clang-tidy: apply suggested fixes
[lttng-tools.git] / src / bin / lttng-sessiond / manage-kernel.cpp
CommitLineData
5b093681 1/*
21cf9b6b 2 * Copyright (C) 2011 EfficiOS Inc.
ab5be9fa
MJ
3 * Copyright (C) 2011 Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 * Copyright (C) 2013 Jérémie Galarneau <jeremie.galarneau@efficios.com>
5b093681 5 *
ab5be9fa 6 * SPDX-License-Identifier: GPL-2.0-only
5b093681 7 *
5b093681
JG
8 */
9
28ab034a
JG
10#include "health-sessiond.hpp"
11#include "kernel-consumer.hpp"
12#include "kernel.hpp"
c9e313bc
SM
13#include "manage-kernel.hpp"
14#include "testpoint.hpp"
c9e313bc 15#include "thread.hpp"
28ab034a
JG
16#include "utils.hpp"
17
18#include <common/pipe.hpp>
56047f5a 19#include <common/urcu.hpp>
28ab034a 20#include <common/utils.hpp>
5b093681 21
671e39d7
MJ
22#include <fcntl.h>
23
f1494934 24namespace {
5b093681
JG
25struct thread_notifiers {
26 struct lttng_pipe *quit_pipe;
27 int kernel_poll_pipe_read_fd;
28};
f1494934 29} /* namespace */
5b093681
JG
30
31/*
32 * Update the kernel poll set of all channel fd available over all tracing
33 * session. Add the wakeup pipe at the end of the set.
34 */
35static int update_kernel_poll(struct lttng_poll_event *events)
36{
37 int ret;
38 struct ltt_kernel_channel *channel;
39 struct ltt_session *session;
5b093681
JG
40
41 DBG("Updating kernel poll set");
42
d9a970b7
JG
43 const auto list_lock = lttng::sessiond::lock_session_list();
44 const struct ltt_session_list *session_list = session_get_list();
45
28ab034a 46 cds_list_for_each_entry (session, &session_list->head, list) {
5b093681
JG
47 if (!session_get(session)) {
48 continue;
49 }
50 session_lock(session);
cd9adb8b 51 if (session->kernel_session == nullptr) {
5b093681
JG
52 session_unlock(session);
53 session_put(session);
54 continue;
55 }
56
28ab034a
JG
57 cds_list_for_each_entry (
58 channel, &session->kernel_session->channel_list.head, list) {
5b093681
JG
59 /* Add channel fd to the kernel poll set */
60 ret = lttng_poll_add(events, channel->fd, LPOLLIN | LPOLLRDNORM);
61 if (ret < 0) {
62 session_unlock(session);
63 session_put(session);
d9a970b7 64 return -1;
5b093681
JG
65 }
66 DBG("Channel fd %d added to kernel set", channel->fd);
67 }
68 session_unlock(session);
0318876b 69 session_put(session);
5b093681 70 }
5b093681
JG
71
72 return 0;
5b093681
JG
73}
74
75/*
76 * Find the channel fd from 'fd' over all tracing session. When found, check
77 * for new channel stream and send those stream fds to the kernel consumer.
78 *
79 * Useful for CPU hotplug feature.
80 */
81static int update_kernel_stream(int fd)
82{
83 int ret = 0;
84 struct ltt_session *session;
85 struct ltt_kernel_session *ksess;
86 struct ltt_kernel_channel *channel;
5b093681
JG
87
88 DBG("Updating kernel streams for channel fd %d", fd);
89
d9a970b7
JG
90 const auto list_lock = lttng::sessiond::lock_session_list();
91 const struct ltt_session_list *session_list = session_get_list();
92
28ab034a 93 cds_list_for_each_entry (session, &session_list->head, list) {
5b093681
JG
94 if (!session_get(session)) {
95 continue;
96 }
56047f5a 97
5b093681 98 session_lock(session);
cd9adb8b 99 if (session->kernel_session == nullptr) {
5b093681
JG
100 session_unlock(session);
101 session_put(session);
102 continue;
103 }
56047f5a 104
5b093681
JG
105 ksess = session->kernel_session;
106
28ab034a 107 cds_list_for_each_entry (channel, &ksess->channel_list.head, list) {
5b093681
JG
108 struct lttng_ht_iter iter;
109 struct consumer_socket *socket;
110
111 if (channel->fd != fd) {
112 continue;
113 }
114 DBG("Channel found, updating kernel streams");
115 ret = kernel_open_channel_stream(channel);
116 if (ret < 0) {
117 goto error;
118 }
119 /* Update the stream global counter */
120 ksess->stream_count_global += ret;
121
122 /*
123 * Have we already sent fds to the consumer? If yes, it
124 * means that tracing is started so it is safe to send
125 * our updated stream fds.
