2
* RRDTool - src/rrd_daemon.c
3
* Copyright (C) 2008,2009 Florian octo Forster
4
* Copyright (C) 2008,2009 Kevin Brintnall
6
* This program is free software; you can redistribute it and/or modify it
7
* under the terms of the GNU General Public License as published by the
8
* Free Software Foundation; only version 2 of the License is applicable.
10
* This program is distributed in the hope that it will be useful, but
11
* WITHOUT ANY WARRANTY; without even the implied warranty of
12
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13
* General Public License for more details.
15
* You should have received a copy of the GNU General Public License along
16
* with this program; if not, write to the Free Software Foundation, Inc.,
17
* 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20
* Florian octo Forster <octo at verplant.org>
21
* kevin brintnall <kbrint@rufus.net>
26
* First tell the compiler to stick to the C99 and POSIX standards as close as
29
#ifndef __STRICT_ANSI__ /* {{{ */
30
# define __STRICT_ANSI__
33
#ifndef _ISOC99_SOURCE
34
# define _ISOC99_SOURCE
37
#ifdef _POSIX_C_SOURCE
38
# undef _POSIX_C_SOURCE
40
#define _POSIX_C_SOURCE 200112L
42
/* Single UNIX needed for strdup. */
46
#define _XOPEN_SOURCE 500
63
* Now for some includes..
66
#if defined(_WIN32) && !defined(__CYGWIN__) && !defined(__CYGWIN32__) && !defined(HAVE_CONFIG_H)
67
#include "../win32/config.h"
70
#include "../rrd_config.h"
75
#include "rrd_client.h"
86
#include <sys/socket.h>
94
#include <sys/types.h>
106
#include <sys/time.h>
111
#include <glib-2.0/glib.h>
114
#define RRDD_LOG(severity, ...) \
116
if (stay_foreground) \
117
fprintf(stderr, __VA_ARGS__); \
118
syslog ((severity), __VA_ARGS__); \
122
# define __attribute__(x) /**/
128
typedef enum { RESP_ERR = -1, RESP_OK = 0 } response_code;
130
struct listen_socket_s
133
char addr[PATH_MAX + 1];
136
/* state for BATCH processing */
148
uint32_t permissions;
151
mode_t socket_permissions;
153
typedef struct listen_socket_s listen_socket_t;
156
typedef struct command_s command_t;
157
/* note: guard against "unused" warnings in the handlers */
158
#define DISPATCH_PROTO listen_socket_t *sock __attribute__((unused)),\
159
time_t now __attribute__((unused)),\
160
char *buffer __attribute__((unused)),\
161
size_t buffer_size __attribute__((unused))
163
#define HANDLER_PROTO command_t *cmd __attribute__((unused)),\
168
int (*handler)(HANDLER_PROTO);
170
char context; /* where we expect to see it */
171
#define CMD_CONTEXT_CLIENT (1<<0)
172
#define CMD_CONTEXT_BATCH (1<<1)
173
#define CMD_CONTEXT_JOURNAL (1<<2)
174
#define CMD_CONTEXT_ANY (0x7f)
181
typedef struct cache_item_s cache_item_t;
187
time_t last_flush_time;
188
time_t last_update_stamp;
189
#define CI_FLAGS_IN_TREE (1<<0)
190
#define CI_FLAGS_IN_QUEUE (1<<1)
192
pthread_cond_t flushed;
197
struct callback_flush_data_s
204
typedef struct callback_flush_data_s callback_flush_data_t;
211
typedef enum queue_side_e queue_side_t;
213
/* describe a set of journal files */
219
/* max length of socket command or response */
221
#define RBUF_SIZE (CMD_MAX*2)
226
static int stay_foreground = 0;
227
static uid_t daemon_uid;
229
static listen_socket_t *listen_fds = NULL;
230
static size_t listen_fds_num = 0;
233
RUNNING, /* normal operation */
234
FLUSHING, /* flushing remaining values */
235
SHUTDOWN /* shutting down */
238
static pthread_t *queue_threads;
239
static pthread_cond_t queue_cond = PTHREAD_COND_INITIALIZER;
240
static int config_queue_threads = 4;
242
static pthread_t flush_thread;
243
static pthread_cond_t flush_cond = PTHREAD_COND_INITIALIZER;
245
static pthread_mutex_t connection_threads_lock = PTHREAD_MUTEX_INITIALIZER;
246
static pthread_cond_t connection_threads_done = PTHREAD_COND_INITIALIZER;
247
static int connection_threads_num = 0;
250
static GTree *cache_tree = NULL;
251
static cache_item_t *cache_queue_head = NULL;
252
static cache_item_t *cache_queue_tail = NULL;
253
static pthread_mutex_t cache_lock = PTHREAD_MUTEX_INITIALIZER;
255
static int config_write_interval = 300;
256
static int config_write_jitter = 0;
257
static int config_flush_interval = 3600;
258
static int config_flush_at_shutdown = 0;
259
static char *config_pid_file = NULL;
260
static char *config_base_dir = NULL;
261
static size_t _config_base_dir_len = 0;
262
static int config_write_base_only = 0;
264
static listen_socket_t **config_listen_address_list = NULL;
265
static size_t config_listen_address_list_len = 0;
267
static uint64_t stats_queue_length = 0;
268
static uint64_t stats_updates_received = 0;
269
static uint64_t stats_flush_received = 0;
270
static uint64_t stats_updates_written = 0;
271
static uint64_t stats_data_sets_written = 0;
272
static uint64_t stats_journal_bytes = 0;
273
static uint64_t stats_journal_rotate = 0;
274
static pthread_mutex_t stats_lock = PTHREAD_MUTEX_INITIALIZER;
276
/* Journaled updates */
277
#define JOURNAL_REPLAY(s) ((s) == NULL)
278
#define JOURNAL_BASE "rrd.journal"
279
static journal_set *journal_cur = NULL;
280
static journal_set *journal_old = NULL;
281
static char *journal_dir = NULL;
282
static FILE *journal_fh = NULL; /* current journal file handle */
283
static long journal_size = 0; /* current journal size */
284
#define JOURNAL_MAX (1 * 1024 * 1024 * 1024)
285
static pthread_mutex_t journal_lock = PTHREAD_MUTEX_INITIALIZER;
286
static int journal_write(char *cmd, char *args);
287
static void journal_done(void);
288
static void journal_rotate(void);
290
/* prototypes for forward refernces */
291
static int handle_request_help (HANDLER_PROTO);
296
static void sig_common (const char *sig) /* {{{ */
298
RRDD_LOG(LOG_NOTICE, "caught SIG%s", sig);
300
pthread_cond_broadcast(&flush_cond);
301
pthread_cond_broadcast(&queue_cond);
302
} /* }}} void sig_common */
304
static void sig_int_handler (int s __attribute__((unused))) /* {{{ */
307
} /* }}} void sig_int_handler */
309
static void sig_term_handler (int s __attribute__((unused))) /* {{{ */
312
} /* }}} void sig_term_handler */
314
static void sig_usr1_handler (int s __attribute__((unused))) /* {{{ */
316
config_flush_at_shutdown = 1;
318
} /* }}} void sig_usr1_handler */
320
static void sig_usr2_handler (int s __attribute__((unused))) /* {{{ */
322
config_flush_at_shutdown = 0;
324
} /* }}} void sig_usr2_handler */
326
static void install_signal_handlers(void) /* {{{ */
328
/* These structures are static, because `sigaction' behaves weird if the are
330
static struct sigaction sa_int;
331
static struct sigaction sa_term;
332
static struct sigaction sa_pipe;
333
static struct sigaction sa_usr1;
334
static struct sigaction sa_usr2;
336
/* Install signal handlers */
337
memset (&sa_int, 0, sizeof (sa_int));
338
sa_int.sa_handler = sig_int_handler;
339
sigaction (SIGINT, &sa_int, NULL);
341
memset (&sa_term, 0, sizeof (sa_term));
342
sa_term.sa_handler = sig_term_handler;
343
sigaction (SIGTERM, &sa_term, NULL);
345
memset (&sa_pipe, 0, sizeof (sa_pipe));
346
sa_pipe.sa_handler = SIG_IGN;
347
sigaction (SIGPIPE, &sa_pipe, NULL);
349
memset (&sa_pipe, 0, sizeof (sa_usr1));
350
sa_usr1.sa_handler = sig_usr1_handler;
351
sigaction (SIGUSR1, &sa_usr1, NULL);
353
memset (&sa_usr2, 0, sizeof (sa_usr2));
354
sa_usr2.sa_handler = sig_usr2_handler;
355
sigaction (SIGUSR2, &sa_usr2, NULL);
357
} /* }}} void install_signal_handlers */
359
static int open_pidfile(char *action, int oflag) /* {{{ */
363
char *file_copy, *dir;
365
file = (config_pid_file != NULL)
367
: LOCALSTATEDIR "/run/rrdcached.pid";
369
/* dirname may modify its argument */
370
file_copy = strdup(file);
371
if (file_copy == NULL)
373
fprintf(stderr, "rrdcached: strdup(): %s\n",
374
rrd_strerror(errno));
378
dir = dirname(file_copy);
379
if (rrd_mkdir_p(dir, 0777) != 0)
381
fprintf(stderr, "Failed to create pidfile directory '%s': %s\n",
382
dir, rrd_strerror(errno));
388
fd = open(file, oflag, S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH);
