2 * Copyright (C) 2018-2020 Jérémie Galarneau <jeremie.galarneau@efficios.com>
4 * SPDX-License-Identifier: GPL-2.0-only
10 #include <urcu/rculfhash.h>
17 #include <sys/types.h>
19 #include <common/defaults.h>
20 #include <common/error.h>
21 #include <common/fs-handle-internal.h>
22 #include <common/hashtable/hashtable.h>
23 #include <common/hashtable/utils.h>
24 #include <common/macros.h>
25 #include <common/optional.h>
27 #include "fd-tracker.h"
30 /* Tracker lock must be taken by the user. */
31 #define TRACKED_COUNT(tracker) \
32 (tracker->count.suspendable.active + \
33 tracker->count.suspendable.suspended + \
34 tracker->count.unsuspendable)
36 /* Tracker lock must be taken by the user. */
37 #define ACTIVE_COUNT(tracker) \
38 (tracker->count.suspendable.active + tracker->count.unsuspendable)
40 /* Tracker lock must be taken by the user. */
41 #define SUSPENDED_COUNT(tracker) (tracker->count.suspendable.suspended)
43 /* Tracker lock must be taken by the user. */
44 #define SUSPENDABLE_COUNT(tracker) \
45 (tracker->count.suspendable.active + \
46 tracker->count.suspendable.suspended)
48 /* Tracker lock must be taken by the user. */
49 #define UNSUSPENDABLE_COUNT(tracker) (tracker->count.unsuspendable)
56 unsigned int suspended
;
58 unsigned int unsuspendable
;
60 unsigned int capacity
;
64 /* Failures to suspend or restore fs handles. */
68 * The head of the active_handles list is always the least recently
69 * used active handle. When an handle is used, it is removed from the
70 * list and added to the end. When a file has to be suspended, the
71 * first element in the list is "popped", suspended, and added to the
72 * list of suspended handles.
74 struct cds_list_head active_handles
;
75 struct cds_list_head suspended_handles
;
76 struct cds_lfht
*unsuspendable_fds
;
77 struct lttng_inode_registry
*inode_registry
;
78 /* Unlinked files are moved in this directory under a unique name. */
79 struct lttng_directory_handle
*unlink_directory_handle
;
80 struct lttng_unlinked_file_pool
*unlinked_file_pool
;
83 struct open_properties
{
85 LTTNG_OPTIONAL(mode_t
) mode
;
89 * A fs_handle_tracked is not ref-counted. Therefore, it is assumed that a
90 * handle is never in-use while it is being reclaimed. It can be
91 * shared by multiple threads, but external synchronization is required
92 * to ensure it is not still being used when it is reclaimed (close method).
93 * In this respect, it is not different from a regular file descriptor.
95 * The fs_handle lock always nests _within_ the tracker's lock.
97 struct fs_handle_tracked
{
98 struct fs_handle parent
;
101 * Weak reference to the tracker. All fs_handles are assumed to have
102 * been closed at the moment of the destruction of the fd_tracker.
