Commit | Line | Data |
---|---|---|
54012638 | 1 | /* |
ab5be9fa | 2 | * Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca> |
54012638 | 3 | * |
ab5be9fa | 4 | * SPDX-License-Identifier: GPL-2.0-only |
54012638 | 5 | * |
54012638 DG |
6 | */ |
7 | ||
6c1c0768 | 8 | #define _LGPL_SOURCE |
54012638 DG |
9 | #include <stdio.h> |
10 | #include <stdlib.h> | |
11 | #include <string.h> | |
c363b55d | 12 | #include <unistd.h> |
54012638 | 13 | |
dcabc190 FD |
14 | #include <lttng/event.h> |
15 | #include <lttng/lttng-error.h> | |
16 | #include <lttng/userspace-probe.h> | |
17 | #include <lttng/userspace-probe-internal.h> | |
18 | ||
990570ed DG |
19 | #include <common/common.h> |
20 | #include <common/defaults.h> | |
82b69413 | 21 | #include <common/trace-chunk.h> |
d42266a4 | 22 | #include <common/macros.h> |
1e307fab | 23 | |
00e2e675 | 24 | #include "consumer.h" |
62499ad6 | 25 | #include "trace-kernel.h" |
e9404c27 JG |
26 | #include "lttng-sessiond.h" |
27 | #include "notification-thread-commands.h" | |
54012638 | 28 | |
19e70852 | 29 | /* |
050349bb | 30 | * Find the channel name for the given kernel session. |
19e70852 | 31 | */ |
62499ad6 | 32 | struct ltt_kernel_channel *trace_kernel_get_channel_by_name( |
df4f5a87 | 33 | const char *name, struct ltt_kernel_session *session) |
19e70852 DG |
34 | { |
35 | struct ltt_kernel_channel *chan; | |
36 | ||
0525e9ae DG |
37 | assert(session); |
38 | assert(name); | |
19e70852 | 39 | |
85076754 MD |
40 | /* |
41 | * If we receive an empty string for channel name, it means the | |
42 | * default channel name is requested. | |
43 | */ | |
44 | if (name[0] == '\0') | |
45 | name = DEFAULT_CHANNEL_NAME; | |
46 | ||
54d01ffb DG |
47 | DBG("Trying to find channel %s", name); |
48 | ||
19e70852 DG |
49 | cds_list_for_each_entry(chan, &session->channel_list.head, list) { |
50 | if (strcmp(name, chan->channel->name) == 0) { | |
51 | DBG("Found channel by name %s", name); | |
52 | return chan; | |
53 | } | |
54 | } | |
55 | ||
19e70852 DG |
56 | return NULL; |
57 | } | |
58 | ||
00a62084 MD |
59 | /* |
60 | * Find the event for the given channel. | |
61 | */ | |
62 | struct ltt_kernel_event *trace_kernel_find_event( | |
63 | char *name, struct ltt_kernel_channel *channel, | |
64 | enum lttng_event_type type, | |
65 | struct lttng_filter_bytecode *filter) | |
66 | { | |
67 | struct ltt_kernel_event *ev; | |
68 | int found = 0; | |
69 | ||
70 | assert(name); | |
71 | assert(channel); | |
72 | ||
73 | cds_list_for_each_entry(ev, &channel->events_list.head, list) { | |
74 | if (type != LTTNG_EVENT_ALL && ev->type != type) { | |
75 | continue; | |
76 | } | |
77 | if (strcmp(name, ev->event->name)) { | |
78 | continue; | |
79 | } | |
80 | if ((ev->filter && !filter) || (!ev->filter && filter)) { | |
81 | continue; | |
82 | } | |
83 | if (ev->filter && filter) { | |
84 | if (ev->filter->len != filter->len || | |
85 | memcmp(ev->filter->data, filter->data, | |
86 | filter->len) != 0) { | |
87 | continue; | |
88 | } | |
89 | } | |
90 | found = 1; | |
91 | break; | |
92 | } | |
93 | if (found) { | |
94 | DBG("Found event %s for channel %s", name, | |
95 | channel->channel->name); | |
96 | return ev; | |
97 | } else { | |
98 | return NULL; | |
99 | } | |
100 | } | |
101 | ||
19e70852 | 102 | /* |
050349bb | 103 | * Find the event name for the given channel. |
19e70852 | 104 | */ |
62499ad6 | 105 | struct ltt_kernel_event *trace_kernel_get_event_by_name( |
d0ae4ea8 MD |
106 | char *name, struct ltt_kernel_channel *channel, |
107 | enum lttng_event_type type) | |
19e70852 DG |
108 | { |