126 */
cd9adb8b 127 if (ksess->consumer_fds_sent != 1 || ksess->consumer == nullptr) {
5b093681
JG
128 ret = -1;
129 goto error;
130 }
131
56047f5a 132 {
07c4863f 133 const lttng::urcu::read_lock_guard read_lock;
56047f5a
JG
134
135 cds_lfht_for_each_entry (
136 ksess->consumer->socks->ht, &iter.iter, socket, node.node) {
137 pthread_mutex_lock(socket->lock);
138 ret = kernel_consumer_send_channel_streams(
139 socket,
140 channel,
141 ksess,
142 session->output_traces ? 1 : 0);
143 pthread_mutex_unlock(socket->lock);
144 if (ret < 0) {
145 goto error;
146 }
5b093681
JG
147 }
148 }
5b093681 149 }
56047f5a 150
5b093681
JG
151 session_unlock(session);
152 session_put(session);
153 }
d9a970b7 154
5b093681
JG
155 return ret;
156
157error:
158 session_unlock(session);
159 session_put(session);
5b093681
JG
160 return ret;
161}
162
163/*
164 * This thread manage event coming from the kernel.
165 *
166 * Features supported in this thread:
167 * -) CPU Hotplug
168 */
169static void *thread_kernel_management(void *data)
170{
8a00688e
MJ
171 int ret, i, update_poll_flag = 1, err = -1;
172 uint32_t nb_fd;
5b093681
JG
173 char tmp;
174 struct lttng_poll_event events;
7966af57 175 struct thread_notifiers *notifiers = (thread_notifiers *) data;
8a00688e 176 const auto thread_quit_pipe_fd = lttng_pipe_get_readfd(notifiers->quit_pipe);
5b093681
JG
177
178 DBG("[thread] Thread manage kernel started");
179
412d7227 180 health_register(the_health_sessiond, HEALTH_SESSIOND_TYPE_KERNEL);
5b093681
JG
181
182 /*
183 * This first step of the while is to clean this structure which could free
184 * non NULL pointers so initialize it before the loop.
185 */
186 lttng_poll_init(&events);
187
188 if (testpoint(sessiond_thread_manage_kernel)) {
189 goto error_testpoint;
190 }
191
192 health_code_update();
193
194 if (testpoint(sessiond_thread_manage_kernel_before_loop)) {
195 goto error_testpoint;
196 }
197
cd9adb8b 198 while (true) {
5b093681
JG
199 health_code_update();
200
201 if (update_poll_flag == 1) {
202 /* Clean events object. We are about to populate it again. */
203 lttng_poll_clean(&events);
204
205 ret = lttng_poll_create(&events, 2, LTTNG_CLOEXEC);
206 if (ret < 0) {
207 goto error_poll_create;
208 }
209
28ab034a 210 ret = lttng_poll_add(&events, notifiers->kernel_poll_pipe_read_fd, LPOLLIN);
5b093681
JG
211 if (ret < 0) {
212 goto error;
213 }
214
28ab034a 215 ret = lttng_poll_add(&events, thread_quit_pipe_fd, LPOLLIN);
5b093681
JG
216 if (ret < 0) {
217 goto error;
218 }
219
220 /* This will add the available kernel channel if any. */
221 ret = update_kernel_poll(&events);
222 if (ret < 0) {
223 goto error;
224 }
225 update_poll_flag = 0;
226 }
227
228 DBG("Thread kernel polling");
229
230 /* Poll infinite value of time */
231 restart:
232 health_poll_entry();
233 ret = lttng_poll_wait(&events, -1);
28ab034a 234 DBG("Thread kernel return from poll on %d fds", LTTNG_POLL_GETNB(&events));
5b093681
JG
235 health_poll_exit();
236 if (ret < 0) {
237 /*
238 * Restart interrupted system call.
