM_SESSIOND_COMMAND_DATA_PENDING:
1013 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_ADD_OUTPUT:
1014 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_DEL_OUTPUT:
1015 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_LIST_OUTPUT:
1016 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_RECORD:
1017 case LTTCOMM_SESSIOND_COMMAND_SAVE_SESSION:
1018 case LTTCOMM_SESSIOND_COMMAND_SET_SESSION_SHM_PATH:
1019 case LTTCOMM_SESSIOND_COMMAND_REGENERATE_METADATA:
1020 case LTTCOMM_SESSIOND_COMMAND_REGENERATE_STATEDUMP:
1021 case LTTCOMM_SESSIOND_COMMAND_ROTATE_SESSION:
1022 case LTTCOMM_SESSIOND_COMMAND_ROTATION_GET_INFO:
1023 case LTTCOMM_SESSIOND_COMMAND_ROTATION_SET_SCHEDULE:
1024 case LTTCOMM_SESSIOND_COMMAND_SESSION_LIST_ROTATION_SCHEDULES:
1025 case LTTCOMM_SESSIOND_COMMAND_CLEAR_SESSION:
1026 case LTTCOMM_SESSIOND_COMMAND_LIST_TRIGGERS:
1027 case LTTCOMM_SESSIOND_COMMAND_EXECUTE_ERROR_QUERY:
49cddecd 1028 case LTTCOMM_SESSIOND_COMMAND_KERNEL_TRACER_STATUS:
9124c630
JR
1029 need_domain = false;
1030 break;
1031 default:
1032 need_domain = true;
1033 }
1034
1035 /* Needs a functioning consumerd? */
1036 switch (cmd_ctx->lsm.cmd_type) {
37a5ef39
JG
1037 case LTTCOMM_SESSIOND_COMMAND_REGISTER_TRIGGER:
1038 case LTTCOMM_SESSIOND_COMMAND_UNREGISTER_TRIGGER:
1039 case LTTCOMM_SESSIOND_COMMAND_EXECUTE_ERROR_QUERY:
9124c630 1040 need_consumerd = false;
917a718d
JG
1041 break;
1042 default:
9124c630
JR
1043 need_consumerd = true;
1044 break;
917a718d
JG
1045 }
1046
412d7227 1047 if (the_config.no_kernel && need_domain &&
28ab034a 1048 cmd_ctx->lsm.domain.type == LTTNG_DOMAIN_KERNEL) {
917a718d 1049 if (!is_root) {
d9a970b7
JG
1050 LTTNG_THROW_CTL(
1051 "Can't run a kernel-domain command since the session daemon is not running as root",
1052 LTTNG_ERR_NEED_ROOT_SESSIOND);
917a718d 1053 } else {
d9a970b7
JG
1054 LTTNG_THROW_CTL(
1055 "Can't run a kernel-domain command since kernel tracing is disabled",
1056 LTTNG_ERR_KERN_NA);
917a718d 1057 }
917a718d
JG
1058 }
1059
1060 /* Deny register consumer if we already have a spawned consumer. */
37a5ef39 1061 if (cmd_ctx->lsm.cmd_type == LTTCOMM_SESSIOND_COMMAND_REGISTER_CONSUMER) {
d9a970b7
JG
1062 const lttng::pthread::lock_guard kconsumer_lock(the_kconsumer_data.pid_mutex);
1063
412d7227 1064 if (the_kconsumer_data.pid > 0) {
d9a970b7
JG
1065 LTTNG_THROW_CTL(
1066 "Can't register a consumer since a kernel-domain consumer was already launched",
1067 LTTNG_ERR_KERN_CONSUMER_FAIL);
917a718d 1068 }
917a718d
JG
1069 }
1070
1071 /*
1072 * Check for command that don't needs to allocate a returned payload. We do
1073 * this here so we don't have to make the call for no payload at each
1074 * command.
1075 */
28ab034a 1076 switch (cmd_ctx->lsm.cmd_type) {
37a5ef39
JG
1077 case LTTCOMM_SESSIOND_COMMAND_LIST_SESSIONS:
1078 case LTTCOMM_SESSIOND_COMMAND_LIST_TRACEPOINTS:
1079 case LTTCOMM_SESSIOND_COMMAND_LIST_TRACEPOINT_FIELDS:
1080 case LTTCOMM_SESSIOND_COMMAND_LIST_DOMAINS:
1081 case LTTCOMM_SESSIOND_COMMAND_LIST_CHANNELS:
1082 case LTTCOMM_SESSIOND_COMMAND_LIST_EVENTS:
1083 case LTTCOMM_SESSIOND_COMMAND_LIST_SYSCALLS:
1084 case LTTCOMM_SESSIOND_COMMAND_SESSION_LIST_ROTATION_SCHEDULES:
1085 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_GET_POLICY:
1086 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_GET_INCLUSION_SET:
1087 case LTTCOMM_SESSIOND_COMMAND_DATA_PENDING:
1088 case LTTCOMM_SESSIOND_COMMAND_ROTATE_SESSION:
1089 case LTTCOMM_SESSIOND_COMMAND_ROTATION_GET_INFO:
1090 case LTTCOMM_SESSIOND_COMMAND_REGISTER_TRIGGER:
1091 case LTTCOMM_SESSIOND_COMMAND_LIST_TRIGGERS:
1092 case LTTCOMM_SESSIOND_COMMAND_EXECUTE_ERROR_QUERY:
917a718d
JG
1093 break;
1094 default:
1095 /* Setup lttng message with no payload */
d9a970b7 1096 setup_lttng_msg_no_cmd_header(cmd_ctx, nullptr, 0);
917a718d
JG
1097 }
1098
d9a970b7
JG
1099 /*
1100 * The list lock is only acquired when processing a command that is applied
1101 * against a session. As such, a unique_lock that holds the list lock is move()'d to
1102 * list_lock during the execution of those commands. The list lock is then released
1103 * as the instance leaves this scope.
1104 *
1105 * Mind the order of the declaration of list_lock vs target_session:
1106 * the session list lock must always be released _after_ the release of
1107 * a session's reference (the destruction of a ref/locked_ref) to ensure
1108 * since the reference's release may unpublish the session from the list of
1109 * sessions.
1110 */
1111 std::unique_lock<std::mutex> list_lock;
1112 /*
1113 * A locked_ref is typically "never null" (hence its name). However, due to the
1114 * structure of this function, target_session remains null for commands that don't
1115 * have a target session.
1116 */
1117 ltt_session::locked_ref target_session;
1118
917a718d 1119 /* Commands that DO NOT need a session. */
3a91de3a 1120 switch (cmd_ctx->lsm.cmd_type) {
37a5ef39
JG
1121 case LTTCOMM_SESSIOND_COMMAND_CREATE_SESSION_EXT:
1122 case LTTCOMM_SESSIOND_COMMAND_LIST_SESSIONS:
1123 case LTTCOMM_SESSIOND_COMMAND_LIST_TRACEPOINTS:
1124 case LTTCOMM_SESSIOND_COMMAND_LIST_SYSCALLS:
1125 case LTTCOMM_SESSIOND_COMMAND_LIST_TRACEPOINT_FIELDS:
1126 case LTTCOMM_SESSIOND_COMMAND_SAVE_SESSION:
1127 case LTTCOMM_SESSIOND_COMMAND_REGISTER_TRIGGER:
1128 case LTTCOMM_SESSIOND_COMMAND_UNREGISTER_TRIGGER:
1129 case LTTCOMM_SESSIOND_COMMAND_LIST_TRIGGERS:
1130 case LTTCOMM_SESSIOND_COMMAND_EXECUTE_ERROR_QUERY:
49cddecd 1131 case LTTCOMM_SESSIOND_COMMAND_KERNEL_TRACER_STATUS:
9124c630 1132 need_tracing_session = false;
917a718d
JG
1133 break;
1134 default:
6329831c
JG
1135 if (strnlen(cmd_ctx->lsm.session.name, sizeof(cmd_ctx->lsm.session.name)) ==
1136 sizeof(cmd_ctx->lsm.session.name)) {
1137 LTTNG_THROW_INVALID_ARGUMENT_ERROR(
1138 "Session name received from lttng-ctl client is not null-terminated");
1139 }
1140
3a91de3a 1141 DBG("Getting session %s by name", cmd_ctx->lsm.session.name);
917a718d
JG
1142 /*
1143 * We keep the session list lock across _all_ commands
1144 * for now, because the per-session lock does not
1145 * handle teardown properly.
1146 */
d9a970b7
JG
1147 list_lock = lttng::sessiond::lock_session_list();
1148 try {
1149 target_session =
1150 ltt_session::find_locked_session(cmd_ctx->lsm.session.name);
1151 } catch (...) {
1152 std::throw_with_nested(lttng::ctl::error(
1153 fmt::format(
1154 "Target session of command doesn't exist: command='{}'",
1155 lttcomm_sessiond_command_str(
1156 (lttcomm_sessiond_command) cmd_ctx->lsm.cmd_type)),
1157 LTTNG_ERR_SESS_NOT_FOUND,
1158 LTTNG_SOURCE_LOCATION()));
1159 }
1160
1161 LTTNG_ASSERT(target_session);
917a718d
JG
1162 break;
1163 }
1164
1165 /*
1166 * Commands that need a valid session but should NOT create one if none
1167 * exists. Instead of creating one and destroying it when the command is
1168 * handled, process that right before so we save some round trip in useless
1169 * code path.
1170 */
3a91de3a 1171 switch (cmd_ctx->lsm.cmd_type) {
37a5ef39
JG
1172 case LTTCOMM_SESSIOND_COMMAND_DISABLE_CHANNEL:
1173 case LTTCOMM_SESSIOND_COMMAND_DISABLE_EVENT:
3a91de3a 1174 switch (cmd_ctx->lsm.domain.type) {
917a718d 1175 case LTTNG_DOMAIN_KERNEL:
d9a970b7
JG
1176 if (!target_session->kernel_session) {
1177 return LTTNG_ERR_NO_CHANNEL;
917a718d
JG
1178 }
1179 break;
1180 case LTTNG_DOMAIN_JUL:
1181 case LTTNG_DOMAIN_LOG4J:
1182 case LTTNG_DOMAIN_PYTHON:
1183 case LTTNG_DOMAIN_UST:
d9a970b7
JG
1184 if (!target_session->ust_session) {
1185 return LTTNG_ERR_NO_CHANNEL;
917a718d
JG
1186 goto error;
1187 }
1188 break;
1189 default:
1190 ret = LTTNG_ERR_UNKNOWN_DOMAIN;
1191 goto error;
1192 }
1193 default:
1194 break;
1195 }
1196
1197 if (!need_domain) {
1198 goto skip_domain;
1199 }
1200
1201 /*
1202 * Check domain type for specific "pre-action".