109 | struct ltt_kernel_event *ev; | |
00a62084 | 110 | int found = 0; |
19e70852 | 111 | |
0525e9ae DG |
112 | assert(name); |
113 | assert(channel); | |
19e70852 DG |
114 | |
115 | cds_list_for_each_entry(ev, &channel->events_list.head, list) { | |
00a62084 | 116 | if (type != LTTNG_EVENT_ALL && ev->type != type) { |
d0ae4ea8 | 117 | continue; |
19e70852 | 118 | } |
00a62084 MD |
119 | if (strcmp(name, ev->event->name)) { |
120 | continue; | |
121 | } | |
122 | found = 1; | |
123 | break; | |
124 | } | |
125 | if (found) { | |
126 | DBG("Found event %s for channel %s", name, | |
127 | channel->channel->name); | |
128 | return ev; | |
129 | } else { | |
130 | return NULL; | |
19e70852 | 131 | } |
19e70852 DG |
132 | } |
133 | ||
54012638 | 134 | /* |
050349bb | 135 | * Allocate and initialize a kernel session data structure. |
54012638 | 136 | * |
050349bb | 137 | * Return pointer to structure or NULL. |
54012638 | 138 | */ |
dec56f6c | 139 | struct ltt_kernel_session *trace_kernel_create_session(void) |
54012638 | 140 | { |
a4b92340 | 141 | struct ltt_kernel_session *lks = NULL; |
54012638 DG |
142 | |
143 | /* Allocate a new ltt kernel session */ | |
ba7f0ae5 | 144 | lks = zmalloc(sizeof(struct ltt_kernel_session)); |
54012638 | 145 | if (lks == NULL) { |
df0f840b | 146 | PERROR("create kernel session zmalloc"); |
a4b92340 | 147 | goto alloc_error; |
54012638 DG |
148 | } |
149 | ||
150 | /* Init data structure */ | |
03550b58 MD |
151 | lks->fd = -1; |
152 | lks->metadata_stream_fd = -1; | |
54012638 DG |
153 | lks->channel_count = 0; |
154 | lks->stream_count_global = 0; | |
155 | lks->metadata = NULL; | |
156 | CDS_INIT_LIST_HEAD(&lks->channel_list.head); | |
157 | ||
159b042f JG |
158 | lks->tracker_pid = process_attr_tracker_create(); |
159 | if (!lks->tracker_pid) { | |
55c9e7ca JR |
160 | goto error; |
161 | } | |
159b042f JG |
162 | lks->tracker_vpid = process_attr_tracker_create(); |
163 | if (!lks->tracker_vpid) { | |
55c9e7ca JR |
164 | goto error; |
165 | } | |
159b042f JG |
166 | lks->tracker_uid = process_attr_tracker_create(); |
167 | if (!lks->tracker_uid) { | |
55c9e7ca JR |
168 | goto error; |
169 | } | |
159b042f JG |
170 | lks->tracker_vuid = process_attr_tracker_create(); |
171 | if (!lks->tracker_vuid) { | |
55c9e7ca JR |
172 | goto error; |
173 | } | |
159b042f JG |
174 | lks->tracker_gid = process_attr_tracker_create(); |
175 | if (!lks->tracker_gid) { | |
55c9e7ca JR |
176 | goto error; |
177 | } | |
159b042f JG |
178 | lks->tracker_vgid = process_attr_tracker_create(); |
179 | if (!lks->tracker_vgid) { | |
55c9e7ca JR |
180 | goto error; |
181 | } | |
00e2e675 DG |
182 | lks->consumer = consumer_create_output(CONSUMER_DST_LOCAL); |
183 | if (lks->consumer == NULL) { | |
184 | goto error; | |
185 | } | |
186 | ||
54012638 DG |
187 | return lks; |
188 | ||
189 | error: | |
159b042f JG |
190 | process_attr_tracker_destroy(lks->tracker_pid); |
191 | process_attr_tracker_destroy(lks->tracker_vpid); | |
192 | process_attr_tracker_destroy(lks->tracker_uid); | |
193 | process_attr_tracker_destroy(lks->tracker_vuid); | |
194 | process_attr_tracker_destroy(lks->tracker_gid); | |
195 | process_attr_tracker_destroy(lks->tracker_vgid); | |
a4b92340 DG |
196 | free(lks); |
197 | ||
198 | alloc_error: | |
54012638 DG |
199 | return NULL; |
200 | } | |
201 | ||
202 | /* | |
050349bb | 203 | * Allocate and initialize a kernel channel data structure. |
54012638 | 204 | * |
050349bb | 205 | * Return pointer to structure or NULL. |
54012638 | 206 | */ |
00e2e675 | 207 | struct ltt_kernel_channel *trace_kernel_create_channel( |