104 struct fd_tracker
*tracker
;
105 struct open_properties properties
;
106 struct lttng_inode
*inode
;
108 /* inode number of the file at the time of the handle's creation. */
111 /* Offset to which the file should be restored. */
113 struct cds_list_head handles_list_node
;
116 struct unsuspendable_fd
{
118 * Accesses are only performed through the tracker, which is protected
123 struct cds_lfht_node tracker_node
;
124 struct rcu_head rcu_head
;
128 pthread_mutex_t lock
;
132 .lock
= PTHREAD_MUTEX_INITIALIZER
,
133 .initialized
= false,
137 static int match_fd(struct cds_lfht_node
*node
, const void *key
);
138 static void unsuspendable_fd_destroy(struct unsuspendable_fd
*entry
);
139 static struct unsuspendable_fd
*unsuspendable_fd_create(
140 const char *name
, int fd
);
141 static int open_from_properties(const struct lttng_directory_handle
*dir_handle
,
142 const char *path
, struct open_properties
*properties
);
144 static void fs_handle_tracked_log(struct fs_handle_tracked
*handle
);
145 static int fs_handle_tracked_suspend(struct fs_handle_tracked
*handle
);
146 static int fs_handle_tracked_restore(struct fs_handle_tracked
*handle
);
147 static int fs_handle_tracked_get_fd(struct fs_handle
*_handle
);
148 static void fs_handle_tracked_put_fd(struct fs_handle
*_handle
);
149 static int fs_handle_tracked_unlink(struct fs_handle
*_handle
);
150 static int fs_handle_tracked_close(struct fs_handle
*_handle
);
152 static void fd_tracker_track(
153 struct fd_tracker
*tracker
, struct fs_handle_tracked
*handle
);
154 static void fd_tracker_untrack(
155 struct fd_tracker
*tracker
, struct fs_handle_tracked
*handle
);
156 static int fd_tracker_suspend_handles(
157 struct fd_tracker
*tracker
, unsigned int count
);
158 static int fd_tracker_restore_handle(
159 struct fd_tracker
*tracker
, struct fs_handle_tracked
*handle
);
161 /* Match function of the tracker's unsuspendable_fds hash table. */
162 static int match_fd(struct cds_lfht_node
*node
, const void *key
)
164 struct unsuspendable_fd
*entry
= caa_container_of(
165 node
, struct unsuspendable_fd
, tracker_node
);
167 return hash_match_key_ulong(
168 (void *) (unsigned long) entry
->fd
, (void *) key
);
171 static void delete_unsuspendable_fd(struct rcu_head
*head
)
173 struct unsuspendable_fd
*fd
= caa_container_of(
174 head
, struct unsuspendable_fd
, rcu_head
);
180 static void unsuspendable_fd_destroy(struct unsuspendable_fd
*entry
)
185 call_rcu(&entry
->rcu_head
, delete_unsuspendable_fd
);
188 static struct unsuspendable_fd
*unsuspendable_fd_create(
189 const char *name
, int fd
)
191 struct unsuspendable_fd
*entry
= (unsuspendable_fd
*) zmalloc(sizeof(*entry
));
197 entry
->name
= strdup(name
);
202 cds_lfht_node_init(&entry
->tracker_node
);
206 unsuspendable_fd_destroy(entry
);
210 static void fs_handle_tracked_log(struct fs_handle_tracked
*handle
)
214 pthread_mutex_lock(&handle
->lock
);
215 lttng_inode_borrow_location(handle
->inode
, NULL
, &path
);
217 if (handle
->fd
>= 0) {
218 DBG_NO_LOC(" %s [active, fd %d%s]", path
, handle
->fd
,
219 handle
->in_use
? ", in use" : "");
221 DBG_NO_LOC(" %s [suspended]", path
);
223 pthread_mutex_unlock(&handle
->lock
);
226 /* Tracker lock must be held by the caller. */
227 static int fs_handle_tracked_suspend(struct fs_handle_tracked
*handle
)
232 const struct lttng_directory_handle
*node_directory_handle
;
234 pthread_mutex_lock(&handle
->lock
);
235 lttng_inode_borrow_location(
236 handle
