2 * Copyright (C) 2013 - Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
30 #include <sys/resource.h>
32 #include <sys/socket.h>
34 #include <sys/types.h>
35 #include <urcu/list.h>
41 #include <urcu/compiler.h>
45 #include <common/defaults.h>
46 #include <common/common.h>
47 #include <common/consumer.h>
48 #include <common/consumer-timer.h>
49 #include <common/compat/poll.h>
50 #include <common/sessiond-comm/sessiond-comm.h>
51 #include <common/utils.h>
52 #include <common/compat/getenv.h>
54 #include "lttng-relayd.h"
55 #include "health-relayd.h"
57 /* Global health check unix path */
59 char health_unix_sock_path
[PATH_MAX
];
61 int health_quit_pipe
[2];
64 * Check if the thread quit pipe was triggered.
66 * Return 1 if it was triggered else 0;
69 int check_health_quit_pipe(int fd
, uint32_t events
)
71 if (fd
== health_quit_pipe
[0] && (events
& LPOLLIN
)) {
79 * Send data on a unix socket using the liblttsessiondcomm API.
81 * Return lttcomm error code.
83 static int send_unix_sock(int sock
, void *buf
, size_t len
)
85 /* Check valid length */
90 return lttcomm_send_unix_sock(sock
, buf
, len
);
93 static int create_lttng_rundir_with_perm(const char *rundir
)
97 DBG3("Creating LTTng run directory: %s", rundir
);
99 ret
= mkdir(rundir
, S_IRWXU
);
101 if (errno
!= EEXIST
) {
102 ERR("Unable to create %s", rundir
);
107 } else if (ret
== 0) {
108 int is_root
= !getuid();
111 ret
= chown(rundir
, 0,
112 utils_get_group_id(tracing_group_name
));
114 ERR("Unable to set group on %s", rundir
);
121 S_IRUSR
| S_IWUSR
| S_IXUSR
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
);
123 ERR("Unable to set permissions on %s", health_unix_sock_path
);
136 int parse_health_env(void)
138 const char *health_path
;
140 health_path
= lttng_secure_getenv(LTTNG_RELAYD_HEALTH_ENV
);
142 strncpy(health_unix_sock_path
, health_path
,
144 health_unix_sock_path
[PATH_MAX
- 1] = '\0';
151 int setup_health_path(void)
153 int is_root
, ret
= 0;
154 char *home_path
= NULL
, *rundir
= NULL
, *relayd_path
= NULL
;
156 ret
= parse_health_env();
164 rundir
= strdup(DEFAULT_LTTNG_RUNDIR
);
171 * Create rundir from home path. This will create something like
174 home_path
= utils_get_home_dir();
176 if (home_path
== NULL
) {
177 /* TODO: Add --socket PATH option */
178 ERR("Can't get HOME directory for sockets creation.");
183 ret
= asprintf(&rundir
, DEFAULT_LTTNG_HOME_RUNDIR
, home_path
);
190 ret
= asprintf(&relayd_path
, DEFAULT_RELAYD_PATH
, rundir
);
196 ret
= create_lttng_rundir_with_perm(rundir
);
201 ret
= create_lttng_rundir_with_perm(relayd_path
);
207 if (strlen(health_unix_sock_path
) != 0) {
210 snprintf(health_unix_sock_path
, sizeof(health_unix_sock_path
),
211 DEFAULT_GLOBAL_RELAY_HEALTH_UNIX_SOCK
,
214 /* Set health check Unix path */
215 if (strlen(health_unix_sock_path
) != 0) {
219 snprintf(health_unix_sock_path
, sizeof(health_unix_sock_path
),
220 DEFAULT_HOME_RELAY_HEALTH_UNIX_SOCK
,
221 home_path
, getpid());
231 * Thread managing health check socket.