fdd9eb17 | 208 | struct lttng_channel *chan) |
54012638 | 209 | { |
54012638 | 210 | struct ltt_kernel_channel *lkc; |
61a5b6b1 | 211 | struct lttng_channel_extended *extended = NULL; |
54012638 | 212 | |
0525e9ae DG |
213 | assert(chan); |
214 | ||
ba7f0ae5 | 215 | lkc = zmalloc(sizeof(struct ltt_kernel_channel)); |
f3ed775e | 216 | if (lkc == NULL) { |
df0f840b | 217 | PERROR("ltt_kernel_channel zmalloc"); |
54012638 DG |
218 | goto error; |
219 | } | |
220 | ||
ba7f0ae5 | 221 | lkc->channel = zmalloc(sizeof(struct lttng_channel)); |
f3ed775e | 222 | if (lkc->channel == NULL) { |
df0f840b | 223 | PERROR("lttng_channel zmalloc"); |
e9404c27 JG |
224 | goto error; |
225 | } | |
226 | ||
227 | extended = zmalloc(sizeof(struct lttng_channel_extended)); | |
228 | if (!extended) { | |
229 | PERROR("lttng_channel_channel zmalloc"); | |
f3ed775e DG |
230 | goto error; |
231 | } | |
232 | memcpy(lkc->channel, chan, sizeof(struct lttng_channel)); | |
e9404c27 JG |
233 | memcpy(extended, chan->attr.extended.ptr, sizeof(struct lttng_channel_extended)); |
234 | lkc->channel->attr.extended.ptr = extended; | |
235 | extended = NULL; | |
54012638 | 236 | |
85076754 MD |
237 | /* |
238 | * If we receive an empty string for channel name, it means the | |
239 | * default channel name is requested. | |
240 | */ | |
241 | if (chan->name[0] == '\0') { | |
242 | strncpy(lkc->channel->name, DEFAULT_CHANNEL_NAME, | |
243 | sizeof(lkc->channel->name)); | |
244 | } | |
bd722d76 | 245 | lkc->channel->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; |
85076754 | 246 | |
03550b58 | 247 | lkc->fd = -1; |
54012638 | 248 | lkc->stream_count = 0; |
cbbbb275 | 249 | lkc->event_count = 0; |
d36b8583 | 250 | lkc->enabled = 1; |
753873bf | 251 | lkc->published_to_notification_thread = false; |
54012638 DG |
252 | /* Init linked list */ |
253 | CDS_INIT_LIST_HEAD(&lkc->events_list.head); | |
254 | CDS_INIT_LIST_HEAD(&lkc->stream_list.head); | |
645328ae | 255 | CDS_INIT_LIST_HEAD(&lkc->ctx_list); |
54012638 DG |
256 | |
257 | return lkc; | |
258 | ||
259 | error: | |
e9404c27 JG |
260 | if (lkc) { |
261 | free(lkc->channel); | |
262 | } | |
263 | free(extended); | |
264 | free(lkc); | |
54012638 DG |
265 | return NULL; |
266 | } | |
267 | ||
645328ae DG |
268 | /* |
269 | * Allocate and init a kernel context object. | |
270 | * | |
271 | * Return the allocated object or NULL on error. | |
272 | */ | |
273 | struct ltt_kernel_context *trace_kernel_create_context( | |
274 | struct lttng_kernel_context *ctx) | |
275 | { | |
276 | struct ltt_kernel_context *kctx; | |
277 | ||
278 | kctx = zmalloc(sizeof(*kctx)); | |
279 | if (!kctx) { | |
280 | PERROR("zmalloc kernel context"); | |
281 | goto error; | |
282 | } | |
283 | ||
284 | if (ctx) { | |
285 | memcpy(&kctx->ctx, ctx, sizeof(kctx->ctx)); | |
286 | } | |
df3c77c8 JG |
287 | error: |
288 | return kctx; | |
289 | } | |
645328ae | 290 | |
df3c77c8 JG |
291 | /* |
292 | * Allocate and init a kernel context object from an existing kernel context | |
293 | * object. | |
294 | * | |
295 | * Return the allocated object or NULL on error. | |
296 | */ | |
297 | struct ltt_kernel_context *trace_kernel_copy_context( | |
298 | struct ltt_kernel_context *kctx) | |
299 | { | |
300 | struct ltt_kernel_context *kctx_copy; | |
301 | ||
302 | assert(kctx); | |
303 | kctx_copy = zmalloc(sizeof(*kctx_copy)); | |
304 | if (!kctx_copy) { | |
305 | PERROR("zmalloc ltt_kernel_context"); | |
306 | goto error; | |
307 | } | |
308 | ||
309 | memcpy(kctx_copy, kctx, sizeof(*kctx_copy)); | |
310 | memset(&kctx_copy->list, 0, sizeof(kctx_copy->list)); | |