390
fprintf(stderr, "rrdcached: can't %s pid file '%s' (%s)\n",
391
action, file, rrd_strerror(errno));
394
} /* }}} static int open_pidfile */
396
/* check existing pid file to see whether a daemon is running */
397
static int check_pidfile(void)
403
pid_fd = open_pidfile("open", O_RDWR);
407
if (read(pid_fd, pid_str, sizeof(pid_str)) <= 0)
414
/* another running process that we can signal COULD be
415
* a competing rrdcached */
416
if (pid != getpid() && kill(pid, 0) == 0)
419
"FATAL: Another rrdcached daemon is running?? (pid %d)\n", pid);
424
lseek(pid_fd, 0, SEEK_SET);
425
if (ftruncate(pid_fd, 0) == -1)
428
"FATAL: Faild to truncate stale PID file. (pid %d)\n", pid);
434
"rrdcached: removed stale PID file (no rrdcached on pid %d)\n"
435
"rrdcached: starting normally.\n", pid);
438
} /* }}} static int check_pidfile */
440
static int write_pidfile (int fd) /* {{{ */
447
fh = fdopen (fd, "w");
450
RRDD_LOG (LOG_ERR, "write_pidfile: fdopen() failed.");
455
fprintf (fh, "%i\n", (int) pid);
459
} /* }}} int write_pidfile */
461
static int remove_pidfile (void) /* {{{ */
466
file = (config_pid_file != NULL)
468
: LOCALSTATEDIR "/run/rrdcached.pid";
470
status = unlink (file);
474
} /* }}} int remove_pidfile */
476
static char *next_cmd (listen_socket_t *sock, ssize_t *len) /* {{{ */
480
eol = memchr(sock->rbuf + sock->next_cmd, '\n',
481
sock->next_read - sock->next_cmd);
485
/* no commands left, move remainder back to front of rbuf */
486
memmove(sock->rbuf, sock->rbuf + sock->next_cmd,
487
sock->next_read - sock->next_cmd);
488
sock->next_read -= sock->next_cmd;
495
char *cmd = sock->rbuf + sock->next_cmd;
498
sock->next_cmd = eol - sock->rbuf + 1;
500
if (eol > sock->rbuf && *(eol-1) == '\r')
501
*(--eol) = '\0'; /* handle "\r\n" EOL */
510
} /* }}} char *next_cmd */
512
/* add the characters directly to the write buffer */
513
static int add_to_wbuf(listen_socket_t *sock, char *str, size_t len) /* {{{ */
517
assert(sock != NULL);
519
new_buf = rrd_realloc(sock->wbuf, sock->wbuf_len + len + 1);
522
RRDD_LOG(LOG_ERR, "add_to_wbuf: realloc failed");
526
strncpy(new_buf + sock->wbuf_len, str, len + 1);
528
sock->wbuf = new_buf;
529
sock->wbuf_len += len;
532
} /* }}} static int add_to_wbuf */
534
/* add the text to the "extra" info that's sent after the status line */
535
static int add_response_info(listen_socket_t *sock, char *fmt, ...) /* {{{ */
538
char buffer[CMD_MAX];
541
if (JOURNAL_REPLAY(sock)) return 0;
542
if (sock->batch_start) return 0; /* no extra info returned when in BATCH */
545
#ifdef HAVE_VSNPRINTF
546
len = vsnprintf(buffer, sizeof(buffer), fmt, argp);
548
len = vsprintf(buffer, fmt, argp);
553
RRDD_LOG(LOG_ERR, "add_response_info: vnsprintf failed");
557
return add_to_wbuf(sock, buffer, len);
558
} /* }}} static int add_response_info */
560
static int count_lines(char *str) /* {{{ */
566
while ((str = strchr(str, '\n')) != NULL)
574
} /* }}} static int count_lines */
576
/* send the response back to the user.
577
* returns 0 on success, -1 on error
578
* write buffer is always zeroed after this call */
579
static int send_response (listen_socket_t *sock, response_code rc,
580
char *fmt, ...) /* {{{ */
583
char buffer[CMD_MAX];
588
if (JOURNAL_REPLAY(sock)) return rc;
590
if (sock->batch_start)
593
return rc; /* no response on success during BATCH */
594
lines = sock->batch_cmd;
596
else if (rc == RESP_OK)
597
lines = count_lines(sock->wbuf);
601
rclen = sprintf(buffer, "%d ", lines);
603
#ifdef HAVE_VSNPRINTF
604
len = vsnprintf(buffer+rclen, sizeof(buffer)-rclen, fmt, argp);
606
len = vsprintf(buffer+rclen, fmt, argp);
614
/* append the result to the wbuf, don't write to the user */
615
if (sock->batch_start)
616
return add_to_wbuf(sock, buffer, len);
618
/* first write must be complete */
619
if (len != write(sock->fd, buffer, len))
621
RRDD_LOG(LOG_INFO, "send_response: could not write status message");
625
if (sock->wbuf != NULL && rc == RESP_OK)
628
while (wrote < sock->wbuf_len)
630
ssize_t wb = write(sock->fd, sock->wbuf + wrote, sock->wbuf_len - wrote);
633
RRDD_LOG(LOG_INFO, "send_response: could not write results");
640
free(sock->wbuf); sock->wbuf = NULL;
646
static void wipe_ci_values(cache_item_t *ci, time_t when)
651
ci->last_flush_time = when;
652
if (config_write_jitter > 0)
653
ci->last_flush_time += (rrd_random() % config_write_jitter);
657
* remove a "cache_item_t" item from the queue.
658
* must hold 'cache_lock' when calling this
660
static void remove_from_queue(cache_item_t *ci) /* {{{ */
662
if (ci == NULL) return;
663
if ((ci->flags & CI_FLAGS_IN_QUEUE) == 0) return; /* not queued */
665
if (ci->prev == NULL)
666
cache_queue_head = ci->next; /* reset head */
668
ci->prev->next = ci->next;
670
if (ci->next == NULL)
671
cache_queue_tail = ci->prev; /* reset the tail */
673
ci->next->prev = ci->prev;
675
ci->next = ci->prev = NULL;
676
ci->flags &= ~CI_FLAGS_IN_QUEUE;
678
pthread_mutex_lock (&stats_lock);
679
assert (stats_queue_length > 0);
680
stats_queue_length--;
681
pthread_mutex_unlock (&stats_lock);
683
} /* }}} static void remove_from_queue */
685
/* free the resources associated with the cache_item_t
686
* must hold cache_lock when calling this function
688
static void *free_cache_item(cache_item_t *ci) /* {{{ */
690
if (ci == NULL) return NULL;
692
remove_from_queue(ci);
694
for (size_t i=0; i < ci->values_num; i++)
700
/* in case anyone is waiting */
701
pthread_cond_broadcast(&ci->flushed);
702
pthread_cond_destroy(&ci->flushed);
707
} /* }}} static void *free_cache_item */
710
* enqueue_cache_item:
711
* `cache_lock' must be acquired before calling this function!
713
static int enqueue_cache_item (cache_item_t *ci, /* {{{ */
719
if (ci->values_num == 0)
724
if (cache_queue_head == ci)
727
/* remove if further down in queue */
728
remove_from_queue(ci);
731
ci->next = cache_queue_head;
732
if (ci->next != NULL)
734
cache_queue_head = ci;
736
if (cache_queue_tail == NULL)
737
cache_queue_tail = cache_queue_head;
739
else /* (side == TAIL) */
741
/* We don't move values back in the list.. */
742
if (ci->flags & CI_FLAGS_IN_QUEUE)
745
assert (ci->next == NULL);
746
assert (ci->prev == NULL);
748
ci->prev = cache_queue_tail;
750
if (cache_queue_tail == NULL)
751
cache_queue_head = ci;
753
cache_queue_tail->next = ci;
755
cache_queue_tail = ci;
758
ci->flags |= CI_FLAGS_IN_QUEUE;
760
pthread_cond_signal(&queue_cond);
761
pthread_mutex_lock (&stats_lock);
762
stats_queue_length++;
763
pthread_mutex_unlock (&stats_lock);
766
} /* }}} int enqueue_cache_item */
769
* tree_callback_flush:
770
* Called via `g_tree_foreach' in `flush_thread_main'. `cache_lock' is held
771
* while this is in progress.
773
static gboolean tree_callback_flush (gpointer key, gpointer value, /* {{{ */
777
callback_flush_data_t *cfd;
779
ci = (cache_item_t *) value;
780
cfd = (callback_flush_data_t *) data;
782
if (ci->flags & CI_FLAGS_IN_QUEUE)
785
if (ci->values_num > 0
786
&& (ci->last_flush_time <= cfd->abs_timeout || state != RUNNING))
788
enqueue_cache_item (ci, TAIL);
790
else if (((cfd->now - ci->last_flush_time) >= config_flush_interval)
791
&& (ci->values_num <= 0))
793
assert ((char *) key == ci->file);
794
if (!rrd_add_ptr((void ***)&cfd->keys, &cfd->keys_num, (void *)key))
796
RRDD_LOG (LOG_ERR, "tree_callback_flush: rrd_add_ptrs failed.");
802
} /* }}} gboolean tree_callback_flush */
804
static int flush_old_values (int max_age)
806
callback_flush_data_t cfd;
809
memset (&cfd, 0, sizeof (cfd));
810
/* Pass the current time as user data so that we don't need to call
811
* `time' for each node. */
812
cfd.now = time (NULL);
817
cfd.abs_timeout = cfd.now - max_age;
819
cfd.abs_timeout = cfd.now + 2*config_write_jitter + 1;
821
/* `tree_callback_flush' will return the keys of all values that haven't
822
* been touched in the last `config_flush_interval' seconds in `cfd'.