1203 */
3a91de3a 1204 switch (cmd_ctx->lsm.domain.type) {
917a718d
JG
1205 case LTTNG_DOMAIN_KERNEL:
1206 if (!is_root) {
1207 ret = LTTNG_ERR_NEED_ROOT_SESSIOND;
1208 goto error;
1209 }
1210
7d268848
MD
1211 /* Kernel tracer check */
1212 if (!kernel_tracer_is_initialized()) {
1213 /* Basically, load kernel tracer modules */
1214 ret = init_kernel_tracer();
1215 if (ret != 0) {
1216 goto error;
1217 }
1218 }
1219
917a718d 1220 /* Consumer is in an ERROR state. Report back to client */
28ab034a 1221 if (need_consumerd && uatomic_read(&the_kernel_consumerd_state) == CONSUMER_ERROR) {
917a718d
JG
1222 ret = LTTNG_ERR_NO_KERNCONSUMERD;
1223 goto error;
1224 }
1225
1226 /* Need a session for kernel command */
1227 if (need_tracing_session) {
d9a970b7
JG
1228 if (target_session->kernel_session == nullptr) {
1229 ret = create_kernel_session(target_session.get());
51630bd8 1230 if (ret != LTTNG_OK) {
917a718d
JG
1231 ret = LTTNG_ERR_KERN_SESS_FAIL;
1232 goto error;
1233 }
1234 }
1235
1236 /* Start the kernel consumer daemon */
412d7227
SM
1237 pthread_mutex_lock(&the_kconsumer_data.pid_mutex);
1238 if (the_kconsumer_data.pid == 0 &&
28ab034a 1239 cmd_ctx->lsm.cmd_type != LTTCOMM_SESSIOND_COMMAND_REGISTER_CONSUMER) {
412d7227
SM
1240 pthread_mutex_unlock(&the_kconsumer_data.pid_mutex);
1241 ret = start_consumerd(&the_kconsumer_data);
917a718d
JG
1242 if (ret < 0) {
1243 ret = LTTNG_ERR_KERN_CONSUMER_FAIL;
1244 goto error;
1245 }
412d7227 1246 uatomic_set(&the_kernel_consumerd_state, CONSUMER_STARTED);
917a718d 1247 } else {
412d7227 1248 pthread_mutex_unlock(&the_kconsumer_data.pid_mutex);
917a718d
JG
1249 }
1250
1251 /*
1252 * The consumer was just spawned so we need to add the socket to
1253 * the consumer output of the session if exist.
1254 */
412d7227 1255 ret = consumer_create_socket(&the_kconsumer_data,
d9a970b7 1256 target_session->kernel_session->consumer);
917a718d
JG
1257 if (ret < 0) {
1258 goto error;
1259 }
1260 }
1261
1262 break;
1263 case LTTNG_DOMAIN_JUL:
1264 case LTTNG_DOMAIN_LOG4J:
1265 case LTTNG_DOMAIN_PYTHON:
44760c20
JR
1266 if (!agent_tracing_is_enabled()) {
1267 ret = LTTNG_ERR_AGENT_TRACING_DISABLED;
1268 goto error;
1269 }
1270 /* Fallthrough */
917a718d
JG
1271 case LTTNG_DOMAIN_UST:
1272 {
1273 if (!ust_app_supported()) {
1274 ret = LTTNG_ERR_NO_UST;
1275 goto error;
1276 }
9124c630 1277
917a718d 1278 /* Consumer is in an ERROR state. Report back to client */
28ab034a 1279 if (need_consumerd && uatomic_read(&the_ust_consumerd_state) == CONSUMER_ERROR) {
917a718d
JG
1280 ret = LTTNG_ERR_NO_USTCONSUMERD;
1281 goto error;
1282 }
1283
1284 if (need_tracing_session) {
1285 /* Create UST session if none exist. */
d9a970b7 1286 if (target_session->ust_session == nullptr) {
7966af57 1287 lttng_domain domain = cmd_ctx->lsm.domain;
d9a970b7 1288 ret = create_ust_session(target_session.get(), &domain);
917a718d
JG
1289 if (ret != LTTNG_OK) {
1290 goto error;
1291 }
1292 }
1293
1294 /* Start the UST consumer daemons */
1295 /* 64-bit */
412d7227
SM
1296 pthread_mutex_lock(&the_ustconsumer64_data.pid_mutex);
1297 if (the_config.consumerd64_bin_path.value &&
28ab034a
JG
1298 the_ustconsumer64_data.pid == 0 &&
1299 cmd_ctx->lsm.cmd_type != LTTCOMM_SESSIOND_COMMAND_REGISTER_CONSUMER) {
412d7227
SM
1300 pthread_mutex_unlock(&the_ustconsumer64_data.pid_mutex);
1301 ret = start_consumerd(&the_ustconsumer64_data);
917a718d
JG
1302 if (ret < 0) {
1303 ret = LTTNG_ERR_UST_CONSUMER64_FAIL;
412d7227 1304 uatomic_set(&the_ust_consumerd64_fd, -EINVAL);
917a718d
JG
1305 goto error;
1306 }
1307
28ab034a
JG
1308 uatomic_set(&the_ust_consumerd64_fd,
1309 the_ustconsumer64_data.cmd_sock);
412d7227 1310 uatomic_set(&the_ust_consumerd_state, CONSUMER_STARTED);
917a718d 1311 } else {
412d7227 1312 pthread_mutex_unlock(&the_ustconsumer64_data.pid_mutex);
917a718d
JG
1313 }
1314
1315 /*
1316 * Setup socket for consumer 64 bit. No need for atomic access
1317 * since it was set above and can ONLY be set in this thread.
1318 */
412d7227 1319 ret = consumer_create_socket(&the_ustconsumer64_data,
d9a970b7 1320 target_session->ust_session->consumer);
917a718d
JG
1321 if (ret < 0) {
1322 goto error;
1323 }
1324
1325 /* 32-bit */
412d7227
SM
1326 pthread_mutex_lock(&the_ustconsumer32_data.pid_mutex);
1327 if (the_config.consumerd32_bin_path.value &&
28ab034a
JG
1328 the_ustconsumer32_data.pid == 0 &&
1329 cmd_ctx->lsm.cmd_type != LTTCOMM_SESSIOND_COMMAND_REGISTER_CONSUMER) {
412d7227
SM
1330 pthread_mutex_unlock(&the_ustconsumer32_data.pid_mutex);
1331 ret = start_consumerd(&the_ustconsumer32_data);
917a718d
JG
1332 if (ret < 0) {
1333 ret = LTTNG_ERR_UST_CONSUMER32_FAIL;
412d7227 1334 uatomic_set(&the_ust_consumerd32_fd, -EINVAL);
917a718d
JG
1335 goto error;
1336 }
1337
28ab034a
JG
1338 uatomic_set(&the_ust_consumerd32_fd,
1339 the_ustconsumer32_data.cmd_sock);
412d7227 1340 uatomic_set(&the_ust_consumerd_state, CONSUMER_STARTED);
917a718d 1341 } else {
412d7227 1342 pthread_mutex_unlock(&the_ustconsumer32_data.pid_mutex);
917a718d
JG
1343 }
1344
1345 /*
1346 * Setup socket for consumer 32 bit. No need for atomic access
1347 * since it was set above and can ONLY be set in this thread.
1348 */
412d7227 1349 ret = consumer_create_socket(&the_ustconsumer32_data,
d9a970b7 1350 target_session->ust_session->consumer);
917a718d
JG
1351 if (ret < 0) {
1352 goto error;
1353 }
1354 }
1355 break;
1356 }
1357 default:
1358 break;
1359 }
1360skip_domain:
1361
1362 /* Validate consumer daemon state when start/stop trace command */
37a5ef39 1363 if (cmd_ctx->lsm.cmd_type == LTTCOMM_SESSIOND_COMMAND_START_TRACE ||
28ab034a 1364 cmd_ctx->lsm.cmd_type == LTTCOMM_SESSIOND_COMMAND_STOP_TRACE) {
3a91de3a 1365 switch (cmd_ctx->lsm.domain.type) {
917a718d
JG
1366 case LTTNG_DOMAIN_NONE:
1367 break;
1368 case LTTNG_DOMAIN_JUL:
1369 case LTTNG_DOMAIN_LOG4J:
1370 case LTTNG_DOMAIN_PYTHON:
1371 case LTTNG_DOMAIN_UST:
412d7227 1372 if (uatomic_read(&the_ust_consumerd_state) != CONSUMER_STARTED) {
917a718d
JG
1373 ret = LTTNG_ERR_NO_USTCONSUMERD;
1374 goto error;
1375 }
1376 break;
1377 case LTTNG_DOMAIN_KERNEL:
412d7227 1378 if (uatomic_read(&the_kernel_consumerd_state) != CONSUMER_STARTED) {
917a718d
JG
1379 ret = LTTNG_ERR_NO_KERNCONSUMERD;
1380 goto error;
1381 }
1382 break;
1383 default:
1384 ret = LTTNG_ERR_UNKNOWN_DOMAIN;
1385 goto error;
1386 }
1387 }
1388
1389 /*
d7b377ed 1390 * Check that the UID matches that of the tracing session.
917a718d
JG
1391 * The root user can interact with all sessions.
1392 */
1393 if (need_tracing_session) {
d9a970b7 1394 if (!session_access_ok(target_session.get(),
28ab034a 1395 LTTNG_SOCK_GET_UID_CRED(&cmd_ctx->creds)) ||
d9a970b7 1396 target_session->destroyed) {
917a718d
JG
1397 ret = LTTNG_ERR_EPERM;
1398 goto error;
1399 }
1400 }
1401
1402 /*
1403 * Send relayd information to consumer as soon as we have a domain and a
1404 * session defined.
1405 */
d9a970b7 1406 if (target_session && need_domain) {
917a718d
JG
1407 /*
1408 * Setup relayd if not done yet. If the relayd information was already
1409 * sent to the consumer, this call will gracefully return.