7b9445b3 | 311 | |
645328ae | 312 | error: |
df3c77c8 | 313 | return kctx_copy; |
645328ae DG |
314 | } |
315 | ||
54012638 | 316 | /* |
050349bb | 317 | * Allocate and initialize a kernel event. Set name and event type. |
a969e101 | 318 | * We own filter_expression, and filter. |
54012638 | 319 | * |
050349bb | 320 | * Return pointer to structure or NULL. |
54012638 | 321 | */ |
71a3bb01 FD |
322 | enum lttng_error_code trace_kernel_create_event( |
323 | struct lttng_event *ev, char *filter_expression, | |
324 | struct lttng_filter_bytecode *filter, | |
325 | struct ltt_kernel_event **kernel_event) | |
54012638 | 326 | { |
71a3bb01 | 327 | enum lttng_error_code ret; |
54012638 | 328 | struct lttng_kernel_event *attr; |
71a3bb01 | 329 | struct ltt_kernel_event *local_kernel_event; |
dcabc190 | 330 | struct lttng_userspace_probe_location *userspace_probe_location = NULL; |
54012638 | 331 | |
0525e9ae DG |
332 | assert(ev); |
333 | ||
71a3bb01 | 334 | local_kernel_event = zmalloc(sizeof(struct ltt_kernel_event)); |
ba7f0ae5 | 335 | attr = zmalloc(sizeof(struct lttng_kernel_event)); |
71a3bb01 | 336 | if (local_kernel_event == NULL || attr == NULL) { |
df0f840b | 337 | PERROR("kernel event zmalloc"); |
71a3bb01 | 338 | ret = LTTNG_ERR_NOMEM; |
54012638 DG |
339 | goto error; |
340 | } | |
341 | ||
f3ed775e | 342 | switch (ev->type) { |
7d29a247 | 343 | case LTTNG_EVENT_PROBE: |
e6ddca71 | 344 | attr->instrumentation = LTTNG_KERNEL_KPROBE; |
7d29a247 DG |
345 | attr->u.kprobe.addr = ev->attr.probe.addr; |
346 | attr->u.kprobe.offset = ev->attr.probe.offset; | |
f3ed775e | 347 | strncpy(attr->u.kprobe.symbol_name, |
dbbb3ec5 DG |
348 | ev->attr.probe.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); |
349 | attr->u.kprobe.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
f3ed775e | 350 | break; |
dcabc190 FD |
351 | case LTTNG_EVENT_USERSPACE_PROBE: |
352 | { | |
87597c2c JG |
353 | const struct lttng_userspace_probe_location* location = NULL; |
354 | const struct lttng_userspace_probe_location_lookup_method *lookup = NULL; | |
dcabc190 FD |
355 | |
356 | location = lttng_event_get_userspace_probe_location(ev); | |
357 | if (!location) { | |
358 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
359 | goto error; | |
360 | } | |
361 | ||
362 | /* | |
363 | * From this point on, the specific term 'uprobe' is used | |
364 | * instead of the generic 'userspace probe' because it's the | |
365 | * technology used at the moment for this instrumentation. | |
366 | * LTTng currently implements userspace probes using uprobes. | |
367 | * In the interactions with the kernel tracer, we use the | |
368 | * uprobe term. | |
369 | */ | |
370 | attr->instrumentation = LTTNG_KERNEL_UPROBE; | |
371 | ||
372 | /* | |
373 | * Only the elf lookup method is supported at the moment. | |
374 | */ | |
375 | lookup = lttng_userspace_probe_location_get_lookup_method( | |
376 | location); | |
377 | if (!lookup) { | |
378 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
379 | goto error; | |
380 | } | |
381 | ||
382 | /* | |
383 | * From the kernel tracer's perspective, all userspace probe | |
384 | * event types are all the same: a file and an offset. | |
385 | */ | |
386 | switch (lttng_userspace_probe_location_lookup_method_get_type(lookup)) { | |
387 | case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF: | |
388 | /* Get the file descriptor on the target binary. */ | |
389 | attr->u.uprobe.fd = | |
390 | lttng_userspace_probe_location_function_get_binary_fd(location); | |
391 | ||
392 | /* | |