->inode
, &node_directory_handle
, &path
);
237 LTTNG_ASSERT(handle
->fd
>= 0);
238 if (handle
->in_use
) {
239 /* This handle can't be suspended as it is currently in use. */
244 ret
= lttng_directory_handle_stat(
245 node_directory_handle
, path
, &fs_stat
);
247 PERROR("Filesystem handle to %s cannot be suspended as stat() failed",
253 if (fs_stat
.st_ino
!= handle
->ino
) {
254 /* Don't suspend as the handle would not be restorable. */
255 WARN("Filesystem handle to %s cannot be suspended as its inode changed",
261 handle
->offset
= lseek(handle
->fd
, 0, SEEK_CUR
);
262 if (handle
->offset
== -1) {
263 WARN("Filesystem handle to %s cannot be suspended as lseek() failed to sample its current position",
269 ret
= close(handle
->fd
);
271 PERROR("Filesystem handle to %s cannot be suspended as close() failed",
276 DBG("Suspended filesystem handle to %s (fd %i) at position %" PRId64
,
277 path
, handle
->fd
, handle
->offset
);
281 handle
->tracker
->stats
.errors
++;
283 pthread_mutex_unlock(&handle
->lock
);
287 /* Caller must hold the tracker and handle's locks. */
288 static int fs_handle_tracked_restore(struct fs_handle_tracked
*handle
)
292 const struct lttng_directory_handle
*node_directory_handle
;
294 lttng_inode_borrow_location(
295 handle
->inode
, &node_directory_handle
, &path
);
297 LTTNG_ASSERT(handle
->fd
== -1);
299 ret
= open_from_properties(
300 node_directory_handle
, path
, &handle
->properties
);
302 PERROR("Failed to restore filesystem handle to %s, open() failed",
309 ret
= lseek(fd
, handle
->offset
, SEEK_SET
);
311 PERROR("Failed to restore filesystem handle to %s, lseek() failed",
316 DBG("Restored filesystem handle to %s (fd %i) at position %" PRId64
,
317 path
, fd
, handle
->offset
);
328 static int open_from_properties(const struct lttng_directory_handle
*dir_handle
,
329 const char *path
, struct open_properties
*properties
)
334 * open() ignores the 'flags' parameter unless the O_CREAT or O_TMPFILE
335 * flags are set. O_TMPFILE would not make sense in the context of a
336 * suspendable fs_handle as it would not be restorable (see OPEN(2)),
337 * thus it is ignored here.
339 if ((properties
->flags
& O_CREAT
) && properties
->mode
.is_set
) {
340 ret
= lttng_directory_handle_open_file(dir_handle
, path
,
341 properties
->flags
, properties
->mode
.value
);
343 ret
= lttng_directory_handle_open_file(dir_handle
, path
,
344 properties
->flags
, 0);
347 * Some flags should not be used beyond the initial open() of a
348 * restorable file system handle. O_CREAT and O_TRUNC must
349 * be cleared since it would be unexpected to re-use them
350 * when the handle is retored:
351 * - O_CREAT should not be needed as the file has been created
352 * on the initial call to open(),
353 * - O_TRUNC would destroy the file's contents by truncating it
356 properties
->flags
&= ~(O_CREAT
| O_TRUNC
);
365 struct fd_tracker
*fd_tracker_create(const char *unlinked_file_path
,
366 unsigned int capacity
)
368 struct fd_tracker
*tracker
= (fd_tracker
*) zmalloc(sizeof(struct fd_tracker
));
374 pthread_mutex_lock(&seed
.lock
);
375 if (!seed
.initialized
) {
376 seed
.value
= (unsigned long) time(NULL
);
377 seed
.initialized
= true;
379 pthread_mutex_unlock(&seed
.lock
);
381 CDS_INIT_LIST_HEAD(&tracker
->active_handles
);
382 CDS_INIT_LIST_HEAD(&tracker
->suspended_handles
);
383 tracker
->capacity
= capacity
;
384 tracker
->unsuspendable_fds
= cds_lfht_new(DEFAULT_HT_SIZE
, 1, 0,
385 CDS_LFHT_AUTO_RESIZE
