1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2020 Intel Corporation
7 #include <sys/socket.h>
11 /* we won't link against libbsd, so just always use DPDKs-specific strlcpy */
13 #include <rte_string_fns.h>
14 #include <rte_common.h>
15 #include <rte_spinlock.h>
16 #include <rte_version.h>
18 #include "rte_telemetry.h"
19 #include "telemetry_json.h"
20 #include "telemetry_data.h"
22 #define MAX_CMD_LEN 56
23 #define MAX_HELP_LEN 64
24 #define MAX_OUTPUT_LEN (1024 * 16)
27 client_handler(void *socket);
30 char cmd[MAX_CMD_LEN];
32 char help[MAX_HELP_LEN];
37 char path[sizeof(((struct sockaddr_un *)0)->sun_path)];
40 static struct socket v2_socket; /* socket for v2 telemetry */
41 static char telemetry_log_error[1024]; /* Will contain error on init failure */
42 /* list of command callbacks, with one command registered by default */
43 static struct cmd_callback callbacks[TELEMETRY_MAX_CALLBACKS];
44 static int num_callbacks; /* How many commands are registered */
45 /* Used when accessing or modifying list of command callbacks */
46 static rte_spinlock_t callback_sl = RTE_SPINLOCK_INITIALIZER;
49 rte_telemetry_register_cmd(const char *cmd, telemetry_cb fn, const char *help)
53 if (strlen(cmd) >= MAX_CMD_LEN || fn == NULL || cmd[0] != '/'
54 || strlen(help) >= MAX_HELP_LEN)
56 if (num_callbacks >= TELEMETRY_MAX_CALLBACKS)
59 rte_spinlock_lock(&callback_sl);
60 while (i < num_callbacks && strcmp(cmd, callbacks[i].cmd) > 0)
62 if (i != num_callbacks)
63 /* Move elements to keep the list alphabetical */
64 memmove(callbacks + i + 1, callbacks + i,
65 sizeof(struct cmd_callback) * (num_callbacks - i));
67 strlcpy(callbacks[i].cmd, cmd, MAX_CMD_LEN);
69 strlcpy(callbacks[i].help, help, MAX_HELP_LEN);
71 rte_spinlock_unlock(&callback_sl);
77 output_json(const char *cmd, const struct rte_tel_data *d, int s)
79 char out_buf[MAX_OUTPUT_LEN];
82 size_t buf_len, prefix_used, used = 0;
85 RTE_BUILD_BUG_ON(sizeof(out_buf) < MAX_CMD_LEN +
86 RTE_TEL_MAX_SINGLE_STRING_LEN + 10);
89 used = snprintf(out_buf, sizeof(out_buf), "{\"%.*s\":null}",
90 MAX_CMD_LEN, cmd ? cmd : "none");
93 used = snprintf(out_buf, sizeof(out_buf), "{\"%.*s\":\"%.*s\"}",
95 RTE_TEL_MAX_SINGLE_STRING_LEN, d->data.str);
98 prefix_used = snprintf(out_buf, sizeof(out_buf), "{\"%.*s\":",
100 cb_data_buf = &out_buf[prefix_used];
101 buf_len = sizeof(out_buf) - prefix_used - 1; /* space for '}' */
103 used = rte_tel_json_empty_obj(cb_data_buf, buf_len, 0);
104 for (i = 0; i < d->data_len; i++) {
105 const struct tel_dict_entry *v = &d->data.dict[i];
107 case RTE_TEL_STRING_VAL:
108 used = rte_tel_json_add_obj_str(cb_data_buf,
110 v->name, v->value.sval);
112 case RTE_TEL_INT_VAL:
113 used = rte_tel_json_add_obj_int(cb_data_buf,
115 v->name, v->value.ival);
117 case RTE_TEL_U64_VAL:
118 used = rte_tel_json_add_obj_u64(cb_data_buf,
120 v->name, v->value.u64val);
125 used += strlcat(out_buf + used, "}", sizeof(out_buf) - used);
127 case RTE_TEL_ARRAY_STRING:
128 case RTE_TEL_ARRAY_INT:
129 case RTE_TEL_ARRAY_U64:
130 prefix_used = snprintf(out_buf, sizeof(out_buf), "{\"%.*s\":",
132 cb_data_buf = &out_buf[prefix_used];
133 buf_len = sizeof(out_buf) - prefix_used - 1; /* space for '}' */
135 used = rte_tel_json_empty_array(cb_data_buf, buf_len, 0);
136 for (i = 0; i < d->data_len; i++)
137 if (d->type == RTE_TEL_ARRAY_STRING)
138 used = rte_tel_json_add_array_string(
141 d->data.array[i].sval);
142 else if (d->type == RTE_TEL_ARRAY_INT)
143 used = rte_tel_json_add_array_int(cb_data_buf,
145 d->data.array[i].ival);