393 | * Save a reference to the probe location used during | |
e368fb43 | 394 | * the listing of events. |
dcabc190 FD |
395 | */ |
396 | userspace_probe_location = | |
397 | lttng_userspace_probe_location_copy(location); | |
dcabc190 FD |
398 | break; |
399 | case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT: | |
400 | /* Get the file descriptor on the target binary. */ | |
401 | attr->u.uprobe.fd = | |
402 | lttng_userspace_probe_location_tracepoint_get_binary_fd(location); | |
403 | ||
404 | /* | |
405 | * Save a reference to the probe location used during the listing of | |
e368fb43 | 406 | * events. |
dcabc190 FD |
407 | */ |
408 | userspace_probe_location = | |
409 | lttng_userspace_probe_location_copy(location); | |
dcabc190 FD |
410 | break; |
411 | default: | |
412 | DBG("Unsupported lookup method type"); | |
413 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
414 | goto error; | |
415 | } | |
416 | break; | |
417 | } | |
f3ed775e | 418 | case LTTNG_EVENT_FUNCTION: |
8f0d098b MD |
419 | attr->instrumentation = LTTNG_KERNEL_KRETPROBE; |
420 | attr->u.kretprobe.addr = ev->attr.probe.addr; | |
421 | attr->u.kretprobe.offset = ev->attr.probe.offset; | |
8f0d098b | 422 | strncpy(attr->u.kretprobe.symbol_name, |
dbbb3ec5 DG |
423 | ev->attr.probe.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); |
424 | attr->u.kretprobe.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
8f0d098b MD |
425 | break; |
426 | case LTTNG_EVENT_FUNCTION_ENTRY: | |
f3ed775e DG |
427 | attr->instrumentation = LTTNG_KERNEL_FUNCTION; |
428 | strncpy(attr->u.ftrace.symbol_name, | |
dbbb3ec5 DG |
429 | ev->attr.ftrace.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); |
430 | attr->u.ftrace.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
f3ed775e | 431 | break; |
e6ddca71 DG |
432 | case LTTNG_EVENT_TRACEPOINT: |
433 | attr->instrumentation = LTTNG_KERNEL_TRACEPOINT; | |
f3ed775e | 434 | break; |
a54bd42d MD |
435 | case LTTNG_EVENT_SYSCALL: |
436 | attr->instrumentation = LTTNG_KERNEL_SYSCALL; | |
c863e5a6 FD |
437 | attr->u.syscall.abi = LTTNG_KERNEL_SYSCALL_ABI_ALL; |
438 | attr->u.syscall.entryexit = LTTNG_KERNEL_SYSCALL_ENTRYEXIT; | |
439 | attr->u.syscall.match = LTTNG_KERNEL_SYSCALL_MATCH_NAME; | |
0133c199 | 440 | break; |
7a3d1328 MD |
441 | case LTTNG_EVENT_ALL: |
442 | attr->instrumentation = LTTNG_KERNEL_ALL; | |
443 | break; | |
f3ed775e DG |
444 | default: |
445 | ERR("Unknown kernel instrumentation type (%d)", ev->type); | |
71a3bb01 | 446 | ret = LTTNG_ERR_INVALID; |
f3ed775e DG |
447 | goto error; |
448 | } | |
449 | ||
450 | /* Copy event name */ | |
dbbb3ec5 DG |
451 | strncpy(attr->name, ev->name, LTTNG_KERNEL_SYM_NAME_LEN); |
452 | attr->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
f3ed775e | 453 | |
54012638 | 454 | /* Setting up a kernel event */ |
71a3bb01 FD |
455 | local_kernel_event->fd = -1; |
456 | local_kernel_event->event = attr; | |
457 | local_kernel_event->enabled = 1; | |
458 | local_kernel_event->filter_expression = filter_expression; | |
459 | local_kernel_event->filter = filter; | |
dcabc190 | 460 | local_kernel_event->userspace_probe_location = userspace_probe_location; |
54012638 | 461 | |
71a3bb01 FD |
462 | *kernel_event = local_kernel_event; |
463 | ||
464 | return LTTNG_OK; | |
54012638 DG |
465 | |
466 | error: | |
a969e101 MD |
467 | free(filter_expression); |
468 | free(filter); | |
71a3bb01 | 469 | free(local_kernel_event); |
a2c0da86 | 470 | free(attr); |
71a3bb01 | 471 | return ret; |
54012638 DG |
472 | } |
473 | ||
474 | /* | |
050349bb | 475 | * Allocate and initialize a kernel metadata. |