823
* The char*'s in this array point to the same memory as ci->file, so we
824
* don't need to free them separately. */
825
g_tree_foreach (cache_tree, tree_callback_flush, (gpointer) &cfd);
827
for (k = 0; k < cfd.keys_num; k++)
829
gboolean status = g_tree_remove(cache_tree, cfd.keys[k]);
830
/* should never fail, since we have held the cache_lock
832
assert(status == TRUE);
835
if (cfd.keys != NULL)
842
} /* int flush_old_values */
844
static void *flush_thread_main (void *args __attribute__((unused))) /* {{{ */
847
struct timespec next_flush;
850
gettimeofday (&now, NULL);
851
next_flush.tv_sec = now.tv_sec + config_flush_interval;
852
next_flush.tv_nsec = 1000 * now.tv_usec;
854
pthread_mutex_lock(&cache_lock);
856
while (state == RUNNING)
858
gettimeofday (&now, NULL);
859
if ((now.tv_sec > next_flush.tv_sec)
860
|| ((now.tv_sec == next_flush.tv_sec)
861
&& ((1000 * now.tv_usec) > next_flush.tv_nsec)))
863
RRDD_LOG(LOG_DEBUG, "flushing old values");
865
/* Determine the time of the next cache flush. */
866
next_flush.tv_sec = now.tv_sec + config_flush_interval;
868
/* Flush all values that haven't been written in the last
869
* `config_write_interval' seconds. */
870
flush_old_values (config_write_interval);
872
/* unlock the cache while we rotate so we don't block incoming
873
* updates if the fsync() blocks on disk I/O */
874
pthread_mutex_unlock(&cache_lock);
876
pthread_mutex_lock(&cache_lock);
879
status = pthread_cond_timedwait(&flush_cond, &cache_lock, &next_flush);
880
if (status != 0 && status != ETIMEDOUT)
882
RRDD_LOG (LOG_ERR, "flush_thread_main: "
883
"pthread_cond_timedwait returned %i.", status);
887
if (config_flush_at_shutdown)
888
flush_old_values (-1); /* flush everything */
892
pthread_mutex_unlock(&cache_lock);
895
} /* void *flush_thread_main */
897
static void *queue_thread_main (void *args __attribute__((unused))) /* {{{ */
899
pthread_mutex_lock (&cache_lock);
901
while (state != SHUTDOWN
902
|| (cache_queue_head != NULL && config_flush_at_shutdown))
910
/* Now, check if there's something to store away. If not, wait until
911
* something comes in. */
912
if (cache_queue_head == NULL)
914
status = pthread_cond_wait (&queue_cond, &cache_lock);
915
if ((status != 0) && (status != ETIMEDOUT))
917
RRDD_LOG (LOG_ERR, "queue_thread_main: "
918
"pthread_cond_wait returned %i.", status);
922
/* Check if a value has arrived. This may be NULL if we timed out or there
923
* was an interrupt such as a signal. */
924
if (cache_queue_head == NULL)
927
ci = cache_queue_head;
929
/* copy the relevant parts */
930
file = strdup (ci->file);
933
RRDD_LOG (LOG_ERR, "queue_thread_main: strdup failed.");
937
assert(ci->values != NULL);
938
assert(ci->values_num > 0);
941
values_num = ci->values_num;
943
wipe_ci_values(ci, time(NULL));
944
remove_from_queue(ci);
946
pthread_mutex_unlock (&cache_lock);
949
status = rrd_update_r (file, NULL, (int) values_num, (void *) values);
952
RRDD_LOG (LOG_NOTICE, "queue_thread_main: "
953
"rrd_update_r (%s) failed with status %i. (%s)",
954
file, status, rrd_get_error());
957
journal_write("wrote", file);
959
/* Search again in the tree. It's possible someone issued a "FORGET"
960
* while we were writing the update values. */
961
pthread_mutex_lock(&cache_lock);
962
ci = (cache_item_t *) g_tree_lookup(cache_tree, file);
964
pthread_cond_broadcast(&ci->flushed);
965
pthread_mutex_unlock(&cache_lock);
969
pthread_mutex_lock (&stats_lock);
970
stats_updates_written++;
971
stats_data_sets_written += values_num;
972
pthread_mutex_unlock (&stats_lock);
975
rrd_free_ptrs((void ***) &values, &values_num);
978
pthread_mutex_lock (&cache_lock);
980
pthread_mutex_unlock (&cache_lock);
983
} /* }}} void *queue_thread_main */
985
static int buffer_get_field (char **buffer_ret, /* {{{ */
986
size_t *buffer_size_ret, char **field_ret)
995
buffer = *buffer_ret;
997
buffer_size = *buffer_size_ret;
1001
if (buffer_size <= 0)
1004
/* This is ensured by `handle_request'. */
1005
assert (buffer[buffer_size - 1] == '\0');
1008
while (buffer_pos < buffer_size)
1010
/* Check for end-of-field or end-of-buffer */
1011
if (buffer[buffer_pos] == ' ' || buffer[buffer_pos] == '\0')
1013
field[field_size] = 0;
1019
/* Handle escaped characters. */
1020
else if (buffer[buffer_pos] == '\\')
1022
if (buffer_pos >= (buffer_size - 1))
1025
field[field_size] = buffer[buffer_pos];
1029
/* Normal operation */
1032
field[field_size] = buffer[buffer_pos];
1036
} /* while (buffer_pos < buffer_size) */
1041
*buffer_ret = buffer + buffer_pos;
1042
*buffer_size_ret = buffer_size - buffer_pos;
1046
} /* }}} int buffer_get_field */
1048
/* if we're restricting writes to the base directory,
1049
* check whether the file falls within the dir
1050
* returns 1 if OK, otherwise 0
1052
static int check_file_access (const char *file, listen_socket_t *sock) /* {{{ */
1054
assert(file != NULL);
1056
if (!config_write_base_only
1057
|| JOURNAL_REPLAY(sock)
1058
|| config_base_dir == NULL)
1061
if (strstr(file, "../") != NULL) goto err;
1063
/* relative paths without "../" are ok */
1064
if (*file != '/') return 1;
1066
/* file must be of the format base + "/" + <1+ char filename> */
1067
if (strlen(file) < _config_base_dir_len + 2) goto err;
1068
if (strncmp(file, config_base_dir, _config_base_dir_len) != 0) goto err;
1069
if (*(file + _config_base_dir_len) != '/') goto err;
1074
if (sock != NULL && sock->fd >= 0)
1075
send_response(sock, RESP_ERR, "%s\n", rrd_strerror(EACCES));
1078
} /* }}} static int check_file_access */
1080
/* when using a base dir, convert relative paths to absolute paths.
1081
* if necessary, modifies the "filename" pointer to point
1082
* to the new path created in "tmp". "tmp" is provided
1083
* by the caller and sizeof(tmp) must be >= PATH_MAX.
1085
* this allows us to optimize for the expected case (absolute path)
1088
static void get_abs_path(char **filename, char *tmp)
1090
assert(tmp != NULL);
1091
assert(filename != NULL && *filename != NULL);
1093
if (config_base_dir == NULL || **filename == '/')
1096
snprintf(tmp, PATH_MAX, "%s/%s", config_base_dir, *filename);
1098
} /* }}} static int get_abs_path */
1100
static int flush_file (const char *filename) /* {{{ */
1104
pthread_mutex_lock (&cache_lock);
1106
ci = (cache_item_t *) g_tree_lookup (cache_tree, filename);
1109
pthread_mutex_unlock (&cache_lock);
1113
if (ci->values_num > 0)
1115
/* Enqueue at head */
1116
enqueue_cache_item (ci, HEAD);
1117
pthread_cond_wait(&ci->flushed, &cache_lock);
1120
/* DO NOT DO ANYTHING WITH ci HERE!! The entry
1121
* may have been purged during our cond_wait() */
1123
pthread_mutex_unlock(&cache_lock);
1126
} /* }}} int flush_file */
1128
static int syntax_error(listen_socket_t *sock, command_t *cmd) /* {{{ */
1130
char *err = "Syntax error.\n";
1132
if (cmd && cmd->syntax)
1135
return send_response(sock, RESP_ERR, "Usage: %s", err);
1136
} /* }}} static int syntax_error() */
1138
static int handle_request_stats (HANDLER_PROTO) /* {{{ */
1140
uint64_t copy_queue_length;
1141
uint64_t copy_updates_received;
1142
uint64_t copy_flush_received;
1143
uint64_t copy_updates_written;
1144
uint64_t copy_data_sets_written;
1145
uint64_t copy_journal_bytes;
1146
uint64_t copy_journal_rotate;
1148
uint64_t tree_nodes_number;
1149
uint64_t tree_depth;
1151
pthread_mutex_lock (&stats_lock);
1152
copy_queue_length = stats_queue_length;
1153
copy_updates_received = stats_updates_received;
1154
copy_flush_received = stats_flush_received;
1155
copy_updates_written = stats_updates_written;
1156
copy_data_sets_written = stats_data_sets_written;
1157
copy_journal_bytes = stats_journal_bytes;
1158
copy_journal_rotate = stats_journal_rotate;
1159
pthread_mutex_unlock (&stats_lock);
1161
pthread_mutex_lock (&cache_lock);
1162
tree_nodes_number = (uint64_t) g_tree_nnodes (cache_tree);
1163