239 */
240 if (errno == EINTR) {
241 goto restart;
242 }
243 goto error;
244 } else if (ret == 0) {
245 /* Should not happen since timeout is infinite */
246 ERR("Return value of poll is 0 with an infinite timeout.\n"
28ab034a 247 "This should not have happened! Continuing...");
5b093681
JG
248 continue;
249 }
250
251 nb_fd = ret;
252
253 for (i = 0; i < nb_fd; i++) {
254 /* Fetch once the poll data */
8a00688e
MJ
255 const auto revents = LTTNG_POLL_GETEV(&events, i);
256 const auto pollfd = LTTNG_POLL_GETFD(&events, i);
5b093681
JG
257
258 health_code_update();
259
8a00688e
MJ
260 /* Activity on thread quit pipe, exiting. */
261 if (pollfd == thread_quit_pipe_fd) {
262 DBG("Activity on thread quit pipe");
5b093681
JG
263 err = 0;
264 goto exit;
265 }
266
267 /* Check for data on kernel pipe */
268 if (revents & LPOLLIN) {
269 if (pollfd == notifiers->kernel_poll_pipe_read_fd) {
28ab034a
JG
270 (void) lttng_read(
271 notifiers->kernel_poll_pipe_read_fd, &tmp, 1);
5b093681 272 /*
28ab034a
JG
273 * Ret value is useless here, if this pipe gets any actions
274 * an update is required anyway.
5b093681
JG
275 */
276 update_poll_flag = 1;
277 continue;
278 } else {
279 /*
280 * New CPU detected by the kernel. Adding kernel stream to
281 * kernel session and updating the kernel consumer
282 */
283 ret = update_kernel_stream(pollfd);
284 if (ret < 0) {
285 continue;
286 }
287 break;
288 }
289 } else if (revents & (LPOLLERR | LPOLLHUP | LPOLLRDHUP)) {
290 update_poll_flag = 1;
291 continue;
292 } else {
293 ERR("Unexpected poll events %u for sock %d", revents, pollfd);
294 goto error;
295 }
296 }
297 }
298
299exit:
300error:
301 lttng_poll_clean(&events);
302error_poll_create:
303error_testpoint:
304 if (err) {
305 health_error();
306 ERR("Health error occurred in %s", __func__);
307 WARN("Kernel thread died unexpectedly. "
28ab034a 308 "Kernel tracing can continue but CPU hotplug is disabled.");
5b093681 309 }
412d7227 310 health_unregister(the_health_sessiond);
5b093681 311 DBG("Kernel thread dying");
cd9adb8b 312 return nullptr;
5b093681
JG
313}
314
315static bool shutdown_kernel_management_thread(void *data)
316{
7966af57 317 struct thread_notifiers *notifiers = (thread_notifiers *) data;
5b093681
JG
318 const int write_fd = lttng_pipe_get_writefd(notifiers->quit_pipe);
319
320 return notify_thread_pipe(write_fd) == 1;
321}
322
323static void cleanup_kernel_management_thread(void *data)
324{
7966af57 325 struct thread_notifiers *notifiers = (thread_notifiers *) data;
5b093681
JG
326
327 lttng_pipe_destroy(notifiers->quit_pipe);
328 free(notifiers);
329}
330
331bool launch_kernel_management_thread(int kernel_poll_pipe_read_fd)
332{
333 struct lttng_pipe *quit_pipe;
cd9adb8b 334 struct thread_notifiers *notifiers = nullptr;
5b093681
JG
335 struct lttng_thread *thread;
336
64803277 337 notifiers = zmalloc<thread_notifiers>();
5b093681 338 if (!notifiers) {
21fa020e
JG
339 goto error_alloc;
340 }
341 quit_pipe = lttng_pipe_open(FD_CLOEXEC);
342 if (!quit_pipe) {
5b093681
JG
343 goto error;
344 }
345 notifiers->quit_pipe = quit_pipe;
346 notifiers->kernel_poll_pipe_read_fd = kernel_poll_pipe_read_fd;
347
348 thread = lttng_thread_create("Kernel management",
28ab034a
JG
349 thread_kernel_management,
350 shutdown_kernel_management_thread,
351 cleanup_kernel_management_thread,
352 notifiers);
5b093681
JG
353 if (!thread) {
354 goto error;
355 }
356 lttng_thread_put(thread);
357 return true;
358error:
359 cleanup_kernel_management_thread(notifiers);
21fa020e 360error_alloc:
5b093681
JG
361 return false;
362}
This page took 0.077054 seconds and 4 git commands to generate.