54012638 | 476 | * |
050349bb | 477 | * Return pointer to structure or NULL. |
54012638 | 478 | */ |
a4b92340 | 479 | struct ltt_kernel_metadata *trace_kernel_create_metadata(void) |
54012638 | 480 | { |
d42266a4 | 481 | int ret; |
54012638 | 482 | struct ltt_kernel_metadata *lkm; |
f3ed775e | 483 | struct lttng_channel *chan; |
54012638 | 484 | |
ba7f0ae5 DG |
485 | lkm = zmalloc(sizeof(struct ltt_kernel_metadata)); |
486 | chan = zmalloc(sizeof(struct lttng_channel)); | |
f3ed775e | 487 | if (lkm == NULL || chan == NULL) { |
df0f840b | 488 | PERROR("kernel metadata zmalloc"); |
54012638 DG |
489 | goto error; |
490 | } | |
491 | ||
d42266a4 JG |
492 | ret = lttng_strncpy( |
493 | chan->name, DEFAULT_METADATA_NAME, sizeof(chan->name)); | |
494 | if (ret) { | |
495 | ERR("Failed to initialize metadata channel name to `%s`", | |
496 | DEFAULT_METADATA_NAME); | |
497 | goto error; | |
498 | } | |
499 | ||
54012638 | 500 | /* Set default attributes */ |
d42266a4 | 501 | chan->attr.overwrite = DEFAULT_METADATA_OVERWRITE; |
3e230f92 | 502 | chan->attr.subbuf_size = default_get_metadata_subbuf_size(); |
b389abbe | 503 | chan->attr.num_subbuf = DEFAULT_METADATA_SUBBUF_NUM; |
d42266a4 JG |
504 | chan->attr.switch_timer_interval = DEFAULT_METADATA_SWITCH_TIMER; |
505 | chan->attr.read_timer_interval = DEFAULT_METADATA_READ_TIMER;; | |
506 | ||
507 | ||
508 | /* | |
509 | * The metadata channel of kernel sessions must use the "mmap" | |
510 | * back-end since the consumer daemon accumulates complete | |
511 | * metadata units before sending them to the relay daemon in | |
512 | * live mode. The consumer daemon also needs to extract the contents | |
513 | * of the metadata cache when computing a rotation position. | |
514 | * | |
515 | * In both cases, it is not possible to rely on the splice | |
516 | * back-end as the consumer daemon may need to accumulate more | |
517 | * content than can be backed by the ring buffer's underlying | |
518 | * pages. | |
519 | */ | |
520 | chan->attr.output = LTTNG_EVENT_MMAP; | |
521 | chan->attr.tracefile_size = 0; | |
522 | chan->attr.tracefile_count = 0; | |
523 | chan->attr.live_timer_interval = 0; | |
54012638 DG |
524 | |
525 | /* Init metadata */ | |
03550b58 | 526 | lkm->fd = -1; |
f3ed775e | 527 | lkm->conf = chan; |
54012638 DG |
528 | |
529 | return lkm; | |
530 | ||
531 | error: | |
a2c0da86 MD |
532 | free(lkm); |
533 | free(chan); | |
54012638 DG |
534 | return NULL; |
535 | } | |
536 | ||
537 | /* | |
050349bb DG |
538 | * Allocate and initialize a kernel stream. The stream is set to ACTIVE_FD by |
539 | * default. | |
54012638 | 540 | * |
050349bb | 541 | * Return pointer to structure or NULL. |
54012638 | 542 | */ |
00e2e675 DG |
543 | struct ltt_kernel_stream *trace_kernel_create_stream(const char *name, |
544 | unsigned int count) | |
54012638 | 545 | { |
00e2e675 | 546 | int ret; |
54012638 DG |
547 | struct ltt_kernel_stream *lks; |
548 | ||
0525e9ae DG |
549 | assert(name); |
550 | ||
ba7f0ae5 | 551 | lks = zmalloc(sizeof(struct ltt_kernel_stream)); |
54012638 | 552 | if (lks == NULL) { |
df0f840b | 553 | PERROR("kernel stream zmalloc"); |
54012638 DG |
554 | goto error; |
555 | } | |
556 | ||
00e2e675 | 557 | /* Set name */ |
535b8ff4 | 558 | ret = snprintf(lks->name, sizeof(lks->name), "%s_%u", name, count); |
00e2e675 DG |
559 | if (ret < 0) { |
560 | PERROR("snprintf stream name"); | |
561 | goto error; | |
562 | } | |
563 | lks->name[sizeof(lks->name) - 1] = '\0'; | |
564 | ||
54012638 | 565 | /* Init stream */ |
03550b58 | 566 | lks->fd = -1; |