| CDS_LFHT_ACCOUNTING
, NULL
);
386 if (!tracker
->unsuspendable_fds
) {
387 ERR("Failed to create fd-tracker's unsuspendable_fds hash table");
390 tracker
->inode_registry
= lttng_inode_registry_create();
391 if (!tracker
->inode_registry
) {
392 ERR("Failed to create fd-tracker's inode registry");
396 tracker
->unlinked_file_pool
=
397 lttng_unlinked_file_pool_create(unlinked_file_path
);
398 if (!tracker
->unlinked_file_pool
) {
401 DBG("File descriptor tracker created with a limit of %u simultaneously-opened FDs",
406 fd_tracker_destroy(tracker
);
410 void fd_tracker_log(struct fd_tracker
*tracker
)
412 struct fs_handle_tracked
*handle
;
413 struct unsuspendable_fd
*unsuspendable_fd
;
414 struct cds_lfht_iter iter
;
416 pthread_mutex_lock(&tracker
->lock
);
417 DBG_NO_LOC("File descriptor tracker");
418 DBG_NO_LOC(" Stats:");
419 DBG_NO_LOC(" uses: %" PRIu64
, tracker
->stats
.uses
);
420 DBG_NO_LOC(" misses: %" PRIu64
, tracker
->stats
.misses
);
421 DBG_NO_LOC(" errors: %" PRIu64
, tracker
->stats
.errors
);
422 DBG_NO_LOC(" Tracked: %u", TRACKED_COUNT(tracker
));
423 DBG_NO_LOC(" active: %u", ACTIVE_COUNT(tracker
));
424 DBG_NO_LOC(" suspendable: %u", SUSPENDABLE_COUNT(tracker
));
425 DBG_NO_LOC(" unsuspendable: %u", UNSUSPENDABLE_COUNT(tracker
));
426 DBG_NO_LOC(" suspended: %u", SUSPENDED_COUNT(tracker
));
427 DBG_NO_LOC(" capacity: %u", tracker
->capacity
);
429 DBG_NO_LOC(" Tracked suspendable file descriptors");
430 cds_list_for_each_entry(
431 handle
, &tracker
->active_handles
, handles_list_node
) {
432 fs_handle_tracked_log(handle
);
434 cds_list_for_each_entry(handle
, &tracker
->suspended_handles
,
436 fs_handle_tracked_log(handle
);
438 if (!SUSPENDABLE_COUNT(tracker
)) {
442 DBG_NO_LOC(" Tracked unsuspendable file descriptors");
444 cds_lfht_for_each_entry(tracker
->unsuspendable_fds
, &iter
,
445 unsuspendable_fd
, tracker_node
) {
446 DBG_NO_LOC(" %s [active, fd %d]",
447 unsuspendable_fd
->name
?: "Unnamed",
448 unsuspendable_fd
->fd
);
451 if (!UNSUSPENDABLE_COUNT(tracker
)) {
455 pthread_mutex_unlock(&tracker
->lock
);
458 int fd_tracker_destroy(struct fd_tracker
*tracker
)
466 * Refuse to destroy the tracker as fs_handles may still old
467 * weak references to the tracker.
469 pthread_mutex_lock(&tracker
->lock
);
470 if (TRACKED_COUNT(tracker
)) {
471 ERR("A file descriptor leak has been detected: %u tracked file descriptors are still being tracked",
472 TRACKED_COUNT(tracker
));
473 pthread_mutex_unlock(&tracker
->lock
);
474 fd_tracker_log(tracker
);
478 pthread_mutex_unlock(&tracker
->lock
);
480 if (tracker
->unsuspendable_fds
) {
481 ret
= cds_lfht_destroy(tracker
->unsuspendable_fds
, NULL
);
485 lttng_inode_registry_destroy(tracker
->inode_registry
);
486 lttng_unlinked_file_pool_destroy(tracker
->unlinked_file_pool
);
487 pthread_mutex_destroy(&tracker
->lock
);
493 struct fs_handle
*fd_tracker_open_fs_handle(struct fd_tracker
*tracker
,
494 struct lttng_directory_handle
*directory
,
500 struct fs_handle_tracked
*handle
= NULL
;
502 struct open_properties properties
= {
506 .value
= static_cast<mode_t
>(mode
? *mode
: 0),
510 pthread_mutex_lock(&tracker
->lock
);
511 if (ACTIVE_COUNT(tracker
) == tracker
->capacity
) {
512 if (tracker
->count
.suspendable
.active
> 0) {
513 ret
= fd_tracker_suspend_handles(tracker
, 1);
519 * There are not enough active suspendable file
520 * descriptors to open a new fd and still accommodate
521 * the tracker's capacity.