tree_depth = (uint64_t) g_tree_height (cache_tree);
1164
pthread_mutex_unlock (&cache_lock);
1166
add_response_info(sock,
1167
"QueueLength: %"PRIu64"\n", copy_queue_length);
1168
add_response_info(sock,
1169
"UpdatesReceived: %"PRIu64"\n", copy_updates_received);
1170
add_response_info(sock,
1171
"FlushesReceived: %"PRIu64"\n", copy_flush_received);
1172
add_response_info(sock,
1173
"UpdatesWritten: %"PRIu64"\n", copy_updates_written);
1174
add_response_info(sock,
1175
"DataSetsWritten: %"PRIu64"\n", copy_data_sets_written);
1176
add_response_info(sock, "TreeNodesNumber: %"PRIu64"\n", tree_nodes_number);
1177
add_response_info(sock, "TreeDepth: %"PRIu64"\n", tree_depth);
1178
add_response_info(sock, "JournalBytes: %"PRIu64"\n", copy_journal_bytes);
1179
add_response_info(sock, "JournalRotate: %"PRIu64"\n", copy_journal_rotate);
1181
send_response(sock, RESP_OK, "Statistics follow\n");
1184
} /* }}} int handle_request_stats */
1186
static int handle_request_flush (HANDLER_PROTO) /* {{{ */
1188
char *file, file_tmp[PATH_MAX];
1191
status = buffer_get_field (&buffer, &buffer_size, &file);
1194
return syntax_error(sock,cmd);
1198
pthread_mutex_lock(&stats_lock);
1199
stats_flush_received++;
1200
pthread_mutex_unlock(&stats_lock);
1202
get_abs_path(&file, file_tmp);
1203
if (!check_file_access(file, sock)) return 0;
1205
status = flush_file (file);
1207
return send_response(sock, RESP_OK, "Successfully flushed %s.\n", file);
1208
else if (status == ENOENT)
1210
/* no file in our tree; see whether it exists at all */
1211
struct stat statbuf;
1213
memset(&statbuf, 0, sizeof(statbuf));
1214
if (stat(file, &statbuf) == 0 && S_ISREG(statbuf.st_mode))
1215
return send_response(sock, RESP_OK, "Nothing to flush: %s.\n", file);
1217
return send_response(sock, RESP_ERR, "No such file: %s.\n", file);
1219
else if (status < 0)
1220
return send_response(sock, RESP_ERR, "Internal error.\n");
1222
return send_response(sock, RESP_ERR, "Failed with status %i.\n", status);
1227
} /* }}} int handle_request_flush */
1229
static int handle_request_flushall(HANDLER_PROTO) /* {{{ */
1231
RRDD_LOG(LOG_DEBUG, "Received FLUSHALL");
1233
pthread_mutex_lock(&cache_lock);
1234
flush_old_values(-1);
1235
pthread_mutex_unlock(&cache_lock);
1237
return send_response(sock, RESP_OK, "Started flush.\n");
1238
} /* }}} static int handle_request_flushall */
1240
static int handle_request_pending(HANDLER_PROTO) /* {{{ */
1243
char *file, file_tmp[PATH_MAX];
1246
status = buffer_get_field(&buffer, &buffer_size, &file);
1248
return syntax_error(sock,cmd);
1250
get_abs_path(&file, file_tmp);
1252
pthread_mutex_lock(&cache_lock);
1253
ci = g_tree_lookup(cache_tree, file);
1256
pthread_mutex_unlock(&cache_lock);
1257
return send_response(sock, RESP_ERR, "%s\n", rrd_strerror(ENOENT));
1260
for (size_t i=0; i < ci->values_num; i++)
1261
add_response_info(sock, "%s\n", ci->values[i]);
1263
pthread_mutex_unlock(&cache_lock);
1264
return send_response(sock, RESP_OK, "updates pending\n");
1265
} /* }}} static int handle_request_pending */
1267
static int handle_request_forget(HANDLER_PROTO) /* {{{ */
1271
char *file, file_tmp[PATH_MAX];
1273
status = buffer_get_field(&buffer, &buffer_size, &file);
1275
return syntax_error(sock,cmd);
1277
get_abs_path(&file, file_tmp);
1278
if (!check_file_access(file, sock)) return 0;
1280
pthread_mutex_lock(&cache_lock);
1281
found = g_tree_remove(cache_tree, file);
1282
pthread_mutex_unlock(&cache_lock);
1286
if (!JOURNAL_REPLAY(sock))
1287
journal_write("forget", file);
1289
return send_response(sock, RESP_OK, "Gone!\n");
1292
return send_response(sock, RESP_ERR, "%s\n", rrd_strerror(ENOENT));
1296
} /* }}} static int handle_request_forget */
1298
static int handle_request_queue (HANDLER_PROTO) /* {{{ */
1302
pthread_mutex_lock(&cache_lock);
1304
ci = cache_queue_head;
1307
add_response_info(sock, "%d %s\n", ci->values_num, ci->file);
1311
pthread_mutex_unlock(&cache_lock);
1313
return send_response(sock, RESP_OK, "in queue.\n");
1314
} /* }}} int handle_request_queue */
1316
static int handle_request_update (HANDLER_PROTO) /* {{{ */
1318
char *file, file_tmp[PATH_MAX];
1321
char orig_buf[CMD_MAX];
1325
/* save it for the journal later */
1326
if (!JOURNAL_REPLAY(sock))
1327
strncpy(orig_buf, buffer, buffer_size);
1329
status = buffer_get_field (&buffer, &buffer_size, &file);
1331
return syntax_error(sock,cmd);
1333
pthread_mutex_lock(&stats_lock);
1334
stats_updates_received++;
1335
pthread_mutex_unlock(&stats_lock);
1337
get_abs_path(&file, file_tmp);
1338
if (!check_file_access(file, sock)) return 0;
1340
pthread_mutex_lock (&cache_lock);
1341
ci = g_tree_lookup (cache_tree, file);
1343
if (ci == NULL) /* {{{ */
1345
struct stat statbuf;
1348
/* don't hold the lock while we setup; stat(2) might block */
1349
pthread_mutex_unlock(&cache_lock);
1351
memset (&statbuf, 0, sizeof (statbuf));
1352
status = stat (file, &statbuf);
1355
RRDD_LOG (LOG_NOTICE, "handle_request_update: stat (%s) failed.", file);
1358
if (status == ENOENT)
1359
return send_response(sock, RESP_ERR, "No such file: %s\n", file);
1361
return send_response(sock, RESP_ERR,
1362
"stat failed with error %i.\n", status);
1364
if (!S_ISREG (statbuf.st_mode))
1365
return send_response(sock, RESP_ERR, "Not a regular file: %s\n", file);
1367
if (access(file, R_OK|W_OK) != 0)
1368
return send_response(sock, RESP_ERR, "Cannot read/write %s: %s\n",
1369
file, rrd_strerror(errno));
1371
ci = (cache_item_t *) malloc (sizeof (cache_item_t));
1374
RRDD_LOG (LOG_ERR, "handle_request_update: malloc failed.");
1376
return send_response(sock, RESP_ERR, "malloc failed.\n");
1378
memset (ci, 0, sizeof (cache_item_t));
1380
ci->file = strdup (file);
1381
if (ci->file == NULL)
1384
RRDD_LOG (LOG_ERR, "handle_request_update: strdup failed.");
1386
return send_response(sock, RESP_ERR, "strdup failed.\n");
1389
wipe_ci_values(ci, now);
1390
ci->flags = CI_FLAGS_IN_TREE;
1391
pthread_cond_init(&ci->flushed, NULL);
1393
pthread_mutex_lock(&cache_lock);
1395
/* another UPDATE might have added this entry in the meantime */
1396
tmp = g_tree_lookup (cache_tree, file);
1398
g_tree_replace (cache_tree, (void *) ci->file, (void *) ci);
1401
free_cache_item (ci);
1405
/* state may have changed while we were unlocked */
1406
if (state == SHUTDOWN)
1409
assert (ci != NULL);
1411
/* don't re-write updates in replay mode */
1412
if (!JOURNAL_REPLAY(sock))
1413
journal_write("update", orig_buf);
1415
while (buffer_size > 0)
1421
status = buffer_get_field (&buffer, &buffer_size, &value);
1424
RRDD_LOG (LOG_INFO, "handle_request_update: Error reading field.");
1428
/* make sure update time is always moving forward */
1429
stamp = strtol(value, &eostamp, 10);
1430
if (eostamp == value || eostamp == NULL || *eostamp != ':')
1432
pthread_mutex_unlock(&cache_lock);
1433
return send_response(sock, RESP_ERR,
1434
"Cannot find timestamp in '%s'!\n", value);
1436
else if (stamp <= ci->last_update_stamp)
1438
pthread_mutex_unlock(&cache_lock);
1439
return send_response(sock, RESP_ERR,
1440
"illegal attempt to update using time %ld when last"
1441
" update time is %ld (minimum one second step)\n",
1442
stamp, ci->last_update_stamp);
1445
ci->last_update_stamp = stamp;
1447
if (!rrd_add_strdup(&ci->values, &ci->values_num, value))
1449
RRDD_LOG (LOG_ERR, "handle_request_update: rrd_add_strdup failed.");
1456
if (((now - ci->last_flush_time) >= config_write_interval)
1457
&& ((ci->flags & CI_FLAGS_IN_QUEUE) == 0)
1458
&& (ci->values_num > 0))
1460
enqueue_cache_item (ci, TAIL);
1463
pthread_mutex_unlock (&cache_lock);
1466
return send_response(sock, RESP_ERR, "No values updated.\n");
1468
return send_response(sock, RESP_OK,
1469
"errors, enqueued %i value(s).\n", values_num);
1474
} /* }}} int handle_request_update */
1476
/* we came across a "WROTE" entry during journal replay.