54012638 | 567 | lks->state = 0; |
ffe60014 | 568 | lks->cpu = count; |
54012638 DG |
569 | |
570 | return lks; | |
571 | ||
572 | error: | |
573 | return NULL; | |
574 | } | |
c363b55d | 575 | |
050349bb DG |
576 | /* |
577 | * Cleanup kernel stream structure. | |
578 | */ | |
62499ad6 | 579 | void trace_kernel_destroy_stream(struct ltt_kernel_stream *stream) |
c363b55d | 580 | { |
0525e9ae DG |
581 | assert(stream); |
582 | ||
33a2b854 | 583 | DBG("[trace] Closing stream fd %d", stream->fd); |
c363b55d | 584 | /* Close kernel fd */ |
03550b58 | 585 | if (stream->fd >= 0) { |
c617c0c6 MD |
586 | int ret; |
587 | ||
03550b58 MD |
588 | ret = close(stream->fd); |
589 | if (ret) { | |
590 | PERROR("close"); | |
591 | } | |
799e2c4f | 592 | } |
c363b55d DG |
593 | /* Remove from stream list */ |
594 | cds_list_del(&stream->list); | |
f9815039 | 595 | |
c363b55d DG |
596 | free(stream); |
597 | } | |
598 | ||
050349bb DG |
599 | /* |
600 | * Cleanup kernel event structure. | |
601 | */ | |
62499ad6 | 602 | void trace_kernel_destroy_event(struct ltt_kernel_event *event) |
c363b55d | 603 | { |
0525e9ae DG |
604 | assert(event); |
605 | ||
87eb4ab8 | 606 | if (event->fd >= 0) { |
c617c0c6 MD |
607 | int ret; |
608 | ||
87eb4ab8 MD |
609 | DBG("[trace] Closing event fd %d", event->fd); |
610 | /* Close kernel fd */ | |
799e2c4f MD |
611 | ret = close(event->fd); |
612 | if (ret) { | |
613 | PERROR("close"); | |
614 | } | |
87eb4ab8 MD |
615 | } else { |
616 | DBG("[trace] Tearing down event (no associated fd)"); | |
617 | } | |
c363b55d DG |
618 | |
619 | /* Remove from event list */ | |
620 | cds_list_del(&event->list); | |
f9815039 | 621 | |
00a62084 MD |
622 | free(event->filter_expression); |
623 | free(event->filter); | |
624 | ||
f9815039 | 625 | free(event->event); |
c363b55d DG |
626 | free(event); |
627 | } | |
628 | ||
645328ae DG |
629 | /* |
630 | * Cleanup kernel context structure. | |
631 | */ | |
632 | void trace_kernel_destroy_context(struct ltt_kernel_context *ctx) | |
633 | { | |
634 | assert(ctx); | |
635 | ||
ba985c3a JG |
636 | if (ctx->in_list) { |
637 | cds_list_del(&ctx->list); | |
638 | } | |
645328ae DG |
639 | free(ctx); |
640 | } | |
641 | ||
050349bb DG |
642 | /* |
643 | * Cleanup kernel channel structure. | |
644 | */ | |
62499ad6 | 645 | void trace_kernel_destroy_channel(struct ltt_kernel_channel *channel) |
c363b55d | 646 | { |
af9737e9 DG |
647 | struct ltt_kernel_stream *stream, *stmp; |
648 | struct ltt_kernel_event *event, *etmp; | |
645328ae | 649 | struct ltt_kernel_context *ctx, *ctmp; |
799e2c4f | 650 | int ret; |
e9404c27 | 651 | enum lttng_error_code status; |
c363b55d | 652 | |
0525e9ae DG |
653 | assert(channel); |
654 | ||
33a2b854 | 655 | DBG("[trace] Closing channel fd %d", channel->fd); |
c363b55d | 656 | /* Close kernel fd */ |
03550b58 MD |
657 | if (channel->fd >= 0) { |
658 | ret = close(channel->fd); | |
659 | if (ret) { | |
660 | PERROR("close"); | |
661 | } | |
799e2c4f | 662 | } |
c363b55d DG |
663 | |
664 | /* For each stream in the channel list */ | |
af9737e9 | 665 | cds_list_for_each_entry_safe(stream, stmp, &channel->stream_list.head, list) { |
62499ad6 | 666 | trace_kernel_destroy_stream(stream); |
c363b55d DG |
667 | } |
668 | ||
669 | /* For each event in the channel list */ | |
af9737e9 | 670 | cds_list_for_each_entry_safe(event, etmp, &channel->events_list.head, list) { |
62499ad6 | 671 | trace_kernel_destroy_event(event); |
c363b55d DG |
672 | } |
673 | ||
645328ae DG |
674 | /* For each context in the channel list */ |
675 | cds_list_for_each_entry_safe(ctx, ctmp, &channel->ctx_list, list) { | |