523 WARN("Cannot open file system handle, too many unsuspendable file descriptors are opened (%u)",
524 tracker
->count
.unsuspendable
);
529 handle
= (fs_handle_tracked
*) zmalloc(sizeof(*handle
));
533 handle
->parent
= (typeof(handle
->parent
)) {
534 .get_fd
= fs_handle_tracked_get_fd
,
535 .put_fd
= fs_handle_tracked_put_fd
,
536 .unlink
= fs_handle_tracked_unlink
,
537 .close
= fs_handle_tracked_close
,
540 handle
->tracker
= tracker
;
542 ret
= pthread_mutex_init(&handle
->lock
, NULL
);
544 PERROR("Failed to initialize handle mutex while creating fs handle");
545 goto error_mutex_init
;
548 handle
->fd
= open_from_properties(directory
, path
, &properties
);
549 if (handle
->fd
< 0) {
550 PERROR("Failed to open fs handle to %s, open() returned", path
);
554 handle
->properties
= properties
;
556 handle
->inode
= lttng_inode_registry_get_inode(tracker
->inode_registry
,
557 directory
, path
, handle
->fd
,
558 tracker
->unlinked_file_pool
);
559 if (!handle
->inode
) {
560 ERR("Failed to get lttng_inode corresponding to file %s", path
);
564 if (fstat(handle
->fd
, &fd_stat
)) {
565 PERROR("Failed to retrieve file descriptor inode while creating fs handle, fstat() returned");
568 handle
->ino
= fd_stat
.st_ino
;
570 fd_tracker_track(tracker
, handle
);
572 pthread_mutex_unlock(&tracker
->lock
);
573 return handle
? &handle
->parent
: NULL
;
576 lttng_inode_put(handle
->inode
);
578 pthread_mutex_destroy(&handle
->lock
);
585 /* Caller must hold the tracker's lock. */
586 static int fd_tracker_suspend_handles(
587 struct fd_tracker
*tracker
, unsigned int count
)
589 unsigned int left_to_close
= count
;
590 unsigned int attempts_left
= tracker
->count
.suspendable
.active
;
591 struct fs_handle_tracked
*handle
, *tmp
;
593 cds_list_for_each_entry_safe(handle
, tmp
, &tracker
->active_handles
,
597 fd_tracker_untrack(tracker
, handle
);
598 ret
= fs_handle_tracked_suspend(handle
);
599 fd_tracker_track(tracker
, handle
);
605 if (left_to_close
== 0 || attempts_left
== 0) {
609 return left_to_close
? -EMFILE
: 0;
612 int fd_tracker_open_unsuspendable_fd(struct fd_tracker
*tracker
,
615 unsigned int fd_count
,
619 int ret
, user_ret
, i
, fds_to_suspend
;
620 unsigned int active_fds
;
621 struct unsuspendable_fd
**entries
;
623 entries
= (unsuspendable_fd
**) zmalloc(fd_count
* sizeof(*entries
));
629 pthread_mutex_lock(&tracker
->lock
);
631 active_fds
= ACTIVE_COUNT(tracker
);
632 fds_to_suspend
= (int) active_fds
+ (int) fd_count
-
633 (int) tracker
->capacity
;
634 if (fds_to_suspend
> 0) {
635 if (fds_to_suspend
<= tracker
->count
.suspendable
.active
) {
636 ret
= fd_tracker_suspend_handles(
637 tracker
, fds_to_suspend
);
643 * There are not enough active suspendable file
644 * descriptors to open a new fd and still accommodates the
645 * tracker's capacity.
647 WARN("Cannot open unsuspendable fd, too many unsuspendable file descriptors are opened (%u)",
648 tracker
->count
.unsuspendable
);
654 user_ret
= open(user_data
, out_fds
);
661 * Add the fds returned by the user's callback to the hashtable
662 * of unsuspendable fds.