1410 */
d9a970b7 1411 ret = cmd_setup_relayd(target_session.get());
917a718d
JG
1412 if (ret != LTTNG_OK) {
1413 goto error;
1414 }
1415 }
1416
1417 /* Process by command type */
3a91de3a 1418 switch (cmd_ctx->lsm.cmd_type) {
37a5ef39 1419 case LTTCOMM_SESSIOND_COMMAND_ADD_CONTEXT:
917a718d 1420 {
cd9adb8b 1421 struct lttng_event_context *event_context = nullptr;
26e1c61f 1422 const enum lttng_error_code ret_code =
28ab034a 1423 receive_lttng_event_context(cmd_ctx, *sock, sock_error, &event_context);
917a718d 1424
26e1c61f
JR
1425 if (ret_code != LTTNG_OK) {
1426 ret = (int) ret_code;
917a718d
JG
1427 goto error;
1428 }
26e1c61f 1429
d9a970b7
JG
1430 ret = cmd_add_context(
1431 cmd_ctx, target_session, event_context, the_kernel_poll_pipe[1]);
26e1c61f 1432 lttng_event_context_destroy(event_context);
917a718d
JG
1433 break;
1434 }
37a5ef39 1435 case LTTCOMM_SESSIOND_COMMAND_DISABLE_CHANNEL:
917a718d 1436 {
d9a970b7 1437 ret = cmd_disable_channel(target_session.get(),
28ab034a
JG
1438 cmd_ctx->lsm.domain.type,
1439 cmd_ctx->lsm.u.disable.channel_name);
917a718d
JG
1440 break;
1441 }
37a5ef39 1442 case LTTCOMM_SESSIOND_COMMAND_ENABLE_CHANNEL:
917a718d 1443 {
d9a970b7 1444 ret = cmd_enable_channel(cmd_ctx, target_session, *sock, the_kernel_poll_pipe[1]);
917a718d
JG
1445 break;
1446 }
37a5ef39
JG
1447 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_ADD_INCLUDE_VALUE:
1448 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_REMOVE_INCLUDE_VALUE:
917a718d 1449 {
159b042f
JG
1450 struct lttng_dynamic_buffer payload;
1451 struct lttng_buffer_view payload_view;
28ab034a
JG
1452 const bool add_value = cmd_ctx->lsm.cmd_type ==
1453 LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_ADD_INCLUDE_VALUE;
159b042f 1454 const size_t name_len =
28ab034a 1455 cmd_ctx->lsm.u.process_attr_tracker_add_remove_include_value.name_len;
159b042f 1456 const enum lttng_domain_type domain_type =
28ab034a 1457 (enum lttng_domain_type) cmd_ctx->lsm.domain.type;
159b042f 1458 const enum lttng_process_attr process_attr =
28ab034a
JG
1459 (enum lttng_process_attr) cmd_ctx->lsm.u
1460 .process_attr_tracker_add_remove_include_value.process_attr;
159b042f 1461 const enum lttng_process_attr_value_type value_type =
28ab034a
JG
1462 (enum lttng_process_attr_value_type) cmd_ctx->lsm.u
1463 .process_attr_tracker_add_remove_include_value.value_type;
159b042f
JG
1464 struct process_attr_value *value;
1465 enum lttng_error_code ret_code;
1434fd36
MJ
1466 long login_name_max;
1467
1468 login_name_max = sysconf(_SC_LOGIN_NAME_MAX);
1469 if (login_name_max < 0) {
1470 PERROR("Failed to get _SC_LOGIN_NAME_MAX system configuration");
1471 ret = LTTNG_ERR_INVALID;
1472 goto error;
1473 }
159b042f
JG
1474
1475 /* Receive remaining variable length payload if applicable. */
1434fd36 1476 if (name_len > login_name_max) {
159b042f
JG
1477 /*
1478 * POSIX mandates user and group names that are at least
1479 * 8 characters long. Note that although shadow-utils
1480 * (useradd, groupaadd, etc.) use 32 chars as their
1481 * limit (from bits/utmp.h, UT_NAMESIZE),
1482 * LOGIN_NAME_MAX is defined to 256.
1483 */
1434fd36 1484 ERR("Rejecting process attribute tracker value %s as the provided exceeds the maximal allowed length: argument length = %zu, maximal length = %ld",
28ab034a
JG
1485 add_value ? "addition" : "removal",
1486 name_len,
1487 login_name_max);
159b042f 1488 ret = LTTNG_ERR_INVALID;
2d97a006
JR
1489 goto error;
1490 }
1491
159b042f
JG
1492 lttng_dynamic_buffer_init(&payload);
1493 if (name_len != 0) {
1494 /*
1495 * Receive variable payload for user/group name
1496 * arguments.
1497 */
1498 ret = lttng_dynamic_buffer_set_size(&payload, name_len);
1499 if (ret) {
1500 ERR("Failed to allocate buffer to receive payload of %s process attribute tracker value argument",
28ab034a 1501 add_value ? "add" : "remove");
55c9e7ca 1502 ret = LTTNG_ERR_NOMEM;
159b042f 1503 goto error_add_remove_tracker_value;
55c9e7ca 1504 }
159b042f 1505
28ab034a 1506 ret = lttcomm_recv_unix_sock(*sock, payload.data, name_len);
55c9e7ca 1507 if (ret <= 0) {
159b042f 1508 ERR("Failed to receive payload of %s process attribute tracker value argument",
28ab034a 1509 add_value ? "add" : "remove");
55c9e7ca 1510 *sock_error = 1;
159b042f
JG
1511 ret = LTTNG_ERR_INVALID_PROTOCOL;
1512 goto error_add_remove_tracker_value;
55c9e7ca 1513 }
159b042f 1514 }
2d97a006 1515
28ab034a 1516 payload_view = lttng_buffer_view_from_dynamic_buffer(&payload, 0, name_len);
3e6e0df2
JG
1517 if (name_len > 0 && !lttng_buffer_view_is_valid(&payload_view)) {
1518 ret = LTTNG_ERR_INVALID_PROTOCOL;
1519 goto error_add_remove_tracker_value;
1520 }
1521
159b042f
JG
1522 /*
1523 * Validate the value type and domains are legal for the process
1524 * attribute tracker that is specified and convert the value to
1525 * add/remove to the internal sessiond representation.
1526 */
28ab034a
JG
1527 ret_code = process_attr_value_from_comm(
1528 domain_type,
1529 process_attr,
1530 value_type,
1531 &cmd_ctx->lsm.u.process_attr_tracker_add_remove_include_value.integral_value,
1532 &payload_view,
1533 &value);
159b042f
JG
1534 if (ret_code != LTTNG_OK) {
1535 ret = ret_code;
1536 goto error_add_remove_tracker_value;
55c9e7ca 1537 }
159b042f
JG
1538
1539 if (add_value) {
1540 ret = cmd_process_attr_tracker_inclusion_set_add_value(
d9a970b7 1541 target_session.get(), domain_type, process_attr, value);
159b042f
JG
1542 } else {
1543 ret = cmd_process_attr_tracker_inclusion_set_remove_value(
d9a970b7 1544 target_session.get(), domain_type, process_attr, value);
159b042f
JG
1545 }
1546 process_attr_value_destroy(value);
1547 error_add_remove_tracker_value:
1548 lttng_dynamic_buffer_reset(&payload);
1549 break;
1550 }
37a5ef39 1551 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_GET_POLICY:
159b042f
JG
1552 {
1553 enum lttng_tracking_policy tracking_policy;
1554 const enum lttng_domain_type domain_type =
28ab034a 1555 (enum lttng_domain_type) cmd_ctx->lsm.domain.type;
159b042f 1556 const enum lttng_process_attr process_attr =
28ab034a
JG
1557 (enum lttng_process_attr) cmd_ctx->lsm.u
1558 .process_attr_tracker_get_tracking_policy.process_attr;
159b042f
JG
1559
1560 ret = cmd_process_attr_tracker_get_tracking_policy(
d9a970b7 1561 target_session.get(), domain_type, process_attr, &tracking_policy);
159b042f 1562 if (ret != LTTNG_OK) {
55c9e7ca
JR
1563 goto error;
1564 }
2d97a006 1565
7966af57 1566 uint32_t tracking_policy_u32 = tracking_policy;
d9a970b7
JG
1567 setup_lttng_msg_no_cmd_header(cmd_ctx, &tracking_policy_u32, sizeof(uint32_t));
1568
159b042f 1569 ret = LTTNG_OK;
917a718d
JG
1570 break;
1571 }
37a5ef39 1572 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_SET_POLICY:
917a718d 1573 {
159b042f 1574 const enum lttng_tracking_policy tracking_policy =
28ab034a
JG
1575 (enum lttng_tracking_policy) cmd_ctx->lsm.u
1576 .process_attr_tracker_set_tracking_policy.tracking_policy;
159b042f 1577 const enum lttng_domain_type domain_type =
28ab034a 1578 (enum lttng_domain_type) cmd_ctx->lsm.domain.type;
159b042f 1579 const enum lttng_process_attr process_attr =
28ab034a
JG
1580 (enum lttng_process_attr) cmd_ctx->lsm.u
1581 .process_attr_tracker_set_tracking_policy.process_attr;
159b042f
JG
1582
1583 ret = cmd_process_attr_tracker_set_tracking_policy(
d9a970b7 1584 target_session.get(), domain_type, process_attr, tracking_policy);
159b042f
JG
1585 if (ret != LTTNG_OK) {
1586 goto error;
55c9e7ca 1587 }
159b042f
JG
1588 break;
1589 }
37a5ef39 1590 case LTTCOMM_SESSIOND_COMMAND_PROCESS_ATTR_TRACKER_GET_INCLUSION_SET:
159b042f
JG
1591 {
1592 struct lttng_process_attr_values *values;
1593 struct lttng_dynamic_buffer reply;
1594 const enum lttng_domain_type domain_type =
28ab034a 1595 (enum lttng_domain_type) cmd_ctx->lsm.domain.type;
159b042f 1596 const enum lttng_process_attr process_attr =
28ab034a
JG
1597 (enum lttng_process_attr)
1598 cmd_ctx->lsm.u.process_attr_tracker_get_inclusion_set.process_attr;
159b042f
JG
1599
1600 ret = cmd_process_attr_tracker_get_inclusion_set(
d9a970b7 1601 target_session.get(), domain_type, process_attr, &values);
159b042f 1602 if (ret != LTTNG_OK) {
55c9e7ca
JR
1603 goto error;
1604 }
2d97a006 1605
159b042f
JG
1606 lttng_dynamic_buffer_init(&reply);
1607 ret = lttng_process_attr_values_serialize(values, &reply);
1608 if (ret < 0) {
1609 goto error_tracker_get_inclusion_set;
2d97a006
JR
1610 }
1611
d9a970b7 1612 setup_lttng_msg_no_cmd_header(cmd_ctx, reply.data, reply.size);
159b042f
JG
1613 ret = LTTNG_OK;
1614
1615 error_tracker_get_inclusion_set:
1616 lttng_process_attr_values_destroy(values);
1617 lttng_dynamic_buffer_reset(&reply);
917a718d
JG
1618 break;
1619 }
37a5ef39
JG
1620 case LTTCOMM_SESSIOND_COMMAND_ENABLE_EVENT:
1621 case LTTCOMM_SESSIOND_COMMAND_DISABLE_EVENT:
917a718d 1622 {
8ddd72ef
JR
1623 struct lttng_event *event;
1624 char *filter_expression;
1625 struct lttng_event_exclusion *exclusions;
1626 struct lttng_bytecode *bytecode;
28ab034a
JG
1627 const enum lttng_error_code ret_code = receive_lttng_event(cmd_ctx,
1628 *sock,
1629 sock_error,
1630 &event,
1631 &filter_expression,
1632 &bytecode,
1633 &exclusions);
917a718d 1634
8ddd72ef
JR
1635 if (ret_code != LTTNG_OK) {
1636 ret = (int) ret_code;
917a718d
JG
1637 goto error;
1638 }
1639
8ddd72ef
JR
1640 /*
1641 * Ownership of filter_expression, exclusions, and bytecode is
1642 * always transferred.