676 | trace_kernel_destroy_context(ctx); | |
677 | } | |
678 | ||
c363b55d DG |
679 | /* Remove from channel list */ |
680 | cds_list_del(&channel->list); | |
f9815039 | 681 | |
753873bf JR |
682 | if (notification_thread_handle |
683 | && channel->published_to_notification_thread) { | |
63aaa3dc JG |
684 | status = notification_thread_command_remove_channel( |
685 | notification_thread_handle, | |
e1f3997a | 686 | channel->key, LTTNG_DOMAIN_KERNEL); |
63aaa3dc JG |
687 | assert(status == LTTNG_OK); |
688 | } | |
e9404c27 | 689 | free(channel->channel->attr.extended.ptr); |
f9815039 | 690 | free(channel->channel); |
c363b55d DG |
691 | free(channel); |
692 | } | |
693 | ||
050349bb DG |
694 | /* |
695 | * Cleanup kernel metadata structure. | |
696 | */ | |
62499ad6 | 697 | void trace_kernel_destroy_metadata(struct ltt_kernel_metadata *metadata) |
c363b55d | 698 | { |
0525e9ae DG |
699 | assert(metadata); |
700 | ||
33a2b854 | 701 | DBG("[trace] Closing metadata fd %d", metadata->fd); |
c363b55d | 702 | /* Close kernel fd */ |
03550b58 | 703 | if (metadata->fd >= 0) { |
c617c0c6 MD |
704 | int ret; |
705 | ||
03550b58 MD |
706 | ret = close(metadata->fd); |
707 | if (ret) { | |
708 | PERROR("close"); | |
709 | } | |
799e2c4f | 710 | } |
c363b55d | 711 | |
f9815039 | 712 | free(metadata->conf); |
c363b55d DG |
713 | free(metadata); |
714 | } | |
715 | ||
050349bb | 716 | /* |
62499ad6 | 717 | * Cleanup kernel session structure |
36b588ed MD |
718 | * |
719 | * Should *NOT* be called with RCU read-side lock held. | |
050349bb | 720 | */ |
62499ad6 | 721 | void trace_kernel_destroy_session(struct ltt_kernel_session *session) |
c363b55d | 722 | { |
af9737e9 | 723 | struct ltt_kernel_channel *channel, *ctmp; |
799e2c4f | 724 | int ret; |
c363b55d | 725 | |
0525e9ae DG |
726 | assert(session); |
727 | ||
33a2b854 | 728 | DBG("[trace] Closing session fd %d", session->fd); |
c363b55d | 729 | /* Close kernel fds */ |
03550b58 MD |
730 | if (session->fd >= 0) { |
731 | ret = close(session->fd); | |
732 | if (ret) { | |
733 | PERROR("close"); | |
734 | } | |
799e2c4f | 735 | } |
f9815039 | 736 | |
03550b58 | 737 | if (session->metadata_stream_fd >= 0) { |
70dc1c34 | 738 | DBG("[trace] Closing metadata stream fd %d", session->metadata_stream_fd); |
799e2c4f MD |
739 | ret = close(session->metadata_stream_fd); |
740 | if (ret) { | |
741 | PERROR("close"); | |
742 | } | |
70dc1c34 | 743 | } |
c363b55d | 744 | |
d36b8583 | 745 | if (session->metadata != NULL) { |
62499ad6 | 746 | trace_kernel_destroy_metadata(session->metadata); |
d36b8583 | 747 | } |
c363b55d | 748 | |
af9737e9 | 749 | cds_list_for_each_entry_safe(channel, ctmp, &session->channel_list.head, list) { |
62499ad6 | 750 | trace_kernel_destroy_channel(channel); |
c363b55d | 751 | } |
d070c424 | 752 | } |
c363b55d | 753 | |
d070c424 MD |
754 | /* Free elements needed by destroy notifiers. */ |
755 | void trace_kernel_free_session(struct ltt_kernel_session *session) | |
756 | { | |
00e2e675 | 757 | /* Wipe consumer output object */ |
6addfa37 | 758 | consumer_output_put(session->consumer); |
00e2e675 | 759 | |
159b042f JG |
760 | process_attr_tracker_destroy(session->tracker_pid); |
761 | process_attr_tracker_destroy(session->tracker_vpid); | |
762 | process_attr_tracker_destroy(session->tracker_uid); | |
763 | process_attr_tracker_destroy(session->tracker_vuid); | |
764 | process_attr_tracker_destroy(session->tracker_gid); | |
765 | process_attr_tracker_destroy(session->tracker_vgid); | |
55c9e7ca | 766 | |
c363b55d DG |
767 | free(session); |
768 | } |