1477
* throw away any values that we have accumulated for this file
1479
static int handle_request_wrote (HANDLER_PROTO) /* {{{ */
1482
const char *file = buffer;
1484
pthread_mutex_lock(&cache_lock);
1486
ci = g_tree_lookup(cache_tree, file);
1489
pthread_mutex_unlock(&cache_lock);
1494
rrd_free_ptrs((void ***) &ci->values, &ci->values_num);
1496
wipe_ci_values(ci, now);
1497
remove_from_queue(ci);
1499
pthread_mutex_unlock(&cache_lock);
1501
} /* }}} int handle_request_wrote */
1503
/* start "BATCH" processing */
1504
static int batch_start (HANDLER_PROTO) /* {{{ */
1507
if (sock->batch_start)
1508
return send_response(sock, RESP_ERR, "Already in BATCH\n");
1510
status = send_response(sock, RESP_OK,
1511
"Go ahead. End with dot '.' on its own line.\n");
1512
sock->batch_start = time(NULL);
1513
sock->batch_cmd = 0;
1516
} /* }}} static int batch_start */
1518
/* finish "BATCH" processing and return results to the client */
1519
static int batch_done (HANDLER_PROTO) /* {{{ */
1521
assert(sock->batch_start);
1522
sock->batch_start = 0;
1523
sock->batch_cmd = 0;
1524
return send_response(sock, RESP_OK, "errors\n");
1525
} /* }}} static int batch_done */
1527
static int handle_request_quit (HANDLER_PROTO) /* {{{ */
1530
} /* }}} static int handle_request_quit */
1532
static command_t list_of_commands[] = { /* {{{ */
1535
handle_request_update,
1537
"UPDATE <filename> <values> [<values> ...]\n"
1539
"Adds the given file to the internal cache if it is not yet known and\n"
1540
"appends the given value(s) to the entry. See the rrdcached(1) manpage\n"
1543
"Each <values> has the following form:\n"
1544
" <values> = <time>:<value>[:<value>[...]]\n"
1545
"See the rrdupdate(1) manpage for details.\n"
1549
handle_request_wrote,
1550
CMD_CONTEXT_JOURNAL,
1556
handle_request_flush,
1557
CMD_CONTEXT_CLIENT | CMD_CONTEXT_BATCH,
1558
"FLUSH <filename>\n"
1560
"Adds the given filename to the head of the update queue and returns\n"
1561
"after it has been dequeued.\n"
1565
handle_request_flushall,
1569
"Triggers writing of all pending updates. Returns immediately.\n"
1573
handle_request_pending,
1575
"PENDING <filename>\n"
1577
"Shows any 'pending' updates for a file, in order.\n"
1578
"The updates shown have not yet been written to the underlying RRD file.\n"
1582
handle_request_forget,
1584
"FORGET <filename>\n"
1586
"Removes the file completely from the cache.\n"
1587
"Any pending updates for the file will be lost.\n"
1591
handle_request_queue,
1595
"Shows all files in the output queue.\n"
1596
"The output is zero or more lines in the following format:\n"
1597
"(where <num_vals> is the number of values to be written)\n"
1599
"<num_vals> <filename>\n"
1603
handle_request_stats,
1607
"Returns some performance counters, see the rrdcached(1) manpage for\n"
1608
"a description of the values.\n"
1612
handle_request_help,
1614
"HELP [<command>]\n",
1615
NULL, /* special! */
1623
"The 'BATCH' command permits the client to initiate a bulk load\n"
1624
" of commands to rrdcached.\n"
1629
" server: 0 Go ahead. End with dot '.' on its own line.\n"
1630
" client: command #1\n"
1631
" client: command #2\n"
1632
" client: ... and so on\n"
1634
" server: 2 errors\n"
1635
" server: 7 message for command #7\n"
1636
" server: 9 message for command #9\n"
1638
"For more information, consult the rrdcached(1) documentation.\n"
1641
".", /* BATCH terminator */
1649
handle_request_quit,
1650
CMD_CONTEXT_CLIENT | CMD_CONTEXT_BATCH,
1653
"Disconnect from rrdcached.\n"
1655
}; /* }}} command_t list_of_commands[] */
1656
static size_t list_of_commands_len = sizeof (list_of_commands)
1657
/ sizeof (list_of_commands[0]);
1659
static command_t *find_command(char *cmd)
1663
for (i = 0; i < list_of_commands_len; i++)
1664
if (strcasecmp(cmd, list_of_commands[i].cmd) == 0)
1665
return (&list_of_commands[i]);
1669
/* We currently use the index in the `list_of_commands' array as a bit position
1670
* in `listen_socket_t.permissions'. This member schould NEVER be accessed from
1671
* outside these functions so that switching to a more elegant storage method
1672
* is easily possible. */
1673
static ssize_t find_command_index (const char *cmd) /* {{{ */
1677
for (i = 0; i < list_of_commands_len; i++)
1678
if (strcasecmp(cmd, list_of_commands[i].cmd) == 0)
1679
return ((ssize_t) i);
1681
} /* }}} ssize_t find_command_index */
1683
static int socket_permission_check (listen_socket_t *sock, /* {{{ */
1688
if (JOURNAL_REPLAY(sock))
1694
if ((strcasecmp ("QUIT", cmd) == 0)
1695
|| (strcasecmp ("HELP", cmd) == 0))
1697
else if (strcmp (".", cmd) == 0)
1700
i = find_command_index (cmd);
1705
if ((sock->permissions & (1 << i)) != 0)
1708
} /* }}} int socket_permission_check */
1710
static int socket_permission_add (listen_socket_t *sock, /* {{{ */
1715
i = find_command_index (cmd);
1720
sock->permissions |= (1 << i);
1722
} /* }}} int socket_permission_add */
1724
/* check whether commands are received in the expected context */
1725
static int command_check_context(listen_socket_t *sock, command_t *cmd)
1727
if (JOURNAL_REPLAY(sock))
1728
return (cmd->context & CMD_CONTEXT_JOURNAL);
1729
else if (sock->batch_start)
1730
return (cmd->context & CMD_CONTEXT_BATCH);
1732
return (cmd->context & CMD_CONTEXT_CLIENT);
1738
static int handle_request_help (HANDLER_PROTO) /* {{{ */
1743
command_t *help = NULL;
1745
status = buffer_get_field (&buffer, &buffer_size, &cmd_str);
1747
help = find_command(cmd_str);
1749
if (help && (help->syntax || help->help))
1753
snprintf(tmp, sizeof(tmp)-1, "Help for %s\n", help->cmd);
1757
add_response_info(sock, "Usage: %s\n", help->syntax);
1760
add_response_info(sock, "%s\n", help->help);
1766
resp_txt = "Command overview\n";
1768
for (i = 0; i < list_of_commands_len; i++)
1770
if (list_of_commands[i].syntax == NULL)
1772
add_response_info (sock, "%s", list_of_commands[i].syntax);
1776
return send_response(sock, RESP_OK, resp_txt);
1777
} /* }}} int handle_request_help */
1779
static int handle_request (DISPATCH_PROTO) /* {{{ */
1781
char *buffer_ptr = buffer;
1782
char *cmd_str = NULL;
1783
command_t *cmd = NULL;
1786
assert (buffer[buffer_size - 1] == '\0');
1788
status = buffer_get_field (&buffer_ptr, &buffer_size, &cmd_str);
1791
RRDD_LOG (LOG_INFO, "handle_request: Unable parse command.");
1795
if (sock != NULL && sock->batch_start)
1798
cmd = find_command(cmd_str);
1800
return send_response(sock, RESP_ERR, "Unknown command: %s\n", cmd_str);
1802
if (!socket_permission_check (sock, cmd->cmd))
1803
return send_response(sock, RESP_ERR, "Permission denied.\n");
1805
if (!command_check_context(sock, cmd))
1806
return send_response(sock, RESP_ERR, "Can't use '%s' here.\n", cmd_str);
1808
return cmd->handler(cmd, sock, now, buffer_ptr, buffer_size);
1809
} /* }}} int handle_request */
1811
static void journal_set_free (journal_set *js) /* {{{ */
1816
rrd_free_ptrs((void ***) &js->files, &js->files_num);
1819
} /* }}} journal_set_free */
1821
static void journal_set_remove (journal_set *js) /* {{{ */
1826
for (uint i=0; i < js->files_num; i++)
1828
RRDD_LOG(LOG_DEBUG, "removing old journal %s", js->files[i]);
1829
unlink(js->files[i]);
1831
} /* }}} journal_set_remove */
1833
/* close current journal file handle.
1834
* MUST hold journal_lock before calling */
1835
static void journal_close(void) /* {{{ */
1837
if (journal_fh != NULL)
1839
if (fclose(journal_fh) != 0)
1840
RRDD_LOG(LOG_ERR, "cannot close journal: %s", rrd_strerror(errno));
1845
} /* }}} journal_close */
1847
/* MUST hold journal_lock before calling */
1848
static void journal_new_file(void) /* {{{ */
1852
char new_file[PATH_MAX + 1];
1854
assert(journal_dir != NULL);
1855
assert(journal_cur != NULL);
1859
gettimeofday(&now, NULL);
1860
/* this format assures that the files sort in strcmp() order */
1861
snprintf(new_file, PATH_MAX, "%s/%s.%010d.%06d",
1862
journal_dir, JOURNAL_BASE, (int)now.tv_sec, (int)now.tv_usec);
1864
new_fd = open(new_file, O_WRONLY|O_CREAT|O_APPEND,
1865
S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH);
1869
journal_fh = fdopen(new_fd, "a");
1870
if (journal_fh == NULL)
1873
journal_size = ftell(journal_fh);
1874
RRDD_LOG(LOG_DEBUG, "started new journal %s", new_file);
1876
/* record the file in the journal set */
1877
rrd_add_strdup(&journal_cur->files, &journal_cur->files_num, new_file);
1883
"JOURNALING DISABLED: Error while trying to create %s : %s",
1884
new_file, rrd_strerror(errno));
1886
"JOURNALING DISABLED: All values will be flushed at shutdown");
1889
config_flush_at_shutdown = 1;
1891
} /* }}} journal_new_file */
1893