1643 */
37a5ef39 1644 ret = cmd_ctx->lsm.cmd_type == LTTCOMM_SESSIOND_COMMAND_ENABLE_EVENT ?
28ab034a 1645 cmd_enable_event(cmd_ctx,
d9a970b7 1646 target_session,
28ab034a
JG
1647 event,
1648 filter_expression,
1649 exclusions,
1650 bytecode,
1651 the_kernel_poll_pipe[1]) :
d9a970b7
JG
1652 cmd_disable_event(cmd_ctx,
1653 target_session,
1654 event,
1655 filter_expression,
1656 bytecode,
1657 exclusions);
8ddd72ef 1658 lttng_event_destroy(event);
917a718d
JG
1659 break;
1660 }
37a5ef39 1661 case LTTCOMM_SESSIOND_COMMAND_LIST_TRACEPOINTS:
917a718d 1662 {
8ddd72ef
JR
1663 enum lttng_error_code ret_code;
1664 size_t original_payload_size;
1665 size_t payload_size;
1666 const size_t command_header_size = sizeof(struct lttcomm_list_command_header);
1667
d9a970b7 1668 setup_empty_lttng_msg(cmd_ctx);
8ddd72ef
JR
1669
1670 original_payload_size = cmd_ctx->reply_payload.buffer.size;
917a718d 1671
d9a970b7 1672 list_lock = lttng::sessiond::lock_session_list();
28ab034a 1673 ret_code = cmd_list_tracepoints(cmd_ctx->lsm.domain.type, &cmd_ctx->reply_payload);
8ddd72ef
JR
1674 if (ret_code != LTTNG_OK) {
1675 ret = (int) ret_code;
917a718d
JG
1676 goto error;
1677 }
1678
28ab034a
JG
1679 payload_size = cmd_ctx->reply_payload.buffer.size - command_header_size -
1680 original_payload_size;
8ddd72ef 1681 update_lttng_msg(cmd_ctx, command_header_size, payload_size);
917a718d
JG
1682
1683 ret = LTTNG_OK;
1684 break;
1685 }
37a5ef39 1686 case LTTCOMM_SESSIOND_COMMAND_LIST_TRACEPOINT_FIELDS:
917a718d 1687 {
b2d68839
JR
1688 enum lttng_error_code ret_code;
1689 size_t original_payload_size;
1690 size_t payload_size;
1691 const size_t command_header_size = sizeof(struct lttcomm_list_command_header);
1692
d9a970b7 1693 setup_empty_lttng_msg(cmd_ctx);
b2d68839
JR
1694
1695 original_payload_size = cmd_ctx->reply_payload.buffer.size;
917a718d 1696
d9a970b7 1697 list_lock = lttng::sessiond::lock_session_list();
28ab034a
JG
1698 ret_code = cmd_list_tracepoint_fields(cmd_ctx->lsm.domain.type,
1699 &cmd_ctx->reply_payload);
d9a970b7 1700
b2d68839
JR
1701 if (ret_code != LTTNG_OK) {
1702 ret = (int) ret_code;
917a718d
JG
1703 goto error;
1704 }
1705
28ab034a
JG
1706 payload_size = cmd_ctx->reply_payload.buffer.size - command_header_size -
1707 original_payload_size;
b2d68839 1708 update_lttng_msg(cmd_ctx, command_header_size, payload_size);
917a718d
JG
1709
1710 ret = LTTNG_OK;
1711 break;
1712 }
37a5ef39 1713 case LTTCOMM_SESSIOND_COMMAND_LIST_SYSCALLS:
917a718d 1714 {
8ddd72ef
JR
1715 enum lttng_error_code ret_code;
1716 size_t original_payload_size;
1717 size_t payload_size;
1718 const size_t command_header_size = sizeof(struct lttcomm_list_command_header);
917a718d 1719
d9a970b7 1720 setup_empty_lttng_msg(cmd_ctx);
917a718d 1721
8ddd72ef 1722 original_payload_size = cmd_ctx->reply_payload.buffer.size;
917a718d 1723
8ddd72ef
JR
1724 ret_code = cmd_list_syscalls(&cmd_ctx->reply_payload);
1725 if (ret_code != LTTNG_OK) {
1726 ret = (int) ret_code;
1727 goto error;
917a718d
JG
1728 }
1729
28ab034a
JG
1730 payload_size = cmd_ctx->reply_payload.buffer.size - command_header_size -
1731 original_payload_size;
8ddd72ef
JR
1732 update_lttng_msg(cmd_ctx, command_header_size, payload_size);
1733
917a718d
JG
1734 ret = LTTNG_OK;
1735 break;
1736 }
37a5ef39 1737 case LTTCOMM_SESSIOND_COMMAND_SET_CONSUMER_URI:
917a718d
JG
1738 {
1739 size_t nb_uri, len;
1740 struct lttng_uri *uris;
1741
3a91de3a 1742 nb_uri = cmd_ctx->lsm.u.uri.size;
917a718d
JG
1743 len = nb_uri * sizeof(struct lttng_uri);
1744
1745 if (nb_uri == 0) {
1746 ret = LTTNG_ERR_INVALID;
1747 goto error;
1748 }
1749
64803277 1750 uris = calloc<lttng_uri>(nb_uri);
cd9adb8b 1751 if (uris == nullptr) {
917a718d
JG
1752 ret = LTTNG_ERR_FATAL;
1753 goto error;
1754 }
1755
1756 /* Receive variable len data */
1757 DBG("Receiving %zu URI(s) from client ...", nb_uri);
3e3665b8 1758 ret = lttcomm_recv_unix_sock(*sock, uris, len);
917a718d
JG
1759 if (ret <= 0) {
1760 DBG("No URIs received from client... continuing");
1761 *sock_error = 1;
1762 ret = LTTNG_ERR_SESSION_FAIL;
1763 free(uris);
1764 goto error;
1765 }
1766
d9a970b7 1767 ret = cmd_set_consumer_uri(target_session.get(), nb_uri, uris);
917a718d
JG
1768 free(uris);
1769 if (ret != LTTNG_OK) {
1770 goto error;
1771 }
1772
917a718d
JG
1773 break;
1774 }
37a5ef39 1775 case LTTCOMM_SESSIOND_COMMAND_START_TRACE:
917a718d
JG
1776 {
1777 /*
1778 * On the first start, if we have a kernel session and we have
1779 * enabled time or size-based rotations, we have to make sure
1780 * the kernel tracer supports it.