664 for (i
= 0; i
< fd_count
; i
++) {
665 struct unsuspendable_fd
*entry
= unsuspendable_fd_create(
666 names
? names
[i
] : NULL
, out_fds
[i
]);
670 goto end_free_entries
;
676 for (i
= 0; i
< fd_count
; i
++) {
677 struct cds_lfht_node
*node
;
678 struct unsuspendable_fd
*entry
= entries
[i
];
680 node
= cds_lfht_add_unique(tracker
->unsuspendable_fds
,
681 hash_key_ulong((void *) (unsigned long)
684 match_fd
, (void *) (unsigned long) out_fds
[i
],
685 &entry
->tracker_node
);
687 if (node
!= &entry
->tracker_node
) {
690 goto end_free_entries
;
694 tracker
->count
.unsuspendable
+= fd_count
;
698 pthread_mutex_unlock(&tracker
->lock
);
703 for (i
= 0; i
< fd_count
; i
++) {
704 unsuspendable_fd_destroy(entries
[i
]);
709 int fd_tracker_close_unsuspendable_fd(struct fd_tracker
*tracker
,
711 unsigned int fd_count
,
715 int i
, ret
, user_ret
;
719 * Maintain a local copy of fds_in as the user's callback may modify its
720 * contents (e.g. setting the fd(s) to -1 after close).
722 fds
= (int *) malloc(sizeof(*fds
) * fd_count
);
727 memcpy(fds
, fds_in
, sizeof(*fds
) * fd_count
);
729 pthread_mutex_lock(&tracker
->lock
);
732 /* Let the user close the file descriptors. */
733 user_ret
= close(user_data
, fds_in
);
739 /* Untrack the fds that were just closed by the user's callback. */
740 for (i
= 0; i
< fd_count
; i
++) {
741 struct cds_lfht_node
*node
;
742 struct cds_lfht_iter iter
;
743 struct unsuspendable_fd
*entry
;
745 cds_lfht_lookup(tracker
->unsuspendable_fds
,
746 hash_key_ulong((void *) (unsigned long) fds
[i
],
748 match_fd
, (void *) (unsigned long) fds
[i
],
750 node
= cds_lfht_iter_get_node(&iter
);
752 /* Unknown file descriptor. */
753 WARN("Untracked file descriptor %d passed to fd_tracker_close_unsuspendable_fd()",
758 entry
= caa_container_of(
759 node
, struct unsuspendable_fd
, tracker_node
);
761 cds_lfht_del(tracker
->unsuspendable_fds
, node
);
762 unsuspendable_fd_destroy(entry
);
766 tracker
->count
.unsuspendable
-= fd_count
;
770 pthread_mutex_unlock(&tracker
->lock
);
776 /* Caller must have taken the tracker's and handle's locks. */
777 static void fd_tracker_track(
778 struct fd_tracker
*tracker
, struct fs_handle_tracked
*handle
)
780 if (handle
->fd
>= 0) {
781 tracker
->count
.suspendable
.active
++;
782 cds_list_add_tail(&handle
->handles_list_node
,
783 &tracker
->active_handles
);
785 tracker
->count
.suspendable
.suspended
++;
786 cds_list_add_tail(&handle
->handles_list_node
,
787 &tracker
->suspended_handles
);
791 /* Caller must have taken the tracker's and handle's locks. */
792 static void fd_tracker_untrack(
793 struct fd_tracker
*tracker
, struct fs_handle_tracked
*handle
)
795 if (handle
->fd
>= 0) {
796 tracker
->count
.suspendable
.active
--;
798 tracker
->count
.suspendable
.suspended
--;
800 cds_list_del(&handle
->handles_list_node
);
803 /* Caller must have taken the tracker's and handle's locks. */
804 static int fd_tracker_restore_handle(
805 struct fd_tracker
*tracker
, struct fs_handle_tracked
*handle
)
809 fd_tracker_untrack(tracker
, handle
);
810 if (ACTIVE_COUNT(tracker
) >= tracker
->capacity
) {
811 ret
= fd_tracker_suspend_handles(tracker
, 1);
816 ret
= fs_handle_tracked_restore(handle
);
818 fd_tracker_track(tracker
, handle
);
819 return ret
? ret
: handle
->fd
;
822 static int fs_handle_tracked_get_fd(struct fs_handle
*_handle
)
825 struct fs_handle_tracked
*handle
=
826 container_of(_handle
, struct fs_handle_tracked
, parent
);
829 * TODO This should be optimized as it is a fairly hot path.