/* MUST NOT hold journal_lock before calling this */
1894
static void journal_rotate(void) /* {{{ */
1896
journal_set *old_js = NULL;
1898
if (journal_dir == NULL)
1901
RRDD_LOG(LOG_DEBUG, "rotating journals");
1903
pthread_mutex_lock(&stats_lock);
1904
++stats_journal_rotate;
1905
pthread_mutex_unlock(&stats_lock);
1907
pthread_mutex_lock(&journal_lock);
1911
/* rotate the journal sets */
1912
old_js = journal_old;
1913
journal_old = journal_cur;
1914
journal_cur = calloc(1, sizeof(journal_set));
1916
if (journal_cur != NULL)
1919
RRDD_LOG(LOG_CRIT, "journal_rotate: malloc(journal_set) failed\n");
1921
pthread_mutex_unlock(&journal_lock);
1923
journal_set_remove(old_js);
1924
journal_set_free (old_js);
1926
} /* }}} static void journal_rotate */
1928
/* MUST hold journal_lock when calling */
1929
static void journal_done(void) /* {{{ */
1931
if (journal_cur == NULL)
1936
if (config_flush_at_shutdown)
1938
RRDD_LOG(LOG_INFO, "removing journals");
1939
journal_set_remove(journal_old);
1940
journal_set_remove(journal_cur);
1944
RRDD_LOG(LOG_INFO, "expedited shutdown; "
1945
"journals will be used at next startup");
1948
journal_set_free(journal_cur);
1949
journal_set_free(journal_old);
1952
} /* }}} static void journal_done */
1954
static int journal_write(char *cmd, char *args) /* {{{ */
1958
if (journal_fh == NULL)
1961
pthread_mutex_lock(&journal_lock);
1962
chars = fprintf(journal_fh, "%s %s\n", cmd, args);
1963
journal_size += chars;
1965
if (journal_size > JOURNAL_MAX)
1968
pthread_mutex_unlock(&journal_lock);
1972
pthread_mutex_lock(&stats_lock);
1973
stats_journal_bytes += chars;
1974
pthread_mutex_unlock(&stats_lock);
1978
} /* }}} static int journal_write */
1980
static int journal_replay (const char *file) /* {{{ */
1986
char entry[CMD_MAX];
1989
if (file == NULL) return 0;
1992
char *reason = "unknown error";
1994
struct stat statbuf;
1996
memset(&statbuf, 0, sizeof(statbuf));
1997
if (stat(file, &statbuf) != 0)
1999
reason = "stat error";
2002
else if (!S_ISREG(statbuf.st_mode))
2004
reason = "not a regular file";
2007
if (statbuf.st_uid != daemon_uid)
2009
reason = "not owned by daemon user";
2012
if (statbuf.st_mode & (S_IWGRP|S_IWOTH))
2014
reason = "must not be user/group writable";
2020
RRDD_LOG(LOG_ERR, "journal_replay: %s : %s (%s)",
2021
file, rrd_strerror(status), reason);
2026
fh = fopen(file, "r");
2029
if (errno != ENOENT)
2030
RRDD_LOG(LOG_ERR, "journal_replay: cannot open journal file: '%s' (%s)",
2031
file, rrd_strerror(errno));
2035
RRDD_LOG(LOG_NOTICE, "replaying from journal: %s", file);
2044
if (fgets(entry, sizeof(entry), fh) == NULL)
2046
entry_len = strlen(entry);
2048
/* check \n termination in case journal writing crashed mid-line */
2051
else if (entry[entry_len - 1] != '\n')
2053
RRDD_LOG(LOG_NOTICE, "Malformed journal entry at line %"PRIu64, line);
2058
entry[entry_len - 1] = '\0';
2060
if (handle_request(NULL, now, entry, entry_len) == 0)
2068
RRDD_LOG(LOG_INFO, "Replayed %d entries (%d failures)",
2069
entry_cnt, fail_cnt);
2071
return entry_cnt > 0 ? 1 : 0;
2072
} /* }}} static int journal_replay */
2074
static int journal_sort(const void *v1, const void *v2)
2076
char **jn1 = (char **) v1;
2077
char **jn2 = (char **) v2;
2079
return strcmp(*jn1,*jn2);
2082
static void journal_init(void) /* {{{ */
2084
int had_journal = 0;
2086
struct dirent *dent;
2087
char path[PATH_MAX+1];
2089
if (journal_dir == NULL) return;
2091
pthread_mutex_lock(&journal_lock);
2093
journal_cur = calloc(1, sizeof(journal_set));
2094
if (journal_cur == NULL)
2096
RRDD_LOG(LOG_CRIT, "journal_rotate: malloc(journal_set) failed\n");
2100
RRDD_LOG(LOG_INFO, "checking for journal files");
2102
/* Handle old journal files during transition. This gives them the
2103
* correct sort order. TODO: remove after first release
2106
char old_path[PATH_MAX+1];
2107
snprintf(old_path, PATH_MAX, "%s/%s", journal_dir, JOURNAL_BASE ".old" );
2108
snprintf(path, PATH_MAX, "%s/%s", journal_dir, JOURNAL_BASE ".0000");
2109
rename(old_path, path);
2111
snprintf(old_path, PATH_MAX, "%s/%s", journal_dir, JOURNAL_BASE );
2112
snprintf(path, PATH_MAX, "%s/%s", journal_dir, JOURNAL_BASE ".0001");
2113
rename(old_path, path);
2116
dir = opendir(journal_dir);
2117
while ((dent = readdir(dir)) != NULL)
2119
/* looks like a journal file? */
2120
if (strncmp(dent->d_name, JOURNAL_BASE, strlen(JOURNAL_BASE)))
2123
snprintf(path, PATH_MAX, "%s/%s", journal_dir, dent->d_name);
2125
if (!rrd_add_strdup(&journal_cur->files, &journal_cur->files_num, path))
2127
RRDD_LOG(LOG_CRIT, "journal_init: cannot add journal file %s!",
2134
qsort(journal_cur->files, journal_cur->files_num,
2135
sizeof(journal_cur->files[0]), journal_sort);
2137
for (uint i=0; i < journal_cur->files_num; i++)
2138
had_journal += journal_replay(journal_cur->files[i]);
2142
/* it must have been a crash. start a flush */
2143
if (had_journal && config_flush_at_shutdown)
2144
flush_old_values(-1);
2146
pthread_mutex_unlock(&journal_lock);
2148
RRDD_LOG(LOG_INFO, "journal processing complete");
2150
} /* }}} static void journal_init */
2152
static void free_listen_socket(listen_socket_t *sock) /* {{{ */
2154
assert(sock != NULL);
2156
free(sock->rbuf); sock->rbuf = NULL;
2157
free(sock->wbuf); sock->wbuf = NULL;
2159
} /* }}} void free_listen_socket */
2161
static void close_connection(listen_socket_t *sock) /* {{{ */
2169
free_listen_socket(sock);
2171
} /* }}} void close_connection */
2173
static void *connection_thread_main (void *args) /* {{{ */
2175
listen_socket_t *sock;
2178
sock = (listen_socket_t *) args;
2181
/* init read buffers */
2182
sock->next_read = sock->next_cmd = 0;
2183
sock->rbuf = malloc(RBUF_SIZE);
2184
if (sock->rbuf == NULL)
2186
RRDD_LOG(LOG_ERR, "connection_thread_main: cannot malloc read buffer");
2187
close_connection(sock);
2191
pthread_mutex_lock (&connection_threads_lock);
2192
connection_threads_num++;
2193
pthread_mutex_unlock (&connection_threads_lock);
2195
while (state == RUNNING)
2202
struct pollfd pollfd;
2206
pollfd.events = POLLIN | POLLPRI;
2209
status = poll (&pollfd, 1, /* timeout = */ 500);
2210
if (state != RUNNING)
2212
else if (status == 0) /* timeout */
2214
else if (status < 0) /* error */
2217
if (status != EINTR)
2218
RRDD_LOG (LOG_ERR, "connection_thread_main: poll(2) failed.");
2222
if ((pollfd.revents & POLLHUP) != 0) /* normal shutdown */
2224
else if ((pollfd.revents & (POLLIN | POLLPRI)) == 0)
2226
RRDD_LOG (LOG_WARNING, "connection_thread_main: "
2227
"poll(2) returned something unexpected: %#04hx",
2232
rbytes = read(fd, sock->rbuf + sock->next_read,
2233
RBUF_SIZE - sock->next_read);
2236
RRDD_LOG(LOG_ERR, "connection_thread_main: read() failed.");
2239
else if (rbytes == 0)
2242
sock->next_read += rbytes;
2244
if (sock->batch_start)
2245
now = sock->batch_start;
2249
while ((cmd = next_cmd(sock, &cmd_len)) != NULL)
2251
status = handle_request (sock, now, cmd, cmd_len+1);
2258
close_connection(sock);
2260
/* Remove this thread from the connection threads list */
2261
pthread_mutex_lock (&connection_threads_lock);
2262
connection_threads_num--;
2263
if (connection_threads_num <= 0)
2264
pthread_cond_broadcast(&connection_threads_done);
2265
pthread_mutex_unlock (&connection_threads_lock);
2268
} /* }}} void *connection_thread_main */
2270
static int open_listen_socket_unix (const listen_socket_t *sock) /* {{{ */
2273
struct sockaddr_un sa;
2274
listen_socket_t *temp;
2277
char *path_copy, *dir;
2280
if (strncmp(path, "unix:", strlen("unix:")) == 0)
2281
path += strlen("unix:");
2283
/* dirname may modify its argument */
2284
path_copy = strdup(path);
2285
if (path_copy == NULL)
2287
fprintf(stderr, "rrdcached: strdup(): %s\n",
2288
rrd_strerror(errno));
2292
dir = dirname(path_copy);
2293
if (rrd_mkdir_p(dir, 0777) != 0)
2295
fprintf(stderr, "Failed to create socket directory '%s': %s\n",
2296
dir, rrd_strerror(errno));
2302
temp = (listen_socket_t *) rrd_realloc (listen_fds,
2303
sizeof (listen_fds[0]) * (listen_fds_num + 1));
2306
fprintf (stderr, "rrdcached: open_listen_socket_unix: realloc failed.\n");
2310
memcpy (listen_fds + listen_fds_num, sock, sizeof (listen_fds[0]));
2312
fd = socket (PF_UNIX, SOCK_STREAM, /* protocol = */ 0);
2315
fprintf (stderr, "rrdcached: unix socket(2) failed: %s\n",
2316
rrd_strerror(errno));
2320
memset (&sa, 0, sizeof (sa));
2321
sa.sun_family = AF_UNIX;
2322
strncpy (sa.sun_path, path, sizeof (sa.sun_path) - 1);
2324
/* if we've gotten this far, we own the pid file. any daemon started
2325
* with the same args must not be alive. therefore, ensure that we can
2326
* create the socket...