146 else if (d->type == RTE_TEL_ARRAY_U64)
147 used = rte_tel_json_add_array_u64(cb_data_buf,
149 d->data.array[i].u64val);
151 used += strlcat(out_buf + used, "}", sizeof(out_buf) - used);
154 if (write(s, out_buf, used) < 0)
155 perror("Error writing to socket");
159 perform_command(telemetry_cb fn, const char *cmd, const char *param, int s)
161 struct rte_tel_data data;
163 int ret = fn(cmd, param, &data);
165 char out_buf[MAX_CMD_LEN + 10];
166 int used = snprintf(out_buf, sizeof(out_buf), "{\"%.*s\":null}",
167 MAX_CMD_LEN, cmd ? cmd : "none");
168 if (write(s, out_buf, used) < 0)
169 perror("Error writing to socket");
172 output_json(cmd, &data, s);
176 unknown_command(const char *cmd __rte_unused, const char *params __rte_unused,
177 struct rte_tel_data *d)
179 return d->type = RTE_TEL_NULL;
183 client_handler(void *sock_id)
185 int s = (int)(uintptr_t)sock_id;
188 snprintf(info_str, sizeof(info_str),
189 "{\"version\":\"%s\",\"pid\":%d,\"max_output_len\":%d}",
190 rte_version(), getpid(), MAX_OUTPUT_LEN);
191 if (write(s, info_str, strlen(info_str)) < 0) {
196 /* receive data is not null terminated */
197 int bytes = read(s, buffer, sizeof(buffer) - 1);
200 const char *cmd = strtok(buffer, ",");
201 const char *param = strtok(NULL, ",");
202 telemetry_cb fn = unknown_command;
205 if (cmd && strlen(cmd) < MAX_CMD_LEN) {
206 rte_spinlock_lock(&callback_sl);
207 for (i = 0; i < num_callbacks; i++)
208 if (strcmp(cmd, callbacks[i].cmd) == 0) {
209 fn = callbacks[i].fn;
212 rte_spinlock_unlock(&callback_sl);
214 perform_command(fn, cmd, param, s);
216 bytes = read(s, buffer, sizeof(buffer) - 1);
223 socket_listener(void *socket)
227 struct socket *s = (struct socket *)socket;
228 int s_accepted = accept(s->sock, NULL, NULL);
229 if (s_accepted < 0) {
230 snprintf(telemetry_log_error,
231 sizeof(telemetry_log_error),
232 "Error with accept, telemetry thread quitting\n");
235 pthread_create(&th, NULL, s->fn, (void *)(uintptr_t)s_accepted);
242 get_socket_path(const char *runtime_dir, const int version)
244 static char path[PATH_MAX];
245 snprintf(path, sizeof(path), "%s/dpdk_telemetry.v%d",
246 strlen(runtime_dir) ? runtime_dir : "/tmp", version);
253 if (v2_socket.path[0])
254 unlink(v2_socket.path);
258 create_socket(char *path)
260 int sock = socket(AF_UNIX, SOCK_SEQPACKET, 0);
262 snprintf(telemetry_log_error, sizeof(telemetry_log_error),
263 "Error with socket creation, %s",
268 struct sockaddr_un sun = {.sun_family = AF_UNIX};
269 strlcpy(sun.sun_path, path, sizeof(sun.sun_path));
270 unlink(sun.sun_path);
271 if (bind(sock, (void *) &sun, sizeof(sun)) < 0) {
272 snprintf(telemetry_log_error, sizeof(telemetry_log_error),
273 "Error binding socket: %s",
279 if (listen(sock, 1) < 0) {
280 snprintf(telemetry_log_error, sizeof(telemetry_log_error),
281 "Error calling listen for socket: %s",
295 telemetry_v2_init(const char *runtime_dir)
299 v2_socket.fn = client_handler;
300 if (strlcpy(v2_socket.path, get_socket_path(runtime_dir, 2),
301 sizeof(v2_socket.path)) >= sizeof(v2_socket.path)) {
302 snprintf(telemetry_log_error, sizeof(telemetry_log_error),
303 "Error with socket binding, path too long");
307 v2_socket.sock = create_socket(v2_socket.path);
308 if (v2_socket.sock < 0)
310 pthread_create(&t_new, NULL, socket_listener, &v2_socket);
311 atexit(unlink_sockets);
317 rte_telemetry_new_init(void)
319 const char *error_str;
320 if (telemetry_v2_init(rte_eal_get_runtime_dir()) != 0) {
321 error_str = telemetry_log_error;
322 printf("Error initialising telemetry - %s", error_str);