1781 */
d9a970b7
JG
1782 if (!target_session->has_been_started && target_session->kernel_session &&
1783 (target_session->rotate_timer_period || target_session->rotate_size) &&
28ab034a 1784 !check_rotate_compatible()) {
917a718d
JG
1785 DBG("Kernel tracer version is not compatible with the rotation feature");
1786 ret = LTTNG_ERR_ROTATION_WRONG_VERSION;
1787 goto error;
1788 }
d9a970b7 1789 ret = cmd_start_trace(target_session.get());
917a718d
JG
1790 break;
1791 }
37a5ef39 1792 case LTTCOMM_SESSIOND_COMMAND_STOP_TRACE:
917a718d 1793 {
d9a970b7 1794 ret = cmd_stop_trace(target_session.get());
917a718d
JG
1795 break;
1796 }
37a5ef39 1797 case LTTCOMM_SESSIOND_COMMAND_DESTROY_SESSION:
917a718d 1798 {
d9a970b7 1799 ret = cmd_destroy_session(target_session.get(), sock);
917a718d
JG
1800 break;
1801 }
37a5ef39 1802 case LTTCOMM_SESSIOND_COMMAND_LIST_DOMAINS:
917a718d
JG
1803 {
1804 ssize_t nb_dom;
cd9adb8b 1805 struct lttng_domain *domains = nullptr;
917a718d 1806
d9a970b7 1807 nb_dom = cmd_list_domains(target_session.get(), &domains);
917a718d
JG
1808 if (nb_dom < 0) {
1809 /* Return value is a negative lttng_error_code. */
1810 ret = -nb_dom;
1811 goto error;
1812 }
1813
d9a970b7 1814 setup_lttng_msg_no_cmd_header(
28ab034a 1815 cmd_ctx, domains, nb_dom * sizeof(struct lttng_domain));
917a718d
JG
1816 free(domains);
1817
917a718d
JG
1818 ret = LTTNG_OK;
1819 break;
1820 }
37a5ef39 1821 case LTTCOMM_SESSIOND_COMMAND_LIST_CHANNELS:
917a718d 1822 {
999af9c1
JR
1823 enum lttng_error_code ret_code;
1824 size_t original_payload_size;
1825 size_t payload_size;
1826 const size_t command_header_size = sizeof(struct lttcomm_list_command_header);
917a718d 1827
d9a970b7 1828 setup_empty_lttng_msg(cmd_ctx);
917a718d 1829
999af9c1 1830 original_payload_size = cmd_ctx->reply_payload.buffer.size;
917a718d 1831
28ab034a 1832 ret_code = cmd_list_channels(
d9a970b7 1833 cmd_ctx->lsm.domain.type, target_session.get(), &cmd_ctx->reply_payload);
999af9c1
JR
1834 if (ret_code != LTTNG_OK) {
1835 ret = (int) ret_code;
1836 goto error;
917a718d
JG
1837 }
1838
28ab034a
JG
1839 payload_size = cmd_ctx->reply_payload.buffer.size - command_header_size -
1840 original_payload_size;
999af9c1
JR
1841 update_lttng_msg(cmd_ctx, command_header_size, payload_size);
1842
917a718d
JG
1843 ret = LTTNG_OK;
1844 break;
1845 }
37a5ef39 1846 case LTTCOMM_SESSIOND_COMMAND_LIST_EVENTS:
917a718d 1847 {
8ddd72ef 1848 enum lttng_error_code ret_code;
e368fb43
JG
1849 size_t original_payload_size;
1850 size_t payload_size;
8ddd72ef 1851 const size_t command_header_size = sizeof(struct lttcomm_list_command_header);
e368fb43 1852
d9a970b7 1853 setup_empty_lttng_msg(cmd_ctx);
917a718d 1854
e368fb43 1855 original_payload_size = cmd_ctx->reply_payload.buffer.size;
917a718d 1856
8ddd72ef 1857 ret_code = cmd_list_events(cmd_ctx->lsm.domain.type,
d9a970b7 1858 target_session.get(),
28ab034a
JG
1859 cmd_ctx->lsm.u.list.channel_name,
1860 &cmd_ctx->reply_payload);
8ddd72ef
JR
1861 if (ret_code != LTTNG_OK) {
1862 ret = (int) ret_code;
e368fb43 1863 goto error;
917a718d
JG
1864 }
1865
28ab034a
JG
1866 payload_size = cmd_ctx->reply_payload.buffer.size - command_header_size -
1867 original_payload_size;
8ddd72ef 1868 update_lttng_msg(cmd_ctx, command_header_size, payload_size);
e368fb43 1869
917a718d
JG
1870 ret = LTTNG_OK;
1871 break;
1872 }
37a5ef39 1873 case LTTCOMM_SESSIOND_COMMAND_LIST_SESSIONS:
917a718d
JG
1874 {
1875 unsigned int nr_sessions;
64803277
SM
1876 lttng_session *sessions_payload = nullptr;
1877 size_t payload_len = 0;
917a718d 1878
d9a970b7 1879 list_lock = lttng::sessiond::lock_session_list();
28ab034a
JG
1880 nr_sessions = lttng_sessions_count(LTTNG_SOCK_GET_UID_CRED(&cmd_ctx->creds),
1881 LTTNG_SOCK_GET_GID_CRED(&cmd_ctx->creds));
b178f53e 1882
64803277 1883 if (nr_sessions > 0) {
28ab034a
JG
1884 payload_len = (sizeof(struct lttng_session) * nr_sessions) +
1885 (sizeof(struct lttng_session_extended) * nr_sessions);
64803277
SM
1886 sessions_payload = zmalloc<lttng_session>(payload_len);
1887 if (!sessions_payload) {
d9a970b7
JG
1888 LTTNG_THROW_ALLOCATION_FAILURE_ERROR(
1889 "Failed to allocate session list reply payload",
1890 payload_len);
64803277 1891 }
917a718d 1892
28ab034a
JG
1893 cmd_list_lttng_sessions(sessions_payload,
1894 nr_sessions,
1895 LTTNG_SOCK_GET_UID_CRED(&cmd_ctx->creds),
1896 LTTNG_SOCK_GET_GID_CRED(&cmd_ctx->creds));
917a718d
JG
1897 }
1898
d9a970b7 1899 setup_lttng_msg_no_cmd_header(cmd_ctx, sessions_payload, payload_len);
917a718d
JG
1900 free(sessions_payload);
1901
917a718d
JG
1902 ret = LTTNG_OK;
1903 break;
1904 }
37a5ef39 1905 case LTTCOMM_SESSIOND_COMMAND_REGISTER_CONSUMER:
917a718d
JG
1906 {
1907 struct consumer_data *cdata;
1908
3a91de3a 1909 switch (cmd_ctx->lsm.domain.type) {
917a718d 1910 case LTTNG_DOMAIN_KERNEL:
412d7227 1911 cdata = &the_kconsumer_data;
917a718d
JG
1912 break;
1913 default:
1914 ret = LTTNG_ERR_UND;
1915 goto error;
1916 }
1917
d9a970b7
JG
1918 ret = cmd_register_consumer(target_session.get(),
1919 cmd_ctx->lsm.domain.type,
1920 cmd_ctx->lsm.u.reg.path,
1921 cdata);
917a718d
JG
1922 break;
1923 }
49cddecd
KS
1924 case LTTCOMM_SESSIOND_COMMAND_KERNEL_TRACER_STATUS:
1925 {
1926 uint32_t u_status;
1927 enum lttng_kernel_tracer_status status;
1928
1929 ret = cmd_kernel_tracer_status(&status);
1930 if (ret != LTTNG_OK) {
1931 goto error;
1932 }
1933
1934 u_status = (uint32_t) status;
d9a970b7 1935 setup_lttng_msg_no_cmd_header(cmd_ctx, &u_status, 4);
49cddecd
KS
1936
1937 ret = LTTNG_OK;
1938 break;
1939 }
37a5ef39 1940 case LTTCOMM_SESSIOND_COMMAND_DATA_PENDING:
917a718d
JG
1941 {
1942 int pending_ret;
1943 uint8_t pending_ret_byte;
1944
d9a970b7 1945 pending_ret = cmd_data_pending(target_session.get());
917a718d
JG
1946
1947 /*
1948 * FIXME
1949 *
1950 * This function may returns 0 or 1 to indicate whether or not
1951 * there is data pending. In case of error, it should return an
1952 * LTTNG_ERR code. However, some code paths may still return
1953 * a nondescript error code, which we handle by returning an
1954 * "unknown" error.
1955 */
1956 if (pending_ret == 0 || pending_ret == 1) {
1957 /*
1958 * ret will be set to LTTNG_OK at the end of
1959 * this function.
1960 */
f0a9c004 1961 } else if (pending_ret <= LTTNG_OK || pending_ret >= LTTNG_ERR_NR) {
917a718d 1962 ret = LTTNG_ERR_UNK;
f0a9c004 1963 goto error;
917a718d
JG
1964 } else {
1965 ret = pending_ret;
f0a9c004 1966 goto error;
917a718d
JG
1967 }
1968
1969 pending_ret_byte = (uint8_t) pending_ret;
1970
1971 /* 1 byte to return whether or not data is pending */
d9a970b7 1972 setup_lttng_msg_no_cmd_header(cmd_ctx, &pending_ret_byte, 1);
917a718d
JG
1973
1974 ret = LTTNG_OK;
1975 break;
1976 }
37a5ef39 1977 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_ADD_OUTPUT:
917a718d 1978 {
a914e76a 1979 uint32_t snapshot_id;
917a718d 1980 struct lttcomm_lttng_output_id reply;
7966af57 1981 lttng_snapshot_output output = cmd_ctx->lsm.u.snapshot_output.output;
917a718d 1982
d9a970b7 1983 ret = cmd_snapshot_add_output(target_session.get(), &output, &snapshot_id);
917a718d
JG
1984 if (ret != LTTNG_OK) {
1985 goto error;
1986 }
a914e76a 1987 reply.id = snapshot_id;
917a718d 1988
d9a970b7 1989 setup_lttng_msg_no_cmd_header(cmd_ctx, &reply, sizeof(reply));
917a718d
JG
1990
1991 /* Copy output list into message payload */
1992 ret = LTTNG_OK;
1993 break;
1994 }
37a5ef39 1995 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_DEL_OUTPUT:
917a718d 1996 {
7966af57 1997 lttng_snapshot_output output = cmd_ctx->lsm.u.snapshot_output.output;
d9a970b7 1998 ret = cmd_snapshot_del_output(target_session.get(), &output);
917a718d
JG
1999 break;
2000 }
37a5ef39 2001 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_LIST_OUTPUT:
917a718d
JG
2002 {
2003 ssize_t nb_output;
cd9adb8b 2004 struct lttng_snapshot_output *outputs = nullptr;
917a718d 2005
d9a970b7 2006 nb_output = cmd_snapshot_list_outputs(target_session.get(), &outputs);
917a718d
JG
2007 if (nb_output < 0) {
2008 ret = -nb_output;
2009 goto error;
2010 }
2011
a0377dfe 2012 LTTNG_ASSERT((nb_output > 0 && outputs) || nb_output == 0);
d9a970b7 2013 setup_lttng_msg_no_cmd_header(
28ab034a 2014 cmd_ctx, outputs, nb_output * sizeof(struct lttng_snapshot_output));