2330
status = bind (fd, (struct sockaddr *) &sa, sizeof (sa));
2333
fprintf (stderr, "rrdcached: bind(%s) failed: %s.\n",
2334
path, rrd_strerror(errno));
2339
/* tweak the sockets group ownership */
2340
if (sock->socket_group != (gid_t)-1)
2342
if ( (chown(path, getuid(), sock->socket_group) != 0) ||
2343
(chmod(path, (S_IRUSR|S_IWUSR|S_IXUSR | S_IRGRP|S_IWGRP)) != 0) )
2345
fprintf(stderr, "rrdcached: failed to set socket group permissions (%s)\n", strerror(errno));
2349
if (sock->socket_permissions != (mode_t)-1)
2351
if (chmod(path, sock->socket_permissions) != 0)
2352
fprintf(stderr, "rrdcached: failed to set socket file permissions (%o): %s\n",
2353
(unsigned int)sock->socket_permissions, strerror(errno));
2356
status = listen (fd, /* backlog = */ 10);
2359
fprintf (stderr, "rrdcached: listen(%s) failed: %s.\n",
2360
path, rrd_strerror(errno));
2366
listen_fds[listen_fds_num].fd = fd;
2367
listen_fds[listen_fds_num].family = PF_UNIX;
2368
strncpy(listen_fds[listen_fds_num].addr, path,
2369
sizeof (listen_fds[listen_fds_num].addr) - 1);
2373
} /* }}} int open_listen_socket_unix */
2375
static int open_listen_socket_network(const listen_socket_t *sock) /* {{{ */
2377
struct addrinfo ai_hints;
2378
struct addrinfo *ai_res;
2379
struct addrinfo *ai_ptr;
2380
char addr_copy[NI_MAXHOST];
2385
strncpy (addr_copy, sock->addr, sizeof(addr_copy)-1);
2386
addr_copy[sizeof (addr_copy) - 1] = 0;
2389
memset (&ai_hints, 0, sizeof (ai_hints));
2390
ai_hints.ai_flags = 0;
2391
#ifdef AI_ADDRCONFIG
2392
ai_hints.ai_flags |= AI_ADDRCONFIG;
2394
ai_hints.ai_family = AF_UNSPEC;
2395
ai_hints.ai_socktype = SOCK_STREAM;
2398
if (*addr == '[') /* IPv6+port format */
2400
/* `addr' is something like "[2001:780:104:2:211:24ff:feab:26f8]:12345" */
2403
port = strchr (addr, ']');
2406
fprintf (stderr, "rrdcached: Malformed address: %s\n", sock->addr);
2414
else if (*port == 0)
2418
fprintf (stderr, "rrdcached: Garbage after address: %s\n", port);
2421
} /* if (*addr == '[') */
2424
port = rindex(addr, ':');
2432
status = getaddrinfo (addr,
2433
port == NULL ? RRDCACHED_DEFAULT_PORT : port,
2434
&ai_hints, &ai_res);
2437
fprintf (stderr, "rrdcached: getaddrinfo(%s) failed: %s\n",
2438
addr, gai_strerror (status));
2442
for (ai_ptr = ai_res; ai_ptr != NULL; ai_ptr = ai_ptr->ai_next)
2445
listen_socket_t *temp;
2448
temp = (listen_socket_t *) rrd_realloc (listen_fds,
2449
sizeof (listen_fds[0]) * (listen_fds_num + 1));
2453
"rrdcached: open_listen_socket_network: realloc failed.\n");
2457
memcpy (listen_fds + listen_fds_num, sock, sizeof (listen_fds[0]));
2459
fd = socket (ai_ptr->ai_family, ai_ptr->ai_socktype, ai_ptr->ai_protocol);
2462
fprintf (stderr, "rrdcached: network socket(2) failed: %s.\n",
2463
rrd_strerror(errno));
2467
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
2469
status = bind (fd, ai_ptr->ai_addr, ai_ptr->ai_addrlen);
2472
fprintf (stderr, "rrdcached: bind(%s) failed: %s.\n",
2473
sock->addr, rrd_strerror(errno));
2478
status = listen (fd, /* backlog = */ 10);
2481
fprintf (stderr, "rrdcached: listen(%s) failed: %s\n.",
2482
sock->addr, rrd_strerror(errno));
2484
freeaddrinfo(ai_res);
2488
listen_fds[listen_fds_num].fd = fd;
2489
listen_fds[listen_fds_num].family = ai_ptr->ai_family;
2491
} /* for (ai_ptr) */
2493
freeaddrinfo(ai_res);
2495
} /* }}} static int open_listen_socket_network */
2497
static int open_listen_socket (const listen_socket_t *sock) /* {{{ */
2499
assert(sock != NULL);
2500
assert(sock->addr != NULL);
2502
if (strncmp ("unix:", sock->addr, strlen ("unix:")) == 0
2503
|| sock->addr[0] == '/')
2504
return (open_listen_socket_unix(sock));
2506
return (open_listen_socket_network(sock));
2507
} /* }}} int open_listen_socket */
2509
static int close_listen_sockets (void) /* {{{ */
2513
for (i = 0; i < listen_fds_num; i++)
2515
close (listen_fds[i].fd);
2517
if (listen_fds[i].family == PF_UNIX)
2518
unlink(listen_fds[i].addr);
2526
} /* }}} int close_listen_sockets */
2528
static void *listen_thread_main (void *args __attribute__((unused))) /* {{{ */
2530
struct pollfd *pollfds;
2535
if (listen_fds_num < 1)
2537
RRDD_LOG(LOG_ERR, "listen_thread_main: no listen_fds !");
2541
pollfds_num = listen_fds_num;
2542
pollfds = (struct pollfd *) malloc (sizeof (*pollfds) * pollfds_num);
2543
if (pollfds == NULL)
2545
RRDD_LOG (LOG_ERR, "listen_thread_main: malloc failed.");
2548
memset (pollfds, 0, sizeof (*pollfds) * pollfds_num);
2550
RRDD_LOG(LOG_INFO, "listening for connections");
2552
while (state == RUNNING)
2554
for (i = 0; i < pollfds_num; i++)
2556
pollfds[i].fd = listen_fds[i].fd;
2557
pollfds[i].events = POLLIN | POLLPRI;
2558
pollfds[i].revents = 0;
2561
status = poll (pollfds, pollfds_num, /* timeout = */ 1000);
2562
if (state != RUNNING)
2564
else if (status == 0) /* timeout */
2566
else if (status < 0) /* error */
2569
if (status != EINTR)
2571
RRDD_LOG (LOG_ERR, "listen_thread_main: poll(2) failed.");
2576
for (i = 0; i < pollfds_num; i++)
2578
listen_socket_t *client_sock;
2579
struct sockaddr_storage client_sa;
2580
socklen_t client_sa_size;
2582
pthread_attr_t attr;
2584
if (pollfds[i].revents == 0)
2587
if ((pollfds[i].revents & (POLLIN | POLLPRI)) == 0)
2589
RRDD_LOG (LOG_ERR, "listen_thread_main: "
2590
"poll(2) returned something unexpected for listen FD #%i.",
2595
client_sock = (listen_socket_t *) malloc (sizeof (listen_socket_t));
2596
if (client_sock == NULL)
2598
RRDD_LOG (LOG_ERR, "listen_thread_main: malloc failed.");
2601
memcpy(client_sock, &listen_fds[i], sizeof(listen_fds[0]));
2603
client_sa_size = sizeof (client_sa);
2604
client_sock->fd = accept (pollfds[i].fd,
2605
(struct sockaddr *) &client_sa, &client_sa_size);
2606
if (client_sock->fd < 0)
2608
RRDD_LOG (LOG_ERR, "listen_thread_main: accept(2) failed.");
2613
pthread_attr_init (&attr);
2614
pthread_attr_setdetachstate (&attr, PTHREAD_CREATE_DETACHED);
2616
status = pthread_create (&tid, &attr, connection_thread_main,
2620
RRDD_LOG (LOG_ERR, "listen_thread_main: pthread_create failed.");
2621
close_connection(client_sock);
2624
} /* for (pollfds_num) */
2625
} /* while (state == RUNNING) */
2627
RRDD_LOG(LOG_INFO, "starting shutdown");
2629
close_listen_sockets ();
2631
pthread_mutex_lock (&connection_threads_lock);
2632
while (connection_threads_num > 0)
2633
pthread_cond_wait(&connection_threads_done, &connection_threads_lock);
2634
pthread_mutex_unlock (&connection_threads_lock);
2639
} /* }}} void *listen_thread_main */
2641
static int daemonize (void) /* {{{ */
2646
daemon_uid = geteuid();
2648
pid_fd = open_pidfile("create", O_CREAT|O_EXCL|O_WRONLY);
2650
pid_fd = check_pidfile();
2654
/* open all the listen sockets */
2655
if (config_listen_address_list_len > 0)
2657
for (size_t i = 0; i < config_listen_address_list_len; i++)
2658
open_listen_socket (config_listen_address_list[i]);
2660
rrd_free_ptrs((void ***) &config_listen_address_list,
2661
&config_listen_address_list_len);
2665
listen_socket_t sock;
2666
memset(&sock, 0, sizeof(sock));
2667
strncpy(sock.addr, RRDCACHED_DEFAULT_ADDRESS, sizeof(sock.addr)-1);
2668
open_listen_socket (&sock);
2671
if (listen_fds_num < 1)
2673
fprintf (stderr, "rrdcached: FATAL: cannot open any listen sockets\n");
2677
if (!stay_foreground)
2684
fprintf (stderr, "daemonize: fork(2) failed.\n");
2690
/* Become session leader */
2693
/* Open the first three file descriptors to /dev/null */
2698
open ("/dev/null", O_RDWR);
2699
if (dup(0) == -1 || dup(0) == -1){
2700
RRDD_LOG (LOG_ERR, "faild to run dup.\n");
2702
} /* if (!stay_foreground) */
2704
/* Change into the /tmp directory. */
2705
base_dir = (config_base_dir != NULL)
2709
if (chdir (base_dir) != 0)
2711
fprintf (stderr, "daemonize: chdir (%s) failed.\n", base_dir);
2715
install_signal_handlers();
2717
openlog ("rrdcached", LOG_PID, LOG_DAEMON);
2718
RRDD_LOG(LOG_INFO, "starting up");
2720
cache_tree = g_tree_new_full ((GCompareDataFunc) strcmp, NULL, NULL,
2721
(GDestroyNotify) free_cache_item);
2722
if (cache_tree == NULL)
2724
RRDD_LOG (LOG_ERR, "daemonize: g_tree_new failed.");
2728
return write_pidfile (pid_fd);
2733
} /* }}} int daemonize */
2735
static int cleanup (void) /* {{{ */
2737
pthread_cond_broadcast (&flush_cond);
2738
pthread_join (flush_thread, NULL);