233 void *thread_manage_health(void *data
)
235 int sock
= -1, new_sock
= -1, ret
, i
, pollfd
, err
= -1;
236 uint32_t revents
, nb_fd
;
237 struct lttng_poll_event events
;
238 struct health_comm_msg msg
;
239 struct health_comm_reply reply
;
242 DBG("[thread] Manage health check started");
246 rcu_register_thread();
248 /* We might hit an error path before this is created. */
249 lttng_poll_init(&events
);
251 /* Create unix socket */
252 sock
= lttcomm_create_unix_sock(health_unix_sock_path
);
254 ERR("Unable to create health check Unix socket");
261 /* lttng health client socket path permissions */
262 ret
= chown(health_unix_sock_path
, 0,
263 utils_get_group_id(tracing_group_name
));
265 ERR("Unable to set group on %s", health_unix_sock_path
);
271 ret
= chmod(health_unix_sock_path
,
272 S_IRUSR
| S_IWUSR
| S_IRGRP
| S_IWGRP
);
274 ERR("Unable to set permissions on %s", health_unix_sock_path
);
282 * Set the CLOEXEC flag. Return code is useless because either way, the
285 (void) utils_set_fd_cloexec(sock
);
287 ret
= lttcomm_listen_unix_sock(sock
);
292 /* Size is set to 1 for the consumer_channel pipe */
293 ret
= lttng_poll_create(&events
, 2, LTTNG_CLOEXEC
);
295 ERR("Poll set creation failed");
299 ret
= lttng_poll_add(&events
, health_quit_pipe
[0], LPOLLIN
);
304 /* Add the application registration socket */
305 ret
= lttng_poll_add(&events
, sock
, LPOLLIN
| LPOLLPRI
);
310 lttng_relay_notify_ready();
313 DBG("Health check ready");
315 /* Inifinite blocking call, waiting for transmission */
317 ret
= lttng_poll_wait(&events
, -1);
320 * Restart interrupted system call.
322 if (errno
== EINTR
) {
330 for (i
= 0; i
< nb_fd
; i
++) {
331 /* Fetch once the poll data */
332 revents
= LTTNG_POLL_GETEV(&events
, i
);
333 pollfd
= LTTNG_POLL_GETFD(&events
, i
);
336 /* No activity for this FD (poll implementation). */
340 /* Thread quit pipe has been closed. Killing thread. */
341 ret
= check_health_quit_pipe(pollfd
, revents
);
347 /* Event on the registration socket */
348 if (pollfd
== sock
) {
349 if (revents
& LPOLLIN
) {
351 } else if (revents
& (LPOLLERR
| LPOLLHUP
| LPOLLRDHUP
)) {
352 ERR("Health socket poll error");
355 ERR("Unexpected poll events %u for sock %d", revents
, pollfd
);
361 new_sock
= lttcomm_accept_unix_sock(sock
);
367 * Set the CLOEXEC flag. Return code is useless because either way, the
370 (void) utils_set_fd_cloexec(new_sock
);
372 DBG("Receiving data from client for health...");
373 ret
= lttcomm_recv_unix_sock(new_sock
, (void *)&msg
, sizeof(msg
));
375 DBG("Nothing recv() from client... continuing");
376 ret
= close(new_sock
);
386 assert(msg
.cmd
== HEALTH_CMD_CHECK
);
388 memset(&reply
, 0, sizeof(reply
));
389 for (i
= 0; i
< NR_HEALTH_RELAYD_TYPES
; i
++) {
391 * health_check_state return 0 if thread is in
394 if (!health_check_state(health_relayd
, i
)) {
395 reply
.ret_code
|= 1ULL << i
;
399 DBG2("Health check return value %" PRIx64
, reply
.ret_code
);
401 ret
= send_unix_sock(new_sock
, (void *) &reply
, sizeof(reply
));
403 ERR("Failed to send health data back to client");
406 /* End of transmission */
407 ret
= close(new_sock
);
415 lttng_relay_stop_threads();
418 ERR("Health error occurred in %s", __func__
);
420 DBG("Health check thread dying");
421 unlink(health_unix_sock_path
);
430 * We do NOT rmdir rundir nor the relayd path because there are
431 * other processes using them.
434 lttng_poll_clean(&events
);
436 rcu_unregister_thread();