917a718d
JG
2015 free(outputs);
2016
917a718d
JG
2017 ret = LTTNG_OK;
2018 break;
2019 }
37a5ef39 2020 case LTTCOMM_SESSIOND_COMMAND_SNAPSHOT_RECORD:
917a718d 2021 {
7966af57 2022 lttng_snapshot_output output = cmd_ctx->lsm.u.snapshot_record.output;
d9a970b7
JG
2023 ret = cmd_snapshot_record(target_session.get(), &output, 0); // RFC: set to zero
2024 // since it's ignored
2025 // by
2026 // cmd_snapshot_record
917a718d
JG
2027 break;
2028 }
37a5ef39 2029 case LTTCOMM_SESSIOND_COMMAND_CREATE_SESSION_EXT:
917a718d 2030 {
b178f53e 2031 struct lttng_dynamic_buffer payload;
917a718d 2032
b178f53e 2033 lttng_dynamic_buffer_init(&payload);
917a718d 2034
d9a970b7
JG
2035 lttng::ctl::session_descriptor reply_session_descriptor = [cmd_ctx, sock]() {
2036 lttng_session_descriptor *raw_descriptor;
2037 const auto create_ret = cmd_create_session(cmd_ctx, *sock, &raw_descriptor);
2038 if (create_ret != LTTNG_OK) {
2039 LTTNG_THROW_CTL("Failed to create session", create_ret);
2040 }
2041
2042 return lttng::ctl::session_descriptor(raw_descriptor);
2043 }();
2044
2045 ret = lttng_session_descriptor_serialize(reply_session_descriptor.get(), &payload);
b178f53e 2046 if (ret) {
d9a970b7
JG
2047 LTTNG_THROW_CTL(
2048 "Failed to serialize session descriptor in reply to \"create session\" command",
2049 LTTNG_ERR_NOMEM);
b178f53e 2050 }
d9a970b7
JG
2051
2052 setup_lttng_msg_no_cmd_header(cmd_ctx, payload.data, payload.size);
2053
b178f53e 2054 lttng_dynamic_buffer_reset(&payload);
b178f53e 2055 ret = LTTNG_OK;
917a718d
JG
2056 break;
2057 }
37a5ef39 2058 case LTTCOMM_SESSIOND_COMMAND_SAVE_SESSION:
917a718d 2059 {
28ab034a 2060 ret = cmd_save_sessions(&cmd_ctx->lsm.u.save_session.attr, &cmd_ctx->creds);
917a718d
JG
2061 break;
2062 }
37a5ef39 2063 case LTTCOMM_SESSIOND_COMMAND_SET_SESSION_SHM_PATH:
917a718d 2064 {
d9a970b7 2065 ret = cmd_set_session_shm_path(target_session.get(),
28ab034a 2066 cmd_ctx->lsm.u.set_shm_path.shm_path);
917a718d
JG
2067 break;
2068 }
37a5ef39 2069 case LTTCOMM_SESSIOND_COMMAND_REGENERATE_METADATA:
917a718d 2070 {
d9a970b7 2071 ret = cmd_regenerate_metadata(target_session.get());
917a718d
JG
2072 break;
2073 }
37a5ef39 2074 case LTTCOMM_SESSIOND_COMMAND_REGENERATE_STATEDUMP:
917a718d 2075 {
d9a970b7 2076 ret = cmd_regenerate_statedump(target_session.get());
917a718d
JG
2077 break;
2078 }
37a5ef39 2079 case LTTCOMM_SESSIOND_COMMAND_REGISTER_TRIGGER:
917a718d 2080 {
746e08d7
JG
2081 size_t original_reply_payload_size;
2082 size_t reply_payload_size;
2083 const struct lttng_credentials cmd_creds = {
2084 .uid = LTTNG_OPTIONAL_INIT_VALUE(cmd_ctx->creds.uid),
2085 .gid = LTTNG_OPTIONAL_INIT_VALUE(cmd_ctx->creds.gid),
2086 };
242388e4 2087
d9a970b7 2088 setup_empty_lttng_msg(cmd_ctx);
242388e4 2089
d9a970b7 2090 auto payload_trigger = receive_lttng_trigger(cmd_ctx, *sock, sock_error);
746e08d7
JG
2091 if (ret != LTTNG_OK) {
2092 goto error;
2093 }
2094
2095 original_reply_payload_size = cmd_ctx->reply_payload.buffer.size;
242388e4 2096
d9a970b7
JG
2097 auto return_trigger =
2098 cmd_register_trigger(&cmd_creds,
2099 payload_trigger.get(),
2100 cmd_ctx->lsm.u.trigger.is_trigger_anonymous,
2101 the_notification_thread_handle);
242388e4 2102
d9a970b7 2103 ret = lttng_trigger_serialize(return_trigger.get(), &cmd_ctx->reply_payload);
242388e4 2104 if (ret) {
d9a970b7
JG
2105 LTTNG_THROW_CTL(
2106 "Failed to serialize trigger in reply to \"register trigger\" command",
2107 LTTNG_ERR_NOMEM);
242388e4
JR
2108 }
2109
28ab034a
JG
2110 reply_payload_size =
2111 cmd_ctx->reply_payload.buffer.size - original_reply_payload_size;
242388e4 2112
746e08d7 2113 update_lttng_msg(cmd_ctx, 0, reply_payload_size);
242388e4
JR
2114
2115 ret = LTTNG_OK;
917a718d
JG
2116 break;
2117 }
37a5ef39 2118 case LTTCOMM_SESSIOND_COMMAND_UNREGISTER_TRIGGER:
917a718d 2119 {
746e08d7
JG
2120 const struct lttng_credentials cmd_creds = {
2121 .uid = LTTNG_OPTIONAL_INIT_VALUE(cmd_ctx->creds.uid),
2122 .gid = LTTNG_OPTIONAL_INIT_VALUE(cmd_ctx->creds.gid),
2123 };
2124
d9a970b7 2125 auto payload_trigger = receive_lttng_trigger(cmd_ctx, *sock, sock_error);
746e08d7 2126
28ab034a 2127 ret = cmd_unregister_trigger(
d9a970b7 2128 &cmd_creds, payload_trigger.get(), the_notification_thread_handle);
917a718d
JG
2129 break;
2130 }
37a5ef39 2131 case LTTCOMM_SESSIOND_COMMAND_ROTATE_SESSION:
917a718d
JG
2132 {
2133 struct lttng_rotate_session_return rotate_return;
2134
d9a970b7 2135 DBG("Client rotate session \"%s\"", target_session->name);
917a718d
JG
2136
2137 memset(&rotate_return, 0, sizeof(rotate_return));
d9a970b7 2138 if (target_session->kernel_session && !check_rotate_compatible()) {
917a718d
JG
2139 DBG("Kernel tracer version is not compatible with the rotation feature");
2140 ret = LTTNG_ERR_ROTATION_WRONG_VERSION;
2141 goto error;
2142 }
2143
d9a970b7 2144 ret = cmd_rotate_session(target_session.get(),
28ab034a
JG
2145 &rotate_return,
2146 false,
2147 LTTNG_TRACE_CHUNK_COMMAND_TYPE_MOVE_TO_COMPLETED);
917a718d
JG
2148 if (ret < 0) {
2149 ret = -ret;
2150 goto error;
2151 }
2152
d9a970b7 2153 setup_lttng_msg_no_cmd_header(cmd_ctx, &rotate_return, sizeof(rotate_return));
917a718d
JG
2154
2155 ret = LTTNG_OK;
2156 break;
2157 }
37a5ef39 2158 case LTTCOMM_SESSIOND_COMMAND_ROTATION_GET_INFO:
917a718d
JG
2159 {
2160 struct lttng_rotation_get_info_return get_info_return;
2161
2162 memset(&get_info_return, 0, sizeof(get_info_return));
d9a970b7 2163 ret = cmd_rotate_get_info(target_session.get(),
28ab034a
JG
2164 &get_info_return,
2165 cmd_ctx->lsm.u.get_rotation_info.rotation_id);
917a718d
JG
2166 if (ret < 0) {
2167 ret = -ret;
2168 goto error;
2169 }
2170
d9a970b7 2171 setup_lttng_msg_no_cmd_header(cmd_ctx, &get_info_return, sizeof(get_info_return));
917a718d
JG
2172
2173 ret = LTTNG_OK;
2174 break;
2175 }
37a5ef39 2176 case LTTCOMM_SESSIOND_COMMAND_ROTATION_SET_SCHEDULE:
917a718d
JG
2177 {
2178 bool set_schedule;
2179 enum lttng_rotation_schedule_type schedule_type;
2180 uint64_t value;
2181
d9a970b7 2182 if (target_session->kernel_session && !check_rotate_compatible()) {
917a718d
JG
2183 DBG("Kernel tracer version does not support session rotations");
2184 ret = LTTNG_ERR_ROTATION_WRONG_VERSION;
2185 goto error;
2186 }
2187
3a91de3a 2188 set_schedule = cmd_ctx->lsm.u.rotation_set_schedule.set == 1;
28ab034a
JG
2189 schedule_type = (enum lttng_rotation_schedule_type)
2190 cmd_ctx->lsm.u.rotation_set_schedule.type;
3a91de3a 2191 value = cmd_ctx->lsm.u.rotation_set_schedule.value;
917a718d 2192
28f23191 2193 ret = cmd_rotation_set_schedule(
d9a970b7 2194 target_session.get(), set_schedule, schedule_type, value);
917a718d
JG
2195 if (ret != LTTNG_OK) {
2196 goto error;
2197 }
2198
2199 break;
2200 }
37a5ef39 2201 case LTTCOMM_SESSIOND_COMMAND_SESSION_LIST_ROTATION_SCHEDULES:
917a718d 2202 {
7966af57
SM
2203 lttng_session_list_schedules_return schedules;
2204
d9a970b7
JG
2205 schedules.periodic.set = !!target_session->rotate_timer_period;
2206 schedules.periodic.value = target_session->rotate_timer_period;
2207 schedules.size.set = !!target_session->rotate_size;
2208 schedules.size.value = target_session->rotate_size;
917a718d 2209
d9a970b7 2210 setup_lttng_msg_no_cmd_header(cmd_ctx, &schedules, sizeof(schedules));
917a718d
JG
2211
2212 ret = LTTNG_OK;
2213 break;
2214 }
37a5ef39 2215 case LTTCOMM_SESSIOND_COMMAND_CLEAR_SESSION:
022349df 2216 {
d9a970b7 2217 ret = cmd_clear_session(target_session.get(), sock);
022349df
MD
2218 break;
2219 }
37a5ef39 2220 case LTTCOMM_SESSIOND_COMMAND_LIST_TRIGGERS:
fbc9f37d 2221 {
cd9adb8b 2222 struct lttng_triggers *return_triggers = nullptr;
fbc9f37d
JR
2223 size_t original_payload_size;
2224 size_t payload_size;
2225
d9a970b7 2226 setup_empty_lttng_msg(cmd_ctx);
fbc9f37d
JR
2227
2228 original_payload_size = cmd_ctx->reply_payload.buffer.size;
2229
28ab034a 2230 ret = cmd_list_triggers(cmd_ctx, the_notification_thread_handle, &return_triggers);
fbc9f37d
JR
2231 if (ret != LTTNG_OK) {
2232 goto error;
2233 }
2234
a0377dfe 2235 LTTNG_ASSERT(return_triggers);
28ab034a 2236 ret = lttng_triggers_serialize(return_triggers, &cmd_ctx->reply_payload);
fbc9f37d
JR
2237 lttng_triggers_destroy(return_triggers);
2238 if (ret) {