2740
pthread_cond_broadcast (&queue_cond);
2741
for (int i = 0; i < config_queue_threads; i++)
2742
pthread_join (queue_threads[i], NULL);
2744
if (config_flush_at_shutdown)
2746
assert(cache_queue_head == NULL);
2747
RRDD_LOG(LOG_INFO, "clean shutdown; all RRDs flushed");
2750
free(queue_threads);
2751
free(config_base_dir);
2753
pthread_mutex_lock(&cache_lock);
2754
g_tree_destroy(cache_tree);
2756
pthread_mutex_lock(&journal_lock);
2759
RRDD_LOG(LOG_INFO, "goodbye");
2763
free(config_pid_file);
2766
} /* }}} int cleanup */
2768
static int read_options (int argc, char **argv) /* {{{ */
2773
char **permissions = NULL;
2774
size_t permissions_len = 0;
2776
gid_t socket_group = (gid_t)-1;
2777
mode_t socket_permissions = (mode_t)-1;
2779
while ((option = getopt(argc, argv, "gl:s:m:P:f:w:z:t:Bb:p:Fj:h?")) != -1)
2789
listen_socket_t *new;
2791
new = malloc(sizeof(listen_socket_t));
2794
fprintf(stderr, "read_options: malloc failed.\n");
2797
memset(new, 0, sizeof(listen_socket_t));
2799
strncpy(new->addr, optarg, sizeof(new->addr)-1);
2801
/* Add permissions to the socket {{{ */
2802
if (permissions_len != 0)
2805
for (i = 0; i < permissions_len; i++)
2807
status = socket_permission_add (new, permissions[i]);
2810
fprintf (stderr, "read_options: Adding permission \"%s\" to "
2811
"socket failed. Most likely, this permission doesn't "
2812
"exist. Check your command line.\n", permissions[i]);
2817
else /* if (permissions_len == 0) */
2819
/* Add permission for ALL commands to the socket. */
2821
for (i = 0; i < list_of_commands_len; i++)
2823
status = socket_permission_add (new, list_of_commands[i].cmd);
2826
fprintf (stderr, "read_options: Adding permission \"%s\" to "
2827
"socket failed. This should never happen, ever! Sorry.\n",
2833
/* }}} Done adding permissions. */
2835
new->socket_group = socket_group;
2836
new->socket_permissions = socket_permissions;
2838
if (!rrd_add_ptr((void ***)&config_listen_address_list,
2839
&config_listen_address_list_len, new))
2841
fprintf(stderr, "read_options: rrd_add_ptr failed.\n");
2847
/* set socket group permissions */
2853
group_gid = strtoul(optarg, NULL, 10);
2854
if (errno != EINVAL && group_gid>0)
2856
/* we were passed a number */
2857
grp = getgrgid(group_gid);
2861
grp = getgrnam(optarg);
2866
socket_group = grp->gr_gid;
2870
/* no idea what the user wanted... */
2871
fprintf (stderr, "read_options: couldn't map \"%s\" to a group, Sorry\n", optarg);
2877
/* set socket file permissions */
2881
char *endptr = NULL;
2883
tmp = strtol (optarg, &endptr, 8);
2884
if ((endptr == optarg) || (! endptr) || (*endptr != '\0')
2885
|| (tmp > 07777) || (tmp < 0)) {
2886
fprintf (stderr, "read_options: Invalid file mode \"%s\".\n",
2891
socket_permissions = (mode_t)tmp;
2902
rrd_free_ptrs ((void *) &permissions, &permissions_len);
2904
optcopy = strdup (optarg);
2907
while ((ptr = strtok_r (dummy, ", ", &saveptr)) != NULL)
2910
rrd_add_strdup ((void *) &permissions, &permissions_len, ptr);
2921
temp = atoi (optarg);
2923
config_flush_interval = temp;
2926
fprintf (stderr, "Invalid flush interval: %s\n", optarg);
2936
temp = atoi (optarg);
2938
config_write_interval = temp;
2941
fprintf (stderr, "Invalid write interval: %s\n", optarg);
2951
temp = atoi(optarg);
2953
config_write_jitter = temp;
2956
fprintf (stderr, "Invalid write jitter: -z %s\n", optarg);
2966
threads = atoi(optarg);
2968
config_queue_threads = threads;
2971
fprintf (stderr, "Invalid thread count: -t %s\n", optarg);
2978
config_write_base_only = 1;
2984
char base_realpath[PATH_MAX];
2986
if (config_base_dir != NULL)
2987
free (config_base_dir);
2988
config_base_dir = strdup (optarg);
2989
if (config_base_dir == NULL)
2991
fprintf (stderr, "read_options: strdup failed.\n");
2995
if (rrd_mkdir_p (config_base_dir, 0777) != 0)
2997
fprintf (stderr, "Failed to create base directory '%s': %s\n",
2998
config_base_dir, rrd_strerror (errno));
3002
/* make sure that the base directory is not resolved via
3003
* symbolic links. this makes some performance-enhancing
3004
* assumptions possible (we don't have to resolve paths
3005
* that start with a "/")
3007
if (realpath(config_base_dir, base_realpath) == NULL)
3009
fprintf (stderr, "Failed to canonicalize the base directory '%s': "
3010
"%s\n", config_base_dir, rrd_strerror(errno));
3014
len = strlen (config_base_dir);
3015
while ((len > 0) && (config_base_dir[len - 1] == '/'))
3017
config_base_dir[len - 1] = 0;
3023
fprintf (stderr, "Invalid base directory: %s\n", optarg);
3027
_config_base_dir_len = len;
3029
len = strlen (base_realpath);
3030
while ((len > 0) && (base_realpath[len - 1] == '/'))
3032
base_realpath[len - 1] = '\0';
3036
if (strncmp(config_base_dir,
3037
base_realpath, sizeof(base_realpath)) != 0)
3040
"Base directory (-b) resolved via file system links!\n"
3041
"Please consult rrdcached '-b' documentation!\n"
3042
"Consider specifying the real directory (%s)\n",
3051
if (config_pid_file != NULL)
3052
free (config_pid_file);
3053
config_pid_file = strdup (optarg);
3054
if (config_pid_file == NULL)
3056
fprintf (stderr, "read_options: strdup failed.\n");
3063
config_flush_at_shutdown = 1;
3068
const char *dir = journal_dir = strdup(optarg);
3070
status = rrd_mkdir_p(dir, 0777);
3073
fprintf(stderr, "Failed to create journal directory '%s': %s\n",
3074
dir, rrd_strerror(errno));
3078
if (access(dir, R_OK|W_OK|X_OK) != 0)
3080
fprintf(stderr, "Must specify a writable directory with -j! (%s)\n",
3081
errno ? rrd_strerror(errno) : "");
3089
printf ("RRDCacheD %s\n"
3090
"Copyright (C) 2008,2009 Florian octo Forster and Kevin Brintnall\n"
3092
"Usage: rrdcached [options]\n"
3094
"Valid options are:\n"
3095
" -l <address> Socket address to listen to.\n"
3096
" -P <perms> Sets the permissions to assign to all following "
3098
" -w <seconds> Interval in which to write data.\n"
3099
" -z <delay> Delay writes up to <delay> seconds to spread load\n"
3100
" -t <threads> Number of write threads.\n"
3101
" -f <seconds> Interval in which to flush dead data.\n"
3102
" -p <file> Location of the PID-file.\n"
3103
" -b <dir> Base directory to change to.\n"
3104
" -B Restrict file access to paths within -b <dir>\n"
3105
" -g Do not fork and run in the foreground.\n"
3106
" -j <dir> Directory in which to create the journal files.\n"
3107
" -F Always flush all updates at shutdown\n"
3108
" -s <id|name> Make socket g+rw to named group\n"
3110
"For more information and a detailed description of all options "
3112
"to the rrdcached(1) manual page.\n",
3116
} /* switch (option) */
3117
} /* while (getopt) */
3119
/* advise the user when values are not sane */
3120
if (config_flush_interval < 2 * config_write_interval)
3121
fprintf(stderr, "WARNING: flush interval (-f) should be at least"
3122
" 2x write interval (-w) !\n");
3123
if (config_write_jitter > config_write_interval)
3124
fprintf(stderr, "WARNING: write delay (-z) should NOT be larger than"
3125
" write interval (-w) !\n");
3127
if (config_write_base_only && config_base_dir == NULL)
3128
fprintf(stderr, "WARNING: -B does not make sense without -b!\n"
3129
" Consult the rrdcached documentation\n");
3131
if (journal_dir == NULL)
3132
config_flush_at_shutdown = 1;
3134
rrd_free_ptrs ((void *) &permissions, &permissions_len);
3137
} /* }}} int read_options */
3139
int main (int argc, char **argv)
3143
status = read_options (argc, argv);
3151
status = daemonize ();
3154
fprintf (stderr, "rrdcached: daemonize failed, exiting.\n");
3160
/* start the queue threads */
3161
queue_threads = calloc(config_queue_threads, sizeof(*queue_threads));
3162
if (queue_threads == NULL)
3164
RRDD_LOG (LOG_ERR, "FATAL: cannot calloc queue threads");
3168
for (int i = 0; i < config_queue_threads; i++)
3170
memset (&queue_threads[i], 0, sizeof (*queue_threads));
3171
status = pthread_create (&queue_threads[i], NULL, queue_thread_main, NULL);
3174
RRDD_LOG (LOG_ERR, "FATAL: cannot create queue thread");
3180
/* start the flush thread */
3181
memset(&flush_thread, 0, sizeof(flush_thread));
3182
status = pthread_create (&flush_thread, NULL, flush_thread_main, NULL);
3185
RRDD_LOG (LOG_ERR, "FATAL: cannot create flush thread");
3190
listen_thread_main (NULL);
3197
* vim: set sw=2 sts=2 ts=8 et fdm=marker :