830 * The fd-tracker's lock should only be taken when a fs_handle is
831 * restored (slow path). On the fast path (fs_handle is active),
832 * the only effect on the fd_tracker is marking the handle as the
833 * most recently used. Currently, it is done by a call to the
834 * track/untrack helpers, but it should be done atomically.
836 * Note that the lock's nesting order must still be respected here.
837 * The handle's lock nests inside the tracker's lock.
839 pthread_mutex_lock(&handle
->tracker
->lock
);
840 pthread_mutex_lock(&handle
->lock
);
841 LTTNG_ASSERT(!handle
->in_use
);
843 handle
->tracker
->stats
.uses
++;
844 if (handle
->fd
>= 0) {
846 /* Mark as most recently used. */
847 fd_tracker_untrack(handle
->tracker
, handle
);
848 fd_tracker_track(handle
->tracker
, handle
);
850 handle
->tracker
->stats
.misses
++;
851 ret
= fd_tracker_restore_handle(handle
->tracker
, handle
);
853 handle
->tracker
->stats
.errors
++;
857 handle
->in_use
= true;
859 pthread_mutex_unlock(&handle
->lock
);
860 pthread_mutex_unlock(&handle
->tracker
->lock
);
864 static void fs_handle_tracked_put_fd(struct fs_handle
*_handle
)
866 struct fs_handle_tracked
*handle
=
867 container_of(_handle
, struct fs_handle_tracked
, parent
);
869 pthread_mutex_lock(&handle
->lock
);
870 handle
->in_use
= false;
871 pthread_mutex_unlock(&handle
->lock
);
874 static int fs_handle_tracked_unlink(struct fs_handle
*_handle
)
877 struct fs_handle_tracked
*handle
=
878 container_of(_handle
, struct fs_handle_tracked
, parent
);
880 pthread_mutex_lock(&handle
->tracker
->lock
);
881 pthread_mutex_lock(&handle
->lock
);
882 ret
= lttng_inode_unlink(handle
->inode
);
883 pthread_mutex_unlock(&handle
->lock
);
884 pthread_mutex_unlock(&handle
->tracker
->lock
);
888 static int fs_handle_tracked_close(struct fs_handle
*_handle
)
891 const char *path
= NULL
;
892 struct fs_handle_tracked
*handle
=
893 container_of(_handle
, struct fs_handle_tracked
, parent
);
894 struct lttng_directory_handle
*inode_directory_handle
= NULL
;
901 pthread_mutex_lock(&handle
->tracker
->lock
);
902 pthread_mutex_lock(&handle
->lock
);
904 lttng_inode_borrow_location(handle
->inode
, NULL
, &path
);
906 * Here a reference to the inode's directory handle is acquired
907 * to prevent the last reference to it from being released while
908 * the tracker's lock is taken.
910 * If this wasn't done, the directory handle could attempt to
911 * close its underlying directory file descriptor, which would
912 * attempt to lock the tracker's lock, resulting in a deadlock.
914 * Since a new reference to the directory handle is taken within
915 * the scope of this function, it is not possible for the last
916 * reference to the inode's location directory handle to be
917 * released during the call to lttng_inode_put().
919 * We wait until the tracker's lock is released to release the
920 * reference. Hence, the call to the tracker is delayed just
921 * enough to not attempt to recursively acquire the tracker's
924 inode_directory_handle
=
925 lttng_inode_get_location_directory_handle(
928 fd_tracker_untrack(handle
->tracker
, handle
);
929 if (handle
->fd
>= 0) {
931 * The return value of close() is not propagated as there
932 * isn't much the user can do about it.
934 if (close(handle
->fd
)) {
935 PERROR("Failed to close the file descriptor (%d) of fs handle to %s, close() returned",
936 handle
->fd
, path
? path
: "Unknown");
941 lttng_inode_put(handle
->inode
);
943 pthread_mutex_unlock(&handle
->lock
);
944 pthread_mutex_destroy(&handle
->lock
);
945 pthread_mutex_unlock(&handle
->tracker
->lock
);
947 lttng_directory_handle_put(inode_directory_handle
);