2239 ERR("Failed to serialize triggers in reply to `list triggers` command");
2240 ret = LTTNG_ERR_NOMEM;
2241 goto error;
2242 }
2243
28ab034a 2244 payload_size = cmd_ctx->reply_payload.buffer.size - original_payload_size;
fbc9f37d
JR
2245
2246 update_lttng_msg(cmd_ctx, 0, payload_size);
2247
2248 ret = LTTNG_OK;
2249 break;
2250 }
37a5ef39 2251 case LTTCOMM_SESSIOND_COMMAND_EXECUTE_ERROR_QUERY:
588c4b0d
JG
2252 {
2253 struct lttng_error_query *query;
2254 const struct lttng_credentials cmd_creds = {
2255 .uid = LTTNG_OPTIONAL_INIT_VALUE(cmd_ctx->creds.uid),
2256 .gid = LTTNG_OPTIONAL_INIT_VALUE(cmd_ctx->creds.gid),
2257 };
cd9adb8b 2258 struct lttng_error_query_results *results = nullptr;
588c4b0d
JG
2259 size_t original_payload_size;
2260 size_t payload_size;
2261
d9a970b7 2262 setup_empty_lttng_msg(cmd_ctx);
588c4b0d
JG
2263
2264 original_payload_size = cmd_ctx->reply_payload.buffer.size;
2265
28ab034a 2266 ret = receive_lttng_error_query(cmd_ctx, *sock, sock_error, &query);
588c4b0d
JG
2267 if (ret != LTTNG_OK) {
2268 goto error;
2269 }
2270
28ab034a
JG
2271 ret = cmd_execute_error_query(
2272 &cmd_creds, query, &results, the_notification_thread_handle);
588c4b0d
JG
2273 lttng_error_query_destroy(query);
2274 if (ret != LTTNG_OK) {
2275 goto error;
2276 }
2277
a0377dfe 2278 LTTNG_ASSERT(results);
28ab034a 2279 ret = lttng_error_query_results_serialize(results, &cmd_ctx->reply_payload);
588c4b0d
JG
2280 lttng_error_query_results_destroy(results);
2281 if (ret) {
2282 ERR("Failed to serialize error query result set in reply to `execute error query` command");
2283 ret = LTTNG_ERR_NOMEM;
2284 goto error;
2285 }
2286
28ab034a 2287 payload_size = cmd_ctx->reply_payload.buffer.size - original_payload_size;
588c4b0d
JG
2288
2289 update_lttng_msg(cmd_ctx, 0, payload_size);
2290
2291 ret = LTTNG_OK;
2292
2293 break;
2294 }
917a718d
JG
2295 default:
2296 ret = LTTNG_ERR_UND;
2297 break;
2298 }
2299
2300error:
3a91de3a
JG
2301 if (cmd_ctx->reply_payload.buffer.size == 0) {
2302 DBG("Missing llm header, creating one.");
d9a970b7 2303 setup_lttng_msg_no_cmd_header(cmd_ctx, nullptr, 0);
917a718d 2304 }
6329831c
JG
2305
2306 command_ctx_set_status_code(*cmd_ctx, static_cast<lttng_error_code>(ret));
a0377dfe 2307 LTTNG_ASSERT(!rcu_read_ongoing());
917a718d
JG
2308 return ret;
2309}
2310
cd9adb8b 2311static int create_client_sock()
917a718d
JG
2312{
2313 int ret, client_sock;
917a718d
JG
2314
2315 /* Create client tool unix socket */
28ab034a 2316 client_sock = lttcomm_create_unix_sock(the_config.client_unix_sock_path.value);
917a718d 2317 if (client_sock < 0) {
28ab034a 2318 ERR("Create unix sock failed: %s", the_config.client_unix_sock_path.value);
917a718d
JG
2319 ret = -1;
2320 goto end;
2321 }
2322
2323 /* Set the cloexec flag */
2324 ret = utils_set_fd_cloexec(client_sock);
2325 if (ret < 0) {
2326 ERR("Unable to set CLOEXEC flag to the client Unix socket (fd: %d). "
28ab034a
JG
2327 "Continuing but note that the consumer daemon will have a "
2328 "reference to this socket on exec()",
2329 client_sock);
917a718d
JG
2330 }
2331
2332 /* File permission MUST be 660 */
28ab034a 2333 ret = chmod(the_config.client_unix_sock_path.value, S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
917a718d 2334 if (ret < 0) {
28ab034a 2335 ERR("Set file permissions failed: %s", the_config.client_unix_sock_path.value);
917a718d 2336 PERROR("chmod");
18972083
JR
2337 (void) lttcomm_close_unix_sock(client_sock);
2338 ret = -1;
917a718d
JG
2339 goto end;
2340 }
2341 DBG("Created client socket (fd = %i)", client_sock);
2342 ret = client_sock;
2343end:
917a718d
JG
2344 return ret;
2345}
2346
2347static void cleanup_client_thread(void *data)
2348{
7966af57 2349 struct lttng_pipe *quit_pipe = (lttng_pipe *) data;
917a718d
JG
2350
2351 lttng_pipe_destroy(quit_pipe);
2352}
2353
f46376a1 2354static void thread_init_cleanup(void *data __attribute__((unused)))
6cb45e93
JG
2355{
2356 set_thread_status(false);
2357}
2358
d9a970b7
JG
2359// Helper function to log the source_location if the exception is derived from lttng::runtime_error
2360template <typename ExceptionType>
2361typename std::enable_if<std::is_base_of<lttng::runtime_error, ExceptionType>::value,
2362 std::string>::type
2363formatted_source_location(const ExceptionType& ex)
2364{
2365 return fmt::format("{}", ex.source_location);
2366}
2367
2368template <typename ExceptionType>
2369typename std::enable_if<!std::is_base_of<lttng::runtime_error, ExceptionType>::value,
2370 std::string>::type
2371formatted_source_location(const ExceptionType&)
2372{
2373 return "";
2374}
2375
2376template <class ExceptionType>
2377static void log_nested_exceptions(const ExceptionType& ex, unsigned int level = 0)
2378{
2379 const auto location = formatted_source_location(ex);
2380
2381 if (level == 0) {
2382 if (location.size()) {
2383 WARN_FMT("Client request failed: {}, location='{}'", ex.what(), location);
2384 } else {
2385 WARN_FMT("Client request failed: {}", ex.what());
2386 }
2387 } else {
2388 if (location.size()) {
2389 WARN_FMT("\t{}, location='{}'", ex.what(), location);
2390 } else {
2391 WARN_FMT("\t{}", ex.what());
2392 }
2393 }
2394
2395 try {
2396 std::rethrow_if_nested(ex);
2397 } catch (const lttng::runtime_error& nested_ex) {
2398 log_nested_exceptions(nested_ex, level + 1);
2399 } catch (const std::exception& nested_ex) {
2400 log_nested_exceptions(nested_ex, level + 1);
2401 }
2402}
2403
917a718d
JG
2404/*
2405 * This thread manage all clients request using the unix client socket for
2406 * communication.
2407 */
2408static void *thread_manage_clients(void *data)
2409{
8a00688e 2410 int sock = -1, ret, i, err = -1;
917a718d 2411 int sock_error;
8a00688e 2412 uint32_t nb_fd;
917a718d 2413 struct lttng_poll_event events;
0f68efb6 2414 const int client_sock = thread_state.client_sock;
7966af57 2415 struct lttng_pipe *quit_pipe = (lttng_pipe *) data;
917a718d 2416 const int thread_quit_pipe_fd = lttng_pipe_get_readfd(quit_pipe);
3a91de3a 2417 struct command_ctx cmd_ctx = {};
917a718d
JG
2418
2419 DBG("[thread] Manage client started");
2420
3a91de3a
JG
2421 lttng_payload_init(&cmd_ctx.reply_payload);
2422
917a718d
JG
2423 is_root = (getuid() == 0);
2424
cd9adb8b 2425 pthread_cleanup_push(thread_init_cleanup, nullptr);
917a718d
JG
2426
2427 rcu_register_thread();
2428
412d7227 2429 health_register(the_health_sessiond, HEALTH_SESSIOND_TYPE_CMD);
917a718d
JG
2430
2431 health_code_update();
2432
2433 ret = lttcomm_listen_unix_sock(client_sock);
2434 if (ret < 0) {
2435 goto error_listen;
2436 }
2437
2438 /*
2439 * Pass 2 as size here for the thread quit pipe and client_sock. Nothing
2440 * more will be added to this poll set.
2441 */
2442 ret = lttng_poll_create(&events, 2, LTTNG_CLOEXEC);
2443 if (ret < 0) {
2444 goto error_create_poll;
2445 }
2446
2447 /* Add the application registration socket */
2448 ret = lttng_poll_add(&events, client_sock, LPOLLIN | LPOLLPRI);
2449 if (ret < 0) {
2450 goto error;
2451 }
2452
2453 /* Add thread quit pipe */
1524f98c 2454 ret = lttng_poll_add(&events, thread_quit_pipe_fd, LPOLLIN);
917a718d
JG
2455 if (ret < 0) {
2456 goto error;
2457 }
2458
6cb45e93 2459 /* Set state as running. */
0d163d56 2460 set_thread_status(true);
6cb45e93
JG
2461 pthread_cleanup_pop(0);
2462
917a718d
JG
2463 /* This testpoint is after we signal readiness to the parent. */
2464 if (testpoint(sessiond_thread_manage_clients)) {
2465 goto error;
2466 }
2467
2468 if (testpoint(sessiond_thread_manage_clients_before_loop)) {
2469 goto error;
2470 }
2471
2472 health_code_update();
2473
cd9adb8b 2474 while (true) {
917a718d
JG
2475 const struct cmd_completion_handler *cmd_completion_handler;
2476
7966af57
SM
2477 cmd_ctx.creds.uid = UINT32_MAX;
2478 cmd_ctx.creds.gid = UINT32_MAX;
2479 cmd_ctx.creds.pid = 0;
fe489250 2480 lttng_payload_clear(&cmd_ctx.reply_payload);
e368fb43 2481 cmd_ctx.lttng_msg_size = 0;
3a91de3a 2482
917a718d
JG
2483 DBG("Accepting client command ...");
2484
2485 /* Inifinite blocking call, waiting for transmission */
2486 restart:
2487 health_poll_entry();
2488 ret = lttng_poll_wait(&events, -1);
2489 health_poll_exit();
2490 if (ret < 0) {
2491 /*
2492 * Restart interrupted system call.
2493 */
2494 if (errno == EINTR) {
2495 goto restart;
2496 }
2497 goto error;
2498 }
2499
2500 nb_fd = ret;
2501
2502 for (i = 0; i < nb_fd; i++) {
8a00688e
MJ
2503 /* Fetch once the poll data. */
2504 const auto revents = LTTNG_POLL_GETEV(&events, i);
2505 const auto pollfd = LTTNG_POLL_GETFD(&events, i);
917a718d
JG
2506
2507 health_code_update();
2508
8a00688e 2509 /* Activity on thread quit pipe, exiting. */
917a718d 2510 if (pollfd == thread_quit_pipe_fd) {
8a00688e 2511 DBG("Activity on thread quit pipe");
917a718d
JG
2512 err = 0;
2513 goto exit;
8a00688e
MJ
2514 }
2515
2516 /* Event on the registration socket */
2517 if (revents & LPOLLIN) {
2518 continue;
2519 } else if (revents & (LPOLLERR | LPOLLHUP | LPOLLRDHUP)) {
2520 ERR("Client socket poll error");
2521 goto error;
917a718d 2522 } else {
8a00688e
MJ
2523 ERR("Unexpected poll events %u for sock %d", revents, pollfd);
2524 goto error;
917a718d
JG
2525 }
2526 }
2527
2528 DBG("Wait for client response");
2529
2530 health_code_update();
2531
2532 sock = lttcomm_accept_unix_sock(client_sock);
2533 if (sock < 0) {
2534 goto error;
2535 }
2536
2537 /*
2538 * Set the CLOEXEC flag. Return code is useless because either way, the
2539 * show must go on.
2540 */
2541 (void) utils_set_fd_cloexec(sock);
2542
2543 /* Set socket option for credentials retrieval */
2544 ret = lttcomm_setsockopt_creds_unix_sock(sock);
2545 if (ret < 0) {
2546 goto error;
2547 }
2548
917a718d
JG
2549 health_code_update();
2550
2551 /*
2552 * Data is received from the lttng client. The struct
2553 * lttcomm_session_msg (lsm) contains the command and data request of
2554 * the client.
2555 */
2556 DBG("Receiving data from client ...");
28ab034a
JG
2557 ret = lttcomm_recv_creds_unix_sock(
2558 sock, &cmd_ctx.lsm, sizeof(struct lttcomm_session_msg), &cmd_ctx.creds);
3a91de3a
JG
2559 if (ret != sizeof(struct lttcomm_session_msg)) {
2560 DBG("Incomplete recv() from client... continuing");
917a718d
JG
2561 ret = close(sock);
2562 if (ret) {
2563 PERROR("close");
2564 }
2565 sock = -1;
917a718d
JG
2566 continue;
2567 }
2568
2569 health_code_update();
2570
2571 // TODO: Validate cmd_ctx including sanity check for
2572 // security purpose.
2573
2574 rcu_thread_online();
2575 /*
2576 * This function dispatch the work to the kernel or userspace tracer
2577 * libs and fill the lttcomm_lttng_msg data structure of all the needed
2578 * informations for the client. The command context struct contains
2579 * everything this function may needs.
2580 */
dd7ef124
JG
2581 try {
2582 ret = process_client_msg(&cmd_ctx, &sock, &sock_error);
2583 rcu_thread_offline();
dd7ef124 2584 } catch (const std::bad_alloc& ex) {
d9a970b7
JG
2585 log_nested_exceptions(ex);
2586 ret = LTTNG_ERR_NOMEM;
dd7ef124 2587 } catch (const lttng::ctl::error& ex) {
d9a970b7
JG
2588 log_nested_exceptions(ex);
2589 ret = ex.code();
6329831c 2590 } catch (const lttng::invalid_argument_error& ex) {
d9a970b7
JG
2591 log_nested_exceptions(ex);
2592 ret = LTTNG_ERR_INVALID;
2593 } catch (const lttng::sessiond::exceptions::session_not_found_error& ex) {
2594 log_nested_exceptions(ex);
2595 ret = LTTNG_ERR_SESS_NOT_FOUND;
2596 } catch (const lttng::runtime_error& ex) {
2597 log_nested_exceptions(ex);
2598 ret = LTTNG_ERR_UNK;
dd7ef124 2599 } catch (const std::exception& ex) {
d9a970b7
JG
2600 log_nested_exceptions(ex);
2601 ret = LTTNG_ERR_UNK;
917a718d
JG
2602 }
2603
c7e9ffbd 2604 if (ret < LTTNG_OK || ret >= LTTNG_ERR_NR) {
7e397c55 2605 WARN("Command returned an invalid status code, returning unknown error: "
28ab034a
JG
2606 "command type = %s (%d), ret = %d",
2607 lttcomm_sessiond_command_str(
2608 (lttcomm_sessiond_command) cmd_ctx.lsm.cmd_type),
2609 cmd_ctx.lsm.cmd_type,
2610 ret);
c7e9ffbd
JG
2611 ret = LTTNG_ERR_UNK;
2612 }
2613
d9a970b7
JG
2614 if (ret != LTTNG_OK) {
2615 /*
2616 * Reset the payload contents as the command may have left them in an
2617 * inconsistent state.
2618 */
2619 setup_empty_lttng_msg(&cmd_ctx);
2620 }
2621
2622 command_ctx_set_status_code(cmd_ctx, static_cast<lttng_error_code>(ret));
2623
917a718d
JG
2624 cmd_completion_handler = cmd_pop_completion_handler();
2625 if (cmd_completion_handler) {
2626 enum lttng_error_code completion_code;
2627
28ab034a 2628 completion_code = cmd_completion_handler->run(cmd_completion_handler->data);
917a718d 2629 if (completion_code != LTTNG_OK) {
917a718d
JG
2630 continue;
2631 }
2632 }
2633
2634 health_code_update();
2635
3e3665b8 2636 if (sock >= 0) {
3a91de3a 2637 struct lttng_payload_view view =
28ab034a
JG
2638 lttng_payload_view_from_payload(&cmd_ctx.reply_payload, 0, -1);
2639 struct lttcomm_lttng_msg *llm =
2640 (typeof(llm)) cmd_ctx.reply_payload.buffer.data;
3a91de3a 2641
a0377dfe
FD
2642 LTTNG_ASSERT(cmd_ctx.reply_payload.buffer.size >= sizeof(*llm));
2643 LTTNG_ASSERT(cmd_ctx.lttng_msg_size == cmd_ctx.reply_payload.buffer.size);
3a91de3a 2644
fe489250 2645 llm->fd_count = lttng_payload_view_get_fd_handle_count(&view);
e368fb43 2646
3e3665b8 2647 DBG("Sending response (size: %d, retcode: %s (%d))",
28ab034a
JG
2648 cmd_ctx.lttng_msg_size,
2649 lttng_strerror(-llm->ret_code),
2650 llm->ret_code);
3a91de3a 2651 ret = send_unix_sock(sock, &view);
3e3665b8
JG
2652 if (ret < 0) {
2653 ERR("Failed to send data back to client");
2654 }
917a718d 2655
3e3665b8
JG
2656 /* End of transmission */
2657 ret = close(sock);
2658 if (ret) {
2659 PERROR("close");
2660 }
4a76dfd3
JR
2661 }
2662 sock = -1;
917a718d 2663
917a718d
JG
2664 health_code_update();
2665 }
2666
2667exit:
2668error:
2669 if (sock >= 0) {
2670 ret = close(sock);
2671 if (ret) {
2672 PERROR("close");
2673 }
2674 }
2675
2676 lttng_poll_clean(&events);
917a718d
JG
2677
2678error_listen:
2679error_create_poll:
412d7227 2680 unlink(the_config.client_unix_sock_path.value);
0f68efb6
JG
2681 ret = close(client_sock);
2682 if (ret) {
2683 PERROR("close");
917a718d
JG
2684 }
2685
2686 if (err) {
2687 health_error();
2688 ERR("Health error occurred in %s", __func__);
2689 }
2690
412d7227 2691 health_unregister(the_health_sessiond);
917a718d
JG
2692
2693 DBG("Client thread dying");
3a91de3a 2694 lttng_payload_reset(&cmd_ctx.reply_payload);
917a718d 2695 rcu_unregister_thread();
cd9adb8b 2696 return nullptr;
917a718d
JG
2697}
2698
28ab034a 2699static bool shutdown_client_thread(void *thread_data)
917a718d 2700{
7966af57 2701 struct lttng_pipe *client_quit_pipe = (lttng_pipe *) thread_data;
917a718d
JG
2702 const int write_fd = lttng_pipe_get_writefd(client_quit_pipe);
2703
2704 return notify_thread_pipe(write_fd) == 1;
2705}
2706
cd9adb8b 2707struct lttng_thread *launch_client_thread()
917a718d 2708{
6cb45e93 2709 bool thread_running;
917a718d 2710 struct lttng_pipe *client_quit_pipe;
cd9adb8b 2711 struct lttng_thread *thread = nullptr;
0f68efb6 2712 int client_sock_fd = -1;
917a718d 2713
6cb45e93 2714 sem_init(&thread_state.ready, 0, 0);
917a718d
JG
2715 client_quit_pipe = lttng_pipe_open(FD_CLOEXEC);
2716 if (!client_quit_pipe) {
2717 goto error;
2718 }
2719
0f68efb6
JG
2720 client_sock_fd = create_client_sock();
2721 if (client_sock_fd < 0) {
2722 goto error;
2723 }
2724
2725 thread_state.client_sock = client_sock_fd;
917a718d 2726 thread = lttng_thread_create("Client management",
28ab034a
JG
2727 thread_manage_clients,
2728 shutdown_client_thread,
2729 cleanup_client_thread,
2730 client_quit_pipe);
917a718d
JG
2731 if (!thread) {
2732 goto error;
2733 }
0f68efb6
JG
2734 /* The client thread now owns the client sock fd and the quit pipe. */
2735 client_sock_fd = -1;
cd9adb8b 2736 client_quit_pipe = nullptr;
917a718d
JG
2737
2738 /*
2739 * This thread is part of the threads that need to be fully
2740 * initialized before the session daemon is marked as "ready".
2741 */
6cb45e93
JG
2742 thread_running = wait_thread_status();
2743 if (!thread_running) {
0f68efb6 2744 goto error;
6cb45e93 2745 }
917a718d
JG
2746 return thread;
2747error:
0f68efb6
JG
2748 if (client_sock_fd >= 0) {
2749 if (close(client_sock_fd)) {
2750 PERROR("Failed to close client socket");
2751 }
2752 }
2753 lttng_thread_put(thread);
917a718d 2754 cleanup_client_thread(client_quit_pipe);
cd9adb8b 2755 return nullptr;
917a718d 2756}
This page took 0.213447 seconds and 4 git